Resources

Live Webinar
May
09
Join this live webinar to learn where the danger lies and how you can protect your systems. Power security expert Sandi Moore will discuss real-world examples of malware attacks on IBM i, and provide effective tactics for avoiding infections.
Article

IBM i Cloud Security Considerations

As you consider taking your IBM i to the cloud, cybersecurity will no doubt top your list of concerns. And for good reason. It’s important to remember that the cloud is kind of a lie. Your sensitive data is simply being sent to someone else’s server, and that server has a physical location somewhere. Just like on-prem cybersecurity, IBM i cloud security can be divided into two parts: Regulatory...
Article

Mobile Dashboards for IBM i Monitoring

Robot Console leverages the power of Fortra' dashboards containing browser access! Mobile-friendly dashboards allow you to combine key message summary and resource status data into a single, intuitive view. Read on to learn more.
Article

I Have All Object Authority And I’m Not Afraid To Use It!

When it comes to security on IBM Power Servers running IBM i, a common challenge for many organizations is the number of users with too much power. These users can potentially circumvent application controls, override security restrictions for themselves and others, change critical server configuration settings, and even cover their tracks while they do it.
Article

Remember the IFS!

Ask any security professional which area of IBM i security is most often ignored and chances are that the unanimous response is a chorus of “the Integrated File System.” Although it’s been around since V3R1, the Integrated File System, or IFS, remains a shrouded mystery that represents significant risk to many IBM i organizations.
Article

Two-Way Message Response with Robot

You have the afternoon off—but not the responsibility of monitoring your system for issues. This includes responding to application and system messages as they occur on your production IBM i jobs. You don’t want to carry your laptop around just in case you need to VPN back to answer a message that is waiting on your month-end process. What option do you have?
Article

Interacting with Powertech SIEM Agent for IBM i

Your organization has invested in a security information event manager, or SIEM, to receive and analyse security and event log information from a variety of servers. Now they want to also get this information from their IBM Power Systems server.
Press Release

Weak Internal Security Causes Weak External Security

Long-time security expert, Pat Botz, recently joined Fortra. Botz goes way back in the computer industry. He wrote the Basic compiler and CAD tools for Control Data supercomputers and then lead the development of CAD tools for its AIX workstation line three decades ago. He eventually became a lead security architect for the IBM i platform, and left Big Blue a number of years ago to start his own security firm, Botz & Associates. Dan sat down to have a chat with Chris Heim, chief executive officer of Fortra, and John Vanderwall, vice president and business unit manager for security services at the company, as well as Botz, who now has a senior security services consultant position at the company.
Article

Managing Your IBM i Audit Data

Let’s face it; system administration remains a largely thankless task. From scheduling jobs to balancing workloads to answering messages in QSYSOPR, administrators and operators work diligently behind the scenes to ensure that IBM i servers are available to run mission-critical applications.