Article
Clearswift – staying safe and secure throughout the coronavirus pandemic
Thu, 04/16/2020
The coronavirus (COVID-19) situation is changing rapidly on a day-to-day basis, so we wanted to take this opportunity to address what it means for Clearswift and Fortra as a global organization and an employer, and how it might impact on our customers, prospects and partners.
Press Release
The Average “Cyber Breach” Costs Business £5,220 Says this Gov’t Report: Is It Badly Wrong?
A recent government-commissioned report claims that the average cost of a cyber-breach for medium to large UK businesses and charities is a mere £5,220 – despite other industry surveys estimating this number to be closer to £4 million. But industry experts like Alyn Hockey, VP of Product Management at Clearswift, warn that the figure appears to be misleadingly low.
Press Release
Second Marriott Data Breach Affects 5.2M Guests
Marriott International has had its second data breach in less than two years. Cybersecurity experts Alyn Hockey of Clearswift and Kelly White of RiskRecon offer their reactions, in an article published on www.hotelbusiness.com.
Press Release
Industry Leaders And Cybersecurity Experts Insight On Marriott International Data Breach
Alyn Hockey, VP of Product Management at Clearswift, weighs in on the recent Marriott International data breach.
Blog
Three Lessons Learned from A Data Breach
By Bob Erdman on Mon, 02/24/2020
Simple lessons learned from the many breaches we’ve observed, like careless employees and unusual attack vectors, and ways they can be avoided.
On-Demand Webinar
Cybersecurity Trends in 2019 and Predictions for 2020
By Bob Erdman
Count down the top cybersecurity trends of 2019 and hear predictions for what’s to come in 2020. 2020 looks to be just as exciting as 2019, with ample opportunities for organizations to improve their cybersecurity stance.
On-Demand Webinar
[Customer Exclusive] Robot & Powertech Web Interface
Watch this recorded webinar where our technology experts show you the best ways to quickly implement and add value with Fortra Insite.
Article
I’ve Got *ALLOBJ Authority And I’m Not Afraid To Use It—Part 2
By Robin Tatam on Thu, 06/27/2019
While everyone likes to feel special, we need to be more selective when it comes to data access. As we discussed last month, many users have privileges far beyond their business requirements and simply need to have their access reduced to more reasonable levels.
On-Demand Webinar
The Good, the Bad, and the Ugly of Penetration Testing
Thu, 06/27/2019
Watch this webinar to learn what pen testing is, what you should expect from one, and how your organization can prepare.
On-Demand Webinar
Pro Tips for IBM i User Access Management
By Robin Tatam
Watch this webinar to learn how to increase user efficiency and improve your IBM i security posture at the same time.
On-Demand Webinar
Unexpected Changes to Password Guidelines (and What They Mean for IBM i)
By Sandi Moore
IBM i security pro Sandi Moore dives into the latest password best practices and what they mean for IBM i.
Blog
A Simple Way to Enforce Password Best Practices on IBM i
Tue, 10/16/2018
Password guidelines have changed. Learn how the new rules affect IBM i and find out how a simple tool can make it easier to enforce a strong IBM i password policy at your organization.
Datasheet
Powertech Password Self Help for IBM i
Powertech Password Self Help for IBM i enables users to reset their own IBM i passwords immediately, improving user productivity and reducing the demand placed on IT. Schedule a demo today.
Datasheet
Powertech Authority Broker for IBM i
Satisfy your auditor requirements with reports that provide a complete audit trail of privileged user activity with Powertech Authority Broker for IBM i. Schedule a demo today.
On-Demand Webinar
Getting Started with IBM i Security: User Privileges
By Robin Tatam
Get up to speed on special authorities, command line access, and auditing user activities
On-Demand Webinar
Moving to Password Level 2 or 3 (and Other Password Tips and Tricks)
Tue, 06/26/2018
Watch this webinar to understand why it’s important to move to a higher password level (QPWDLVL)—and why it's easier than you might think.
On-Demand Webinar
Controlling Insider Threats on IBM i
By Robin Tatam
Despite the avalanche of regulations, news headlines remain chock full of stories about data breaches, all initiated by insiders or intruders masquerading as insiders.