Blog

Blog

VPN Replacement: Why You Need It and How to Find the Right One

When the industry outgrew the perimeter, it also outgrew VPNs. Now, VPN replacements are in high demand as organizations look for scalable, lightweight ways to secure distributed data in a distributed workforce.Understanding VPN and Its LimitationsVPNs were built for a bygone era, but fail to secure remote work, private data, or private applications today.VPN Security ChallengesSecuring VPNs is a...
Blog

What is a Secure Web Gateway? (SWG)

Secure Web Gateway definedOrganizations use a SWG to protect their employees. A secure web gateway (SWG) is a security solution that prevents unsecured internet traffic from entering an internal network of an organization. It is used by organizations to protect their employees and users from accessing and being infected by malicious web traffic, websites with vulnerabilities, internet-borne...
Blog

SSE vs SASE: How Are They Related?

In order to take advantage of cloud-centric business models, many organizations are considering developing a Secure Access Service Edge (SASE) architecture. But how do you choose the right solution? There is no shortage of vendors selling tools to secure interactions between devices, applications, on-premises resources and infrastructure. As a result, it can be challenging to select the right mix...
Blog

What is Security Service Edge (SSE)?

Security Service Edge is the security stack of SASE (that also includes a networking stack including SD-WAN). A complete SSE stack of cloud security services allows organizations to protect their workforce from internet threats, provides secure and adaptive access to private corporate applications, and protects data across all their cloud platforms and applications.Security Service EdgeThere are 3...
Blog

Highlights from Release Day 2025.1

Fortra’s 2025.1 Release Day includes improvements to email security, managed file transfer, data classification, security awareness training, and more.
Blog

Major Launches Announced on Release Day 2024.2

About Fortra’s Release Day Each quarter, we at Fortra get to roll out the fruits of our labors for the past few months. We showcase new features, updates, and even products. This Release Day features several groundbreaking projects. We’ve broken into the XDR arena and are thrilled to introduce you to our new offering. We’ve issued major releases for over a half-dozen of our flagship products....
Blog

Data Classification and Data Loss Prevention (DLP): A Comprehensive Data Protection Strategy

Data is the world’s currency and has been for some time. Protecting data should be at the top of the list for organizations of any size, and the heart of any security strategy. Think about it: the purpose of any firewall, email solution, compliance regulation, or XDR platform is to keep data safe. Why not cut to the heart of it with a dedicated Data Loss Prevention (DLP) solution? And why not...
Blog

Preparing for the Impact of PCI DSS 4.0

Stealing credit card data is a perennial favorite of cybercriminals everywhere, whose aggressive tactics to score sensitive accountholder details result in breach after breach for organizations small and large. In its most recent research on payment card fraud, The Nilson Report found $28.6 billion in losses for 2020 (nearly 36% in the U.S. alone),...
Blog

Modern Data Security for the Enterprise

In this guest blog, Christopher Wilder of Tag Cyber provides a high-level overview of how companies can layer security solutions to ensure their data is fully protected no matter where it resides, how it travels or is shared.
Blog

A Beginners Guide to Protecting Your Data

In this blog, Steph Charbonneau, Senior Director of Industry Strategy at Fortra, talks you through some of the most valuable aspects of data protection and how to measure success of your organizational programs.
Blog

Open PGP for IBM i (iSeries)

GoAnywhere MFT for IBM i (iSeries) includes native commands for performing PGP encryption and decryption functions directly on the IBM i (formerly known as and often still called AS/400). These commands can be placed in CL programs, the job scheduler or run from IBM i menus. With GoAnywhere MFT, files can additionally be digitally signed with a private key on the IBM i. In turn, you can verify...