Resources | Fortra

Resources

Live Webinar
Apr
13

Expert Advice on IBM i in the Cloud

Join Tom Huntington and cloud expert Tom Horan to gain insight into best practices for IBM i in the cloud and to hear how real organizations have approached cloud migration.
Guide

2023 Pen Testing Report

Over the years, penetration testing has become an integral component in proactive approaches to security, evaluating and prioritizing risk before breaches occur. Through the exploitation of identified security vulnerabilities, penetration testing can effectively measure the feasibility of systems or end-user compromise and evaluate any related consequences such incidents may have on the involved...
Guide

2023 Zero Trust Security Report

Find out how 400 cybersecurity professionals are prioritizing and implementing a Zero Trust security approach, as well as tips and insights into getting started, in this 2023 report sponsored by Cybersecurity Insiders and Fortra.
Live Webinar
Fortra's Globalscape Enhanced File Transfer (EFT™) is an advanced, powerful managed file transfer (MFT) solution that makes it easy for everyone from small businesses to enterprise organizations to exchange files with business partners. Join our upcoming webinar to explore why utilizing a flexible secure file transfer solution is key and how to get started using Globalscape’s many security...
Live Webinar
Fortra's GoAnywhere Managed File Transfer (MFT) is a secure MFT solution that makes it easy for everyone from small businesses to enterprise organizations to exchange files with business partners. Join our upcoming webinar to explore why utilizing a secure file transfer solution is key and how to get started using GoAnywhere MFT’s many file transfer, security, and collaboration features. Learn how...
Blog

How to Meet Cyber Insurance Requirements for IBM i

Discover what cyber insurance is, the solutions you may need to qualify or lower premiums, and what Fortra offers to assist your IBM i organization with becoming cyber insured.
Blog

What is DORA and How Can You Achieve Compliance?

When searching online for the new EU Regulation for strengthening the cybersecurity of financial entities and their third-party IT providers, called Digital Operational Resilience Act or DORA, it is almost certain that you will stumble upon Dora the Explorer, the famous kids’ animation.