Blog

Blog

What is a Vulnerability Management Program?

The Equifax breach was caused by a vulnerability. The WannaCry virus exploited a vulnerability. The stories don’t seem to end but it seems like no one is talking about how to solve this problem which is: start a vulnerability management program. “Manage the vulnerabilities in my network? Sounds easy” well, not so much, but not so difficult that you shouldn’t be spending time and resources on it....
Blog

6 Ways to Defend Yourself Against Password Attacks

Ever since Ali Baba uttered “open sesame,” thieves have been using stolen passwords to access hidden riches. In the digital world, password attacks have been and continue to be a common way for threat actors to gain access to an organization’s treasure trove of data. No matter how many emails we get from IT explaining what makes a good password, many of us still use the same basic password in...
Blog

Modern Data Security for the Enterprise

In this guest blog, Christopher Wilder of Tag Cyber provides a high-level overview of how companies can layer security solutions to ensure their data is fully protected no matter where it resides, how it travels or is shared.
Blog

Penetration Testing Frequency: How Often Should You Test?

Penetration testing has become an increasingly standard exercise, with organizations using either pen testing services or in-house teams to uncover weaknesses and assess their security posture. Many businesses want to stay proactive about securing their IT environment and find that pen testing helps them stay compliant and prove adherence to regulations or industry best practices. According to the...
Blog

Solutions for Vulnerability Management

This guest blog from Dr. Edward Amoroso, Tag Cyber provides a high-level overview of modern advances in vulnerability management and how the Fortra cybersecurity portfolio supports this important method for addressing exploitable weaknesses in an enterprise.
Blog

3 Key Differentiators in Matchup of Automation Anywhere vs. Fortra's Automate

Robotic process automation (RPA) is transforming time-consuming, manual processes across industries, with robust growth expected over the next several years, according to recent research. The market is expected to grow from $2.4 billion in 2021 to nearly $6.5 billion by 2025, a 170% increase. Not all RPA solutions work in the same way nor solve the same business challenges, however. As the RPA...
Blog

IT RPA Use Cases: Automate Manual Processes to Unlock New Levels of Productivity

Repetitive manual tasks are bogging down under-resourced IT teams everywhere, yet projects to implement Robotic Process Automation (RPA) are often focused on improvements in other business areas. Most IT departments have hundreds of tasks that are handled manually or executed using complex scripting and development work that’s nearly impossible to maintain over time. From report generation to file...
Blog

What is the Data Security Lifecycle?

What is the data security lifecycle, and how does it impact your business? Discover the stages of the data security lifecycle, and how end-to-end encryption can help with your data protection.
Blog

How Does Blue Prism Stack Up to Automate RPA?

When it comes to robotic process automation, there are a wide-range of providers and alternatives. Learn more about how RPA providers Blue Prism and Automate RPA measure up in relation to ease of use and cost effectiveness, and see what users have to say when comparing these solutions head-to-head. Plus discover how Automate can be used alongside Blue Prism to maximize RPA capabilities.
Blog

A Beginners Guide to Protecting Your Data

In this blog, Steph Charbonneau, Senior Director of Industry Strategy at Fortra, talks you through some of the most valuable aspects of data protection and how to measure success of your organizational programs.
Blog

Four Things to Consider When Evaluating Your Automation Needs

Selecting the right automation strategy for your business requires understanding your goals for robotic process automation (RPA), both now and in the future. Learn four key areas you should consider when evaluating your own needs for automation and discover what makes Automate unique in the RPA landscape.
Blog

Data Classification Best Practices

Data classification tools not only help organizations to protect their data, they also help users understand how to treat different types of data with different levels of sensitivity. Automation plays a central role in data governance and helps to maintain the required balance between technology and people-focused training to achieve an inclusive security culture.