Blog

Blog

The Solution to IP Scanning Headaches

IP scanning for growing or distributed networksYour IP Scanner more problem than help?When your network reaches a critical size, your assets have acquired a critical value or you have new compliance requirements - your freebee IP scanner just can't handle it. beSECURE (now part of Fortra Vulnerability Management) can. It your best step up into the corporate vulnerability assessment and management...
Blog

Tips for Managing Physical, Virtual, Cloud Environments

IT infrastructure is complex today. On-prem. Off-prem. Virtualization. The cloud. It’s up to IT to build this infrastructure, then distribute resources from its many miscellaneous parts to various services in the most efficient way possible. With so many different environments to track—many of them walled off from one another in data silos—service issues can be difficult to diagnose and...
Blog

Better Together – Microsoft AIP and Fortra's Data Classifier

Following on from our first post of the series, What is AIP?, this week we look at how AIP is better when paired with Fortra's Data Classifier, and the business value you will get from this partnership. In the world of enterprise data protection and data classification, the requirement for flexible solutions combining best-of-breed functionality with sophisticated policy support is viewed as...
Blog

Network Security and the Fourth Pillar

The three crumbling pillars of network securityWhy is network security getting harder?Access control, firewall and Intrusion Prevention Systems are failing to keep attackers from reaching vulnerable systems and network administrators have added as many layers beyond those as possible to no avail. This is a problem because successful attacks are often done with these solutions in place and being...
Blog

Closing The Door on Network Attacks

Network security scanningYour network is 100 times more likely to be attacked with a known exploit than an unknown one. And the reason behind this is simple: There are so many known exploits and the complexity of networks is so great that the chances are good that one of these known vulnerabilities are present and will allow an attacker access to your data.The number of networks worldwide is so...
Blog

Pen Testing Alternative Improves Security and Reduces Costs

Our definition of penetration testingPen testing (penetration testing) is the discovery of vulnerable network equipment or applications by evaluating their response (behavior) to specially designed requests. In some cases a payload (message, marker or flag) is delivered to prove beyond a doubt that the vulnerability can be exploited. Pen testing is usually a manual and expensive undertaking that...
Blog

Enhancing Microsoft AIP: What is AIP?

Microsoft Azure Information Protection (AIP) provides a data security infrastructure across Microsoft applications, as part of the MS Azure subscription package. AIP is a cloud-based solution which allows you to classify and label Office files and Outlook emails, which in turn drives Microsoft Azure Rights Management (RMS). The underlying aim of AIP is to help organizations capitalize on the...
Blog

What is Data Integrity? Definition, Types & Tips

Learn about data integrity, data integrity vs. data security, and more in Data Protection 101, our series on the fundamentals of data protection.
Blog

Security Testing the Internet of Things: Dynamic testing (Fuzzing) for IoT security

What is the Internet of Things (IoT)?The Internet of Things (IoT) encompasses any and all products that are connected to the internet or to each other. Any product which requires connection to a home, car or office network to deliver its complete set of features falls under this broad term. In fact cars themselves are now a component of the IoT as they now exchange data with the manufacturer...
Blog

Employ Active Network Scanning to Eliminate High Risk Vulnerabilities

Keeping up with new vulnerability discoveriesWith hundreds of new vulnerabilities announced each month, active network scanning is essential. An automated, frequently used vulnerability assessment and management solution is your best option for the elimination of corporate network vulnerabilities.Enterprise now needs proactive, routine network scanning to keep up with internal changes and external...
Blog

SaaS: Single Tenant vs Multi-Tenant - What's the Difference?

What are the advantages of a multi-tenancy SaaS architecture and how does it differ from single-tenant instances? We break down the differences and highlight the benefits of implementing a SaaS solution for data protection in this blog.
Blog

At the Leading Edge of NATO Data Centric Security

Fortra Data Classification has been leading the way with Military Messaging Handling Systems (MMHS) using Microsoft Exchange as the core messaging service. This has involved supporting the full evolution of NATO STANAG’s (Standard NATO Agreement) from the early draft revisions through to the latest ratified versions agreed by the member nations. In particular, the STANAG 4406 has been the most...