Video
Getting Started with IBM i Security: Malware/Ransomware
By Sandi Moore
Just like any other OS, Power systems are highly vulnerable to malware attacks if the proper security measures are not put in place. Watch this recording for some critical tips and best practices for protecting your systems from malware.
If you would like more detail on how to create an effective malware defense strategy, you can watch the full, one hour version of this recorded webinar: Malware...
Guide
Gaining Control of Financial Services Cybersecurity Regulations
Here’s your one-stop guide to cybersecurity regulations for the financial services industry — from the U.S. to the UAE. Find out how Fortra’s powerful portfolio can streamline financial service security compliance for your organization.
Financial Cybersecurity Regulations to Know
PCI DSS — Protecting the payment card industry against liability
SWIFT — International electronic messaging...
News Article
CSO Online: Data Loss Prevention Vendors Tackle Gen AI Data Risks
By Wade Barisoff on Fri, 11/10/2023
How can businesses use Data Loss Prevention (DLP) tools to mitigate risks of generative AI? Wade Barisoff spoke to CSO Online about the generative AI-specific features of Fortra’s Digital Guardian DLP.
Blog
What is Hyperautomation?
Wed, 11/08/2023
For many organizations, what were once islands of automation are converging. And they’re realizing there’s even more labor in their organizations that can be automated. But to bring it all together, they need a craftier strategy to make it happen.
Enter hyperautomation. What started as the latest industry buzzword, has become a critical discipline to add to your digital transformation strategy. ...
News Article
Technology Record: Fortra’s Terranova Security Provides Accessible Cybersecurity Training for a Global Manufacturing Firm
Wed, 11/08/2023
Fortra’s Terranova Security helped a global manufacturing firm increase its international adoption rate of security training to 80 per cent.
Blog
What Is Cybersecurity Maturity?
By Antonio Sanchez on Mon, 11/06/2023
A mature cybersecurity program is essential for the ultimate survival of any organization facing today’s challenging threat climate. Learn the essentials of cybersecurity maturity and prepare your organization to get to the next level.
Guide
10 Common Security Misconfigurations and How to Fix Them
Is your organization using default security settings, or do you have a security configuration management (SCM) program in place to ensure your configurations are as secure as possible?
Misconfigurations are a leading cause of unauthorized access and security breaches, creating entry points for hackers in servers, websites, software, and cloud infrastructure. The Open Worldwide Application...
News Article
Solutions Review: Social Media Scams Impacting Businesses and Individuals Today
By John Wilson on Thu, 11/02/2023
In this Solutions Review article, John Wilson highlights common social media scams, their impact on businesses, and ways to safeguard yourself and your organization.
News Article
CyberWire Daily Podcast: CISOs' Challenges of Managing too Many Tools
By Antonio Sanchez on Thu, 11/02/2023
Managing a vast array of security tools can be problematic for CISOs and their security teams. Antonio Sanchez joined the CyberWire Podcast to discuss these complexities and ways CISOs can reduce this operational burden.
Blog
A Dozen Things You Should Know About Automated Job Scheduling
By Tom Huntington on Wed, 11/01/2023
Automated job scheduled software can give your company the competitive edge. Use these twelve tips to get started or to take your schedule to a new level.
On-Demand Webinar
Make the Most of Showcase with Version 10
Watch this webinar from Showcase Support Team Leader Brandy Lulling to make sure you are getting the most out of your Showcase software. We’ll bring you up to speed on how to complete the migration to Showcase 10, the latest features, and recent enhancements you may have missed if you’re already on Showcase 10.
On-Demand Webinar
How to Transfer Data Securely When Moving to The Cloud
By Ray Sutton
As more and more businesses move to a multi-cloud strategy, transferring data between cloud platforms has become a crucial aspect of the migration process, and due to the numbers of platforms and interfaces companies work with today, security, auditing, and maintainability of data transfers is growing ever more difficult.As a result of all the added complexity, operational expenses and security...
On-Demand Webinar
How to Avoid the Biggest Mistakes in IBM i Security
By Sandi Moore
Watch this webinar to learn about the biggest errors made when securing an IBM i server. This knowledge is critical for ensuring the integrity of your application data and for meeting compliance mandates, including SOX, PCI, GDPR, and HIPAA.
Blog
Fortra’s Scott Cole: Strategic Expansion
Mon, 10/30/2023
With nearly a decade at Fortra, Scott Cole provides seasoned insights into Fortra’s robust acquisition strategy and creating something greater than the sum of its parts.
Blog
What’s It Like to Be in Product Strategy at Fortra?
Fri, 10/27/2023
The Fortra Product Strategy team delivers ongoing value to global customers through our best-in-class solutions and services. Learn how these visionaries collaborate with customers and others at Fortra to define how feature sets should evolve.
Guide
Download the "Webdocs Accounts Payable Automation Guide"
Learn About the Inefficiencies of Manual Accounts Payable (AP) Processing and How Webdocs for AP Eliminates Them
Labor expenses typically consume 62% of total accounts payable costs. In other words, AP processes are intensive and inefficient when performed manually.
Webdocs for AP's automation capabilities pave the way for user and departmental...
News Article
Communications of the ACM: Should Schools Rely on Government for Cyber Protection?
By Mieng Lim on Thu, 10/26/2023
Cyberattacks on U.S. K-12 schools and students are on the rise. Mieng Lim spoke to Communications of the ACM to provide insights on how educational institutions can defend themselves from cybercriminals.