Resources

On-Demand Webinar

An Introduction To Cybersecurity

In this session, security expert Robin Tatam covers cybersecurity basics, including compliance issues, preventing breaches, and the future of data protection.
Case Study

Fortra Protects the COMP Performance Group from Viruses and Malware

The COMP Performance Group™ is a world leader in the performance automotive aftermarket with core product lines that include camshafts, transmissions, drivetrain parts, fuel injection systems, and computer simulation software. After experiencing rapid growth in recent years, the organization brought on Ron Smith to launch an IT transformation project. Ron’s priorities included implementing world...
On-Demand Webinar

Getting Started with IBM i Security: System Values

Security system values enable you to “set the tone” of security on your IBM i, enforce password composition rules, and enable auditing. View this on-demand webinar to get guidance on their best practice settings.
On-Demand Webinar

Controlling Insider Threats on IBM i

Despite the avalanche of regulations, news headlines remain chock full of stories about data breaches, all initiated by insiders or intruders masquerading as insiders.
On-Demand Webinar

Lessons from 2017’s Top Security Threats

This year of record-breaking breaches forces the rest of us to determine what we can learn from a series of unfortunate events that allowed hackers and attackers to slink away with our data.