Resources

Article

I Have All Object Authority And I’m Not Afraid To Use It!

When it comes to security on IBM Power Servers running IBM i, a common challenge for many organizations is the number of users with too much power. These users can potentially circumvent application controls, override security restrictions for themselves and others, change critical server configuration settings, and even cover their tracks while they do it.
Article

Remember the IFS!

Ask any security professional which area of IBM i security is most often ignored and chances are that the unanimous response is a chorus of “the Integrated File System.” Although it’s been around since V3R1, the Integrated File System, or IFS, remains a shrouded mystery that represents significant risk to many IBM i organizations.
On-Demand Webinar

Expert Tips for Securing AIX Systems

Servers running AIX and other operating systems are frequent targets of cyberattacks, according to the Data Breach Investigations Report. From DDoS to malware, attackers have many strategies at their disposal—and common cybersecurity mistakes make their attacks much easier. One of the most serious mistakes is failing to create a well-defined security policy. A written...
Article

Automate Website Monitoring in Less Than 10 Minutes

How can a 6-step automation task provide peace of mind when it comes to website monitoring? At Fortra, our web team works to make sure that people will always be able to access our website to find solutions to their IT problems. But they don’t work 24/7. Even with the team spread across different time zones, if a critical error occurs when no one is around—or that no one knows...
Case Study

Oregon School Boards Association Uses RPA to Maintain Critical Policies

The Oregon School Boards Association is a non-profit member services agency for more than 200 locally elected boards serving school districts, education service districts, and community colleges. OSBA helps locally-elected volunteers fulfill their complex public education roles. Watch the video to get a snapshot of their story and read on for more details.   ...
Blog

Cyber Security Risk Mitigation: Statistics & Strategies

Curious about what your fellow IT professionals think about the state of cybersecurity and the risks we face at every turn? Get the visual scoop below with high-impact graphics from the recent study Fortra conducted.