Resources

Live Webinar
Apr
30

IBM Access Client Solutions for System Administration

Nowadays, the modern ACS is the go-to tool for many. But what are its capabilities? What is included? And how can system administrators leverage it? Join this live webinar on April 30th to learn more about how Access Client Solutions (ACS) can assist in system administration.
Live Webinar
JavaScript injection is a very powerful action for web browser automations. This allows users to interact with a website exactly as the website is expecting. Adding JavaScript to Automate’s web browser actions takes your automation a step further, allowing users to build automation that controls the site as a human would when needed. Join Austin Stanley, Technical Consultant, in this customer...
On-Demand Webinar

[WEBINAR] The Platform Paradigm

Session Details Security technology adoption is going through a paradigm shift. The wide range of nonintegrated products from a variety of vendors simply are not providing the outcomes security teams expect from their investments. Enter: Fortra, a cloud-native, multi-vector cyber defense platform that changes the game, combining best-of-breed solutions into a unified security experience. What...
Guide

2023 Gone Phishing Tournament Report

Working with Microsoft to create a real-world simulation experience, this report provides a true phishing behavior benchmarking opportunity for organizations worldwide.
Live Webinar
Apr
04

How to Transfer IBM i Data to Microsoft Excel

Join our data access expert Greg Schmidt on April 4th as he demonstrates how you can simplify the process of getting data from multiple sources—including Db2 for i—into Excel.
Live Webinar
Feeling limited by the native actions available in your automation software? While native actions are a great building block for user-friendly automation, sometimes you want more flexibility with your integrations. Automate’s custom actions enable you to create your own functionality between your applications and your automation for more control over your workflows. Join Austin Stanley, Technical...
Live Webinar
Mar
26

2023 Gone Phishing Tournament Results

Join Fortra experts, and guest speakers from The National Cybersecurity Alliance and Microsoft, as they present highlights and discuss results from the 2023 Gone Phishing Tournament. With over 1.37 million emails sent to participating end users, it’s one of the biggest phishing simulation events of its kind!
Live Webinar
Apr
04

2023 Gone Phishing Tournament Results

Join Fortra experts, and guest speakers from The National Cybersecurity Alliance and Microsoft, as they present highlights and discuss results from the 2023 Gone Phishing Tournament. With over 1.37 million emails sent to participating end users, it’s one of the biggest phishing simulation events of its kind!
Live Webinar
Apr
09

2023 Gone Phishing Tournament Results

Join Fortra experts, and guest speakers from The National Cybersecurity Alliance and Microsoft, as they present highlights and discuss results from the 2023 Gone Phishing Tournament. With over 1.37 million emails sent to participating end users, it’s one of the biggest phishing simulation events of its kind!
Guide

Going Beyond the GUI

Modernization is more than simply switching from a green screen to a GUI. To have a truly modern IBM i data center, you must consider all areas of IT from your software and applications to your hardware and devices to the processes that support the whole operation. This guides helps you modernize your IBM i from the ground up.
Guide

Why IBM i? Power and Scalability for a New IT Generation

Operating systems like IBM i (iSeries, AS/400) are based on technology that has proven its effectiveness for decades, and many of the largest Fortune 500 companies, among others, continue to use “the i” today. What follows are 14 reasons why it's smart to have IBM i in your 21st century data center.
Live Webinar
Join this webinar on March 28th to learn about the biggest errors made when securing an IBM i server. This knowledge is critical for ensuring the integrity of your application data and for meeting compliance mandates, including SOX, PCI, GDPR, and HIPAA.