On-Demand Webinar
Your Side of the AWS Shared Security Model
Tue, 11/21/2023
Discover the breadth of solutions that Fortra offers to help you with your side of the AWS shared security model.
On-Demand Webinar
How to Avoid the Biggest Mistakes in IBM i Security
By Sandi Moore
Watch this webinar to learn about the biggest errors made when securing an IBM i server. This knowledge is critical for ensuring the integrity of your application data and for meeting compliance mandates, including SOX, PCI, GDPR, and HIPAA.
On-Demand Webinar
'The Expert’s Guide to Power Systems Cloud Security,' presented by Meridian IT and Fortra
If you're curious about IBM i in the cloud or have already made the switch, you don’t want to miss this session that will equip you with the knowledge and tools necessary to navigate the complex landscape of cloud security for Power servers.
On-Demand Webinar
Zero Trust on IBM i: What It Is and Why It Matters
By Kurt Thomas
Watch Kurt Thomas and George Hibler discuss why Zero Trust on IBM i is important, what Zero Trust on IBM i looks like, and how to implement it.
On-Demand Webinar
Help! I inherited an IBM i!
If you've inherited an IBM i and are unfamiliar with the platform, watch this recorded session where our experts share proven strategies for your successful education in IBM i systems management.
Press Release
Fortra’s Alert Logic Wins Fortress Cybersecurity Award for Threat Detection
Fortra's Alert Logic Managed Detection and Response (MDR) has won a 2023 Fortress Cybersecurity Award for threat detection services. Fortra’s Terranova Security was recognized as a finalist in the category for security awareness training.
Case Study
RPA at PhishLabs: How Automation Benefits a Busy Cybersecurity Team
Discover how the cybersecurity professionals at PhishLabs turned to robotic process automation (RPA) to boost productivity without increasing labor costs.
On-Demand Webinar
The Foundation of IBM i Security Defense
By Sandi Moore
At the core of every successful IBM i security strategy is the exact same set of fundamentals. In this recorded session, IBM i security expert Sandi Moore discusses what those fundamentals are and how to get started.
Press Release
Industry-first Integration from Fortra Allows Organizations to Supercharge Their Automation Footprint
Newly released Automate Execution Method leads to improved process efficiency, increased productivity, and faster turnaround times.
On-Demand Webinar
Expert Advice on IBM i in the Cloud
Watch this session to gain insight into the best practices for migrating and staying in the cloud. Fortra’s Executive VP of Technical Solutions Tom Huntington teams up with Tom Horan of Meridian IT, a cloud expert with over 12 years of cloud experience.
Case Study
ORBE Advisors automates the generation of its clients' financial reports with Automate RPA
ORBE Company uses Automate, Fortra's RPA tool, to automate the generation of financial reports for its customers, reducing manual processes and saving time for its team. Read the full case study.
On-Demand Webinar
How to Protect Your AIX Servers from Malware
By Sandi Moore
The threat of malware and ransomware is nothing new—but now even AIX servers are at risk. Join this session to learn about the current threat landscape and how to minimize your exposure to malicious programs.
On-Demand Webinar
Fortra’s Vulnerability Management Solutions for Proactive Security
By Nick Hogg
Cybersecurity needs have grown well beyond antiviruses and firewalls. Proactive, offensive security measures are crucial to help avoid the damaging effects of an attack, including customer and credibility loss, compliance penalties, and expensive corrective security actions.
Fortra Vulnerability Manager, formerly Frontline VM, and beSTORM Dynamic Application Black Box Fuzzer...
On-Demand Webinar
By Invitation Only: A Customer Exclusive Briefing
Join our IBM i experts as they discuss Fortra's new identity and IBM i product developments to look forward to.
On-Demand Webinar
Infrastructure Protection for Proactive Security
By Nick Hogg
Infrastructure Protection for Proactive Security
Today’s threat landscape is moving so rapidly that it’s essential to anticipate attacks and adapt your cybersecurity strategy to avoid becoming the next security breach. Such devastating breaches can cripple an organization, slowing or halting day-to-day operations and doing significant harm to a business’ reputation.
Join our...
On-Demand Webinar
Email Security Best Practices: How to Protect Against Advanced Threats
Fri, 09/30/2022
Unfortunately, the bad news about data breaches, cybersecurity scams, and email attacks is constant and the numbers are more staggering with each year. Learn which steps to take NOW to protect your organization’s email ecosystem, such as collecting threat intelligence, mitigating against brand impersonation, and training your employees on security awareness, all while...
On-Demand Webinar
How to Prepare for PCI DSS 4.0
PCI DSS 4.0 is here, and you may have questions. Our webinar can help you navigate questions your organization may have in order to get ready for the March 2025 deadline.
On-Demand Webinar
Top Mistakes You Could be Making in Email Security
By Alyn Hockey
Email threats are constant and remain a highly sought-after opportunity for data theft. Alyn Hockey, Vice President of Product Management, discusses the top mistakes made in email security, the problems they cause, and how to fix these mistakes.
Press Release
Response-Based Email Threats Targeting Corporate Inboxes Are The Highest Since 2020, According To Fortra's Latest Agari And PhishLabs Report
Response-based attacks targeting corporate inboxes have climbed to their highest volume since 2020, representing 41 percent of all email-based scams targeting employees, during Q2 of this year. This is according to the latest Quarterly Threat Trends & Intelligence Report from Agari and PhishLabs, part of the Fortra cybersecurity portfolio.