Resources

Blog

Is Antivirus Really Necessary for Linux?

As evidenced by XBash and Kodi add-on malware, the myth that Linux is immune to viruses could not be further from the truth. In reality, Linux is becoming a lucrative target.
Blog

Your IFS Is Probably a Treasure Trove of Unsecured Data

Consider the type of information contained in the PDFs in your directories and spooled files in your output queues. Aside from taking up disk space and consuming time during a backup, what's the issue with leaving these reports on the system? The issue is the contents of those reports, along with who has access to them.
Blog

Tips for Managing Physical, Virtual, Cloud Environments

IT infrastructure is complex today. On-prem. Off-prem. Virtualization. The cloud. It’s up to IT to build this infrastructure, then distribute resources from its many miscellaneous parts to various services in the most efficient way possible. With so many different environments to track—many of them walled off from one another in data silos—service issues can be difficult to...
Case Study

Fortra Protects the COMP Performance Group from Viruses and Malware

The COMP Performance Group™ is a world leader in the performance automotive aftermarket with core product lines that include camshafts, transmissions, drivetrain parts, fuel injection systems, and computer simulation software. After experiencing rapid growth in recent years, the organization brought on Ron Smith to launch an IT transformation project. Ron’s priorities included...
Blog

How to Do Cloud Capacity Planning

Operating in the cloud can have some great benefits compared to operating with on-premises software. That’s why surveyed IT professionals predict 83% of enterprise workloads will be in the cloud by the year 2020.
Blog

How Spectre and Meltdown Affect Power Systems Servers

The Spectre and Meltdown vulnerabilities do affect Power Systems servers. Fortra security expert explains what we know so far and how you can stay up-to-date on patches released by IBM.
Blog

What is a Capacity Management Maturity Model?

Demands for services are increasing. High performance and reliability are expected. Yet budgets, labor and floor space are all being constrained. That’s where capacity management comes in. Capacity management can improve efficiency and guarantee reliability of your business systems.
Blog

NIST’s Surprising New Password Recommendation

For a computer user, few things are more annoying than the requirement to use a password to access servers, applications, and websites. Find out how NIST's new recommendations are making passwords easier to create and maintain.
Blog

Hidden Dangers of the Lesser-Known IBM i Special Authorities

Everyone’s aware of the dangers of *ALLOBJ, *SECADM, and *SPLCTL special authorities. But what about the rest? Fortra security expert explains the issues you should be aware of when assigning the other special authorities.