On-Demand Webinar
Analyze Traffic Flow with a Bandwidth Monitoring Tool
Identify bandwidth hogs and traffic congestion with a NetFlow analyzer. Find out how Intermapper can help.
Datasheet
Fortra Cybersecurity
Chances are, your team is struggling to keep up with the ever-growing workload, increasing security threats, and shifting priorities that have become hallmarks of today’s IT environment. Instead of proactively building your security posture, you’re forced to be reactive, always fighting the biggest fire first. You need a better way. It’s time to protect your organization with proactive, automated...
On-Demand Webinar
Data Security Challenges: How Our Suite Helps
By Nick Hogg
Data security is hard. We’re not going to sugarcoat it. In this 60-minute webinar we'll: Discuss the best practices for protecting your data throughout its lifecycle Introduce our full data security suite, which provides protection from creation to publication, and sharing of your sensitive data. Explore some common use cases that our suite helps address And more! If you are curious about our...
Blog
Why is Bandwidth Monitoring Important?
By Kevin Jackson on Fri, 06/26/2020
What's the importance of bandwidth speed, capacity, and usage? Learn why monitoring these key metrics can help meaintain peak network performance.
Blog
Three Lessons Learned from A Data Breach
By Bob Erdman on Mon, 02/24/2020
Simple lessons learned from the many breaches we’ve observed, like careless employees and unusual attack vectors, and ways they can be avoided.
On-Demand Webinar
Cybersecurity Trends in 2019 and Predictions for 2020
By Bob Erdman
Count down the top cybersecurity trends of 2019 and hear predictions for what’s to come in 2020. 2020 looks to be just as exciting as 2019, with ample opportunities for organizations to improve their cybersecurity stance.
Article
Remember the IFS!
By Robin Tatam on Thu, 06/27/2019
Ask any security professional which area of IBM i security is most often ignored and chances are that the unanimous response is a chorus of “the Integrated File System.” Although it’s been around since V3R1, the Integrated File System, or IFS, remains a shrouded mystery that represents significant risk to many IBM i organizations.
Datasheet
Powertech Command Security for IBM i
Using Command Security, you identify which commands you want to monitor, specify the conditions under which the command should be secured, and define the actions to take when the conditions are met. Schedule a demo today.
On-Demand Webinar
Help Your Tech-Driven School Thrive with Network Monitoring
Learn how network monitoring can help support a tech-driven education at your institution.
Guide
Getting Started with Intermapper Flows
This quick 4-minute video and guide walks you through how to install and set up Intermapper Flows for powerful bandwidth monitoring and network traffic analysis.
Datasheet
Intermapper Flows
Intermapper Flows is a tightly integrated component of Intermapper’s network monitoring, mapping, and alerting suite of tools.
Blog
How to Get Started with NIST 800-171 Compliance
By Kevin Jackson on Fri, 09/22/2017
Are you ready to report your NIST 800-171 compliance status by the end of the year? If you do business with the federal government, you need to comply with SP NIST 800-171 by the end of the year. Now is the time to implement your compliance plan.
Guide
6 Ways to Calculate Returns from your Network Monitoring Investment
How do you calculate the return on investment (ROI) of a network monitoring software? Learn the problems a network monitoring solution can solve and how to easily calculate its ROI.
Article
Protect the IBM i Command Line with Powertech Command Security for IBM i
By Robin Tatam on Fri, 03/24/2017
A user’s ability to execute commands in a green-screen environment is controlled by the limit capabilities (LMTCPB) parameter on their profile. Although without exit programs to extend IBM i security functions, even limited capability users could invoke commands through network interfaces such as FTP.
Article
Command Access Can Bring Unexpected Consequences
By Robin Tatam on Fri, 03/24/2017
Does this sound familiar? You recently experienced an “unplanned outage” after an administrator inadvertently issued a PWRDWNSYS command while mentoring a new operator.
On-Demand Webinar
Audit and Control of Powerful Users on IBM i
By Robin Tatam
Discover the ways to control and audit the activity of powerful users, with a view to enhancing the integrity of your IBM i. With the proper controls in place, you can restrict even the most powerful users as required.
On-Demand Webinar
Getting Started with Intermapper Flows Bandwidth Monitoring
By Pat Cameron
This webinar provides an overview of Intermapper Flows, the integrated network bandwidth monitoring tool within Intermapper that provides you with real-time information on the full activity of your network.
Blog
Use Flows to Keep Network Traffic Moving
By Kevin Jackson on Wed, 12/14/2016
Intermapper Flows is a particularly valuable tool for monitoring network traffic as it gives you detailed metrics about who, how, and when data is flowing across the network.