Resources

Datasheet

iForms™

iForms enables you to create professional forms and reports from any data source.
On-Demand Webinar

Top Mistakes You Could be Making in Email Security

Email threats are constant and remain a highly sought-after opportunity for data theft. Alyn Hockey, Vice President of Product Management, discusses the top mistakes made in email security, the problems they cause, and how to fix these mistakes.
Training

Fortra's Automate: Build-A-Bot Workshop

The Build-A-Bot Workshop is designed to fast track your company's automation initiatives. This workshop is delivered in three segments to maximize the knowledge transfer of what RPA can do, how to prioritize process candidates, and get started with bots. The implementation activities are delivered on a pre-paid basis. Key Deliverables Quick, in-depth assessment of Automate Kickstart organizational...
On-Demand Webinar

How to Upgrade to IBM i 7.5

During this webinar, Peter Graves joins IBM Power Champion Tom Huntington to share top planning tips, hardware and software prerequisites, and post-installation requirements—your upgrade isn’t complete until this last step is done!
On-Demand Webinar

Meet Fortra: Your Cybersecurity Ally

This session is a must for those eager to understand how the Fortra team of expert problem solvers is ready to find answers to your organization’s toughest problems, and how we remain committed to being a people-first company ready to collaborate with our customers. 
Datasheet

Offensive Security - Elite Bundle

Fortra Vulnerability Management (formerly Frontline VM™), Core Impact, and Cobalt Strike are three powerful security tools that evaluate the security of their environments in order to better identify security vulnerabilities and predict their potential impact. Though they all share the same goal of proactively assessing risk, they are still distinct tools with distinguishing features that...
Datasheet

Offensive Security - Essentials Bundle

Fortra Vulnerability Management (formerly Frontline VM™ ) and Core Impact are two robust security tools designed to evaluate business critical networks and infrastructure for security vulnerabilities. Though both tools work to identify and prioritize security weaknesses, each offers unique strengths and distinct features. Fortra VM is a SaaS vulnerability management solution , mostly used for...
Datasheet

Offensive Security - Advanced Bundle

Core Impact and Cobalt Strike are two powerful tools that help organizations assess the security of their environments. Though they share the same goal of providing insights to help bolster security efforts, they are otherwise distinct tools with unique features. Core Impact is a penetration testing tool, primarily used for exploitation and lateral movements in various environments. Cobalt Strike...
Datasheet

Fortra Ransomware Defense

As part of the Fortra cybersecurity portfolio, Fortra Ransomware Defense enables companies to mitigate the risk of ransomware attacks with early detection and proven prevention capabilities.
On-Demand Webinar

IBM i Automation Series: Job Scheduling

Watch this webinar series for your FREE opportunity to learn what every beginner should know about Robot Schedule software for IBM i (iSeries, AS/400) automation, plus tips and tricks for the veterans.
On-Demand Webinar

Boost Your IT Department with RPA from Automate

The pressure facing IT teams has never been higher. With an increase in responsibilities coupled with ongoing staffing shortages, there’s less time to focus on driving innovation and strengthening the value of the business. As challenges grow, ease the burden on your IT department with robotic process automation—to boost productivity, maximize efficiency, and optimize your resources. In this on...
On-Demand Webinar

Build a More Resilient Business with Fortra’s Hyperautomation Suite

Organizations everywhere are looking for a way to expand their automation footprint to further optimize operations. And they’re turning to hyperautomation. What started as an industry buzzword has quickly emerged as a necessary strategy that allows organizations to digitally transform their business to be more resilient, agile—and competitive. Darrell Walker, Solutions Engineer, will take you...
On-Demand Webinar

How to Keep Sensitive Data Safe and Compliant

Keeping data secure is a constant exercise of fighting cyber threats that change daily and maintaining a strong training program for employees to stay vigilant. On top of protecting your data, it needs to be compliant which can be a daunting task - especially if your business transcends geographical boarders. Some of the most impactful regulations are General Data Protection Regulation (GDPR) and...
On-Demand Webinar

Intermapper Customer Workshop

In this informative session, Kevin Jackson, Solutions Engineer, and Steve Vold, Senior Support Analyst, share tips and best practices for getting the most out of Intermapper.
Datasheet

LEVEL 4: Operations Center Suit

Does This Sound Familiar? How would you answer the following questions? Can you schedule highly complex job streams and track them across different IBM i systems or servers? Are you making effective use of system resources by running jobs at the best time? Do you receive alerts if performance thresholds are breached? Can you quickly identify resource-grabbing jobs and/or users and take prompt...
Datasheet

LEVEL 3: Advanced Automation Suite

Does This Sound Familiar? How would you answer the following questions? Are you making effective use of system resources by running jobs at the best time? Do you receive alerts if performance thresholds are breached? Can you quickly identify resource-grabbing jobs and/or users and take prompt, corrective action? Can you automate disk space management, freeing technical resources for other projects...