Blog

Blog

What to Know about the New NIST Cybersecurity Framework

Compiled with significant input from the private sector, the Cybersecurity Framework isn’t a prescriptive compliance document and instead gives companies significant leeway in how they use it to inform their security strategies. As a relatively new source of guidance, its implications for regulated industries aren’t clear yet.
Blog

Your Biggest Challenge to IBM i User Onboarding

As companies bounce back from recession and place a stronger emphasis on digitally-driven innovations, IT departments are finally receiving the funds they need to hire qualified, new colleagues who can lighten the workload. However, the first order of business will be getting these recent hires up to speed.
Blog

Your Biggest Threat Since Edward Snowden

When Edward Snowden leaked the details of the National Security Agency’s PRISM program to the media, it resulted in a large public outcry and lot of unwanted attention. This doesn’t mean that system administrators should treat all of their contractors as the next Snowden, but it highlights the importance of ensuring that contractors, as well as employees, are sufficiently monitored and aware of how they are allowed to use company data.
Blog

Network Monitoring for the Back-to-School Season

With the start of the school year upon us, IT administrators everywhere are preparing their networks for surges in traffic as students and teachers return. But what do they need to ensure a smooth transition from the slow summer months to the busy school year?
Blog

Get Real-time Network Mapping for Your Financial Organization

https://www.fortra.com/blog/what-network-mapping-softwareIn the financial and banking industry, downtime is not an option. Too many critical devices and applications are delivering customer services and running daily operations. Find out how a network mapping tool gives you real-time alerts about network issues before outages occur.
Blog

What's the Difference Between a Profile Swap and Adopted Authority?

Many organizations have the requirement to reduce the number of profiles to which special authorities—especially *ALLOBJ specially authority—have been assigned. In many cases, the excess capabilities can simply be removed because they aren't required for the person to perform their job functions. *SAVSYS special authority is a good example. Unless the...