Join IBM i security expert Amy Williams on June 20th to learn how to make your audit journal data more easily accessible and how to set up your audit journal so that critical information doesn’t go unnoticed.
About Fortra’s Release Day
Each quarter, we at Fortra get to roll out the fruits of our labors for the past few months. We showcase new features, updates, and even products.
This Release Day features several groundbreaking projects. We’ve broken into the XDR arena and are thrilled to introduce you to our new offering. We’ve issued major releases for over a half-dozen of our flagship products....
SecurID Agent brings the full functionality of the market-leading RSA SecurID two-factor authentication solution to IBM i users. Check out the datasheet to learn more.
The most overlooked aspects of IBM i compliance with PCI-DSS, SOX, HIPAA, and other standards, how to configure them correctly, and what Fortra can do to help.
In this video series, Steve Will provides unparalleled insight into how IBM i generates high customer satisfaction and ROI year after year. He also forecasts what the future holds for IBM i and what makes the platform such a great fit for customers looking for a modernized approach to IT – including its cloud compatibility, the ease it brings to modernizing applications, and much more.
The...
Just like any other OS, Power systems are highly vulnerable to malware attacks if the proper security measures are not put in place. Watch this recording for some critical tips and best practices for protecting your systems from malware.
If you would like more detail on how to create an effective malware defense strategy, you can watch the full, one hour version of this recorded webinar: Malware...
Watch this webinar to learn about the biggest errors made when securing an IBM i server. This knowledge is critical for ensuring the integrity of your application data and for meeting compliance mandates, including SOX, PCI, GDPR, and HIPAA.
If you're curious about IBM i in the cloud or have already made the switch, you don’t want to miss this session that will equip you with the knowledge and tools necessary to navigate the complex landscape of cloud security for Power servers.
Data protection is essential for the health and survival of any organization. Getting the support of corporate leadership is critical to fully protect your valuable assets.
In this eBook, six experts share their perspectives of:
The current challenges surrounding data protection
What the future of data protection may look like
Ways to gain support within an organization for your data...
If you have recently upgraded your hardware, our this is a great opportunity to establish IBM i security best practices for your organization now and into the future — and our free Security Scan will help you do just that. The Security Scan takes an inventory of your current security settings and uses the results to demonstrate your data’s degree of vulnerability and pinpoint specific weaknesses.
Current Domain Threats, Trends, and Techniques
Domain impersonation is the foundation for a multitude of online threats. Because a domain is dynamic, identifying when and how it will be used for malicious purposes can be challenging for security teams, and requires constant monitoring for behavior that will validate removal.
In the 2023 Domain Impersonation Report, we review look-alike domain...
How to Stop Look-Alike Domains and Spoofing
In the first half of 2023, cybercriminals targeted company brands using an average of 40 look-alike domains per month. Domain impersonation threats trick users into giving away sensitive information by convincing them an email is from a trusted source or a website is authentic.
It’s crucial that companies take preventive measures against look-alike...
Discover CVE-2023-30990 - Unauthenticated RCE in IBM i DDM Service. Learn what this vulnerability is, how it impacts the IBM i, and how you can prevent as well as assess your exposure to it.
If you've inherited an IBM i and are unfamiliar with the platform, watch this recorded session where our experts share proven strategies for your successful education in IBM i systems management.
At the core of every successful IBM i security strategy is the exact same set of fundamentals. In this recorded session, IBM i security expert Sandi Moore discusses what those fundamentals are and how to get started.