-
Alan Jordan |
Greg J. Schmidt
Blog
Compliance Mandates Apply to IBM i Too
By Amy Williams on Tue, 02/20/2024
The most overlooked aspects of IBM i compliance with PCI-DSS, SOX, HIPAA, and other standards, how to configure them correctly, and what Fortra can do to help.
Article
The Importance of VIOS
Thu, 08/31/2023
VIOS is considered a standard in organizations running IBM i, AIX, and Linux workloads. But don’t put your business at risk by letting it run unchecked. Learn five areas you must be monitoring.
On-Demand Webinar
How to Merge Data from Different Sources
By Alan Jordan
Watch this recorded session on how Sequel Data Warehouse makes it easy to merge data from SQL, Oracle, Excel, and other sources.
Blog
An IBM i Hacking Tale
By Pablo Zurro on Thu, 04/06/2023
Discover how penetration testing can be used on IBM i systems to find hidden vulnerabilities in your security. This post breaks down Core Impact's IBM i pen testing process from discovery to privilege escalation.
Blog
Preparing for the Impact of PCI DSS 4.0
Thu, 11/10/2022
Image
Stealing credit card data is a perennial favorite of cybercriminals everywhere, whose aggressive tactics to score sensitive accountholder details result in breach after breach for organizations small and large. In its most recent research on payment card fraud, The Nilson Report found $28.6 billion in losses for 2020 (nearly 36%...
News Article
e-ChannelNews Interview with Mark Bell: Core Security Releases New Ransomware Simulator
Following the release of Core Security’s Ransomware Simulator, Mark Bell, Managing Director of Infrastructure Protection at Fortra, shares vulnerability management best practices and more in an interview with e-ChannelNews.
On-Demand Webinar
Building a Proactive Security Strategy
Advancing your vulnerability management programme may be a journey, but it is a journey well worth taking and cannot be done overnight. As your programme matures the better your organisation can avoid costly attacks and breaches that may harm your business and reputation.
Learn how a proactive cybersecurity program can be a game changer for an organisation's success through...
On-Demand Webinar
Help Your Organization Overcome Top Challenges with Sequel Data Warehouse
By Alan Jordan
Watch this webinar to learn how a data warehouse can solve three common, yet complex data challenges that you might be facing today.
Guide
A Single Pane of Glass for Multi-Platform Systems Management
Bring disparate systems, platforms, devices, and applications together in one place and on one screen to make systems management easier and create a consistent and common methodology to varying departments within the IT infrastructure. Combining Halcyon’s Enterprise Console, Operations Center Suite, and Network Server Suite can provide a single pane of glass for managing your IT environment. See how here.
Article
Three Essential Steps to Successful Performance Management
Tue, 08/24/2021
Performance management is often made to look cumbersome and complex, but we’ve distilled the process down to three essential steps.
Blog
Automated Capacity Forecasting Using Predictive Analytics and Machine Learning
By Per Bauer on Mon, 06/07/2021
Better understand the different options for capacity forecasting and their characteristics, including using predictive analytics and machine learning. And learn how to choose the optimal forecasting method based on your business needs and maximize the accuracy and value of your planning efforts.
Guide
Penetration Testing Toolkit
Safeguard your infrastructure and data
With today’s ever-increasing and constantly-shifting threat landscape, organizations must do everything they can to ensure the security of its cyber assets, including penetration testing. Based on our years of experience helping organizations manage security risks across the enterprise, we’ve compiled a collection of penetration testing...
Guide
2021 Pen Testing Survey Report
Cyber attacks have become so common place, we're no longer surprised to see a massive breach hit the headlines. With this threat constantly looming, organizations should regularly be asking themselves, "how secure are we?" Penetration tests help to answer this question, uncovering and exploiting security threats to determine how much of a risk they pose.
The 2021 Pen Testing...
On-Demand Webinar
Jumpstart Your Cost Optimization Project
By Per Bauer
When exciting new services get underway, IT can be reduced to a cost center. In an effort to keep services up, leadership adopts a “performance at any cost” mindset and allocates more resources than necessary as an insurance policy against downtime.
But this is not a sustainable strategy, and especially in times like these, your organization needs to focus on controlling costs...
Article
VIOS Performance Monitoring Commands
By Chuck Losinski on Wed, 03/10/2021
You might think VIOS is set and forget, but it’s not. Luckily, VIOS includes a number of command line utilities to help you obtain performance-related information from your VIOS partitions.
Blog
How to Get Buy-In for Your IT Cost Optimization Strategy
By Per Bauer on Fri, 08/28/2020
Policy alone is rarely enough to influence change. Lasting impact requires buy-in from the organization and is best achieved using a mix of different influence levers.