Blog

Blog

3 Key Differentiators in Matchup of Automation Anywhere vs. Fortra's Automate

Robotic process automation (RPA) is transforming time-consuming, manual processes across industries, with robust growth expected over the next several years, according to recent research . The market is expected to grow from $2.4 billion in 2021 to nearly $6.5 billion by 2025, a 170% increase. Not all RPA solutions work in the same way nor solve the same business challenges, however. As the RPA...
Blog

11 Security Assessment Tools by Fortra for More Informed Security

Gaining a better cybersecurity posture doesn’t have to be such a painstaking process. Work to better identify, prioritize, and mitigate security vulnerabilities within your organization by gaining informed, easy-to-understand insight from Fortra’ security assessment tools.
Blog

What is the Fortra Value Proposition for Cybersecurity?

In this guest blog, Dr Ed Amoroso, CEO, Tag Cyber, provides a high-level overview of the Fortra cybersecurity portfolio value proposition based on a mapping of its component solution offerings to the NIST Cybersecurity Framework (CSF) phases.
Blog

Lessons Learned from IBM's Native Scheduler

The systems that businesses rely on today are increasingly complex and challenging to manage without sophisticated job scheduling tools. According to the annual IBM i Marketplace Survey Results , only 22 percent of IBM i shops are running the IBM i operating system exclusively. 68 percent are also running the Windows OS, another 56 percent are running Linux, and 26 percent are running AIX. That...
Blog

Maintaining a Startup Culture as Part of a Global Enterprise: Pavel Snkhchyan

Pavel Snkhchyan is a life-long learner. He joined student-fueled Armenian startup Sourcio in 2005 as a Product Manager for the nascent development firm, becoming VP of Project and Program Management in 2011 as well as the overall head of the business. Around that time, Pavel began working with U.S.-based Fortra, and the client quickly became a favorite. The partnership grew based on shared core...
Blog

Top Social Media Threats Targeting the Retail Industry

Social media threats targeting enterprises more than doubled last year. Attacks on the retail industry specifically have grown, as threat actors are targeting victims with impersonation and counterfeit ad campaigns. Purchasing behavior is increasingly influenced by social media, making it an attractive vector for these kinds of campaigns. The tendency of social media users to consume information...
Blog

IT RPA Use Cases: Automate Manual Processes to Unlock New Levels of Productivity

Repetitive manual tasks are bogging down under-resourced IT teams everywhere, yet projects to implement Robotic Process Automation (RPA) are often focused on improvements in other business areas. Most IT departments have hundreds of tasks that are handled manually or executed using complex scripting and development work that’s nearly impossible to maintain over time. From report generation to file...
Blog

Key Considerations in The Ever-Evolving Data Privacy Landscape – The Optimal Technology Mix

Enza Iannopollo, principal analyst at Forrester, recently answered some of the pressing questions we’ve received when it comes to data security, and more importantly building the foundations of your data security strategy. Today we’re looking at what Enza had to say about the prime mix of technologies when it comes to data protection. Q: What mix of technologies do you see as being the optimum for...