Blog
Malware, Ransomware, and Viruses vs Your IBM i Server
By Robin Tatam on Fri, 02/11/2022
Many of us have heard that you can’t get a virus on this platform, but the reality is that the integrated file system (IFS) is a tree-like structure. This structure can house Word documents, PDFs, MP3s, JPEG images, and these files can be just as infected on the IBM i server as they can on any Windows work station or server.
Blog
Automatic vs. Manual Network Mapping: Finding the Right Balance
By Kevin Jackson on Mon, 01/31/2022
Learn why automatic network mapping software might not give you the full picture of your network infrastructure and why you might still need some manual effort to keep your network healthy.
Blog
Getting Started with PCI and Why Every Company Should Be in Compliance
By Robin Tatam on Mon, 01/24/2022
Few things strike fear into the hearts of consumers and businesses more than a breach of financial information. Why? Because it hits us where we’re most sensitive: our pocket books!
Blog
What is the Data Security Lifecycle?
By Brian Pick on Tue, 01/18/2022
What is the data security lifecycle, and how does it impact your business? Discover the stages of the data security lifecycle, and how end-to-end encryption can help with your data protection.
Case Study
How Decatur City Schools Manages Their Growing Network with Intermapper
Through the years, there have been a lot of network changes at Decatur City Schools, a school district located in north Alabama. But one thing has remained constant, their reliance on Intermapper, the network monitoring solution from Fortra.
“Before Intermapper, we didn’t have any insight into what was up and what was down,” said Gary Cloer, Decatur City Schools network specialist. “We were...
Blog
Data-Centric Security: What is it and Why Does it Matter?
By Steph Charbonneau on Mon, 11/29/2021
A data-centric security architecture takes data security a vital step further to protect the actual data from ever-increasing data breach threats.
Blog
Top 6 Data Security Challenges and How to Address Them
By Scott Messick on Tue, 11/16/2021
Addressing an organization’s data security challenges requires some heavy lifting – no question about it. Rather than cobble together a piecemeal solution strategy, rely on trusted, integrated, and scalable data security solutions.
Blog
Data Privacy vs. Data Security: What’s the Difference?
Tue, 11/09/2021
Learn the Difference between Data Privacy and Data Security. Data privacy can’t happen without layered Data Security measures applied throughout the sensitive Data’s lifecycle.
Blog
Three Ways Intermapper Supports Regulatory Compliance and Auditor Requirements
By Kevin Jackson on Thu, 11/04/2021
Complying with cybersecurity mandates like HIPAA, SOX, PCI-DSS, NIST or CMMC is challenging. But proving your organization is compliant can be even more difficult. Discover how Intermapper offers leading network monitoring, mapping, and alerting tools that can help you meet regulatory requirements and prepare for compliance audits.
Blog
A Beginners Guide to Protecting Your Data
By Steph Charbonneau on Wed, 11/03/2021
In this blog, Steph Charbonneau, Senior Director of Industry Strategy at Fortra, talks you through some of the most valuable aspects of data protection and how to measure success of your organizational programs.
Blog
Corporate Data Security Policy: What, Why, and How
By Steph Charbonneau on Tue, 10/12/2021
Creating a corporate data security policy is a “must” in today’s evolving cybersecurity environment. Here’s a few tips on best practices.
Case Study
Fortra MFT and Secure ICAP Gateway Keep Government Services Rolling Securely and Remotely
A North American government agency with more than 1,500 employees needed to give citizens better ways to perform civic data sharing remotely due to the COVID-19 pandemic.
Blog
Network Monitoring and Identity Governance: How They Work Together to Enhance Your Security Posture
By Kevin Jackson on Thu, 07/15/2021
Discover three key areas where network monitoring and identity governance strategies go hand-in-hand, and work collaboratively to improve and enhance security within organizations today.
Blog
Heads up! New Canadian Data Privacy Act is Around the Corner
By Steph Charbonneau on Tue, 07/06/2021
Canada’s data privacy laws may soon be changing. Brush up on what’s expected to change and how your organization can comply with stronger security safeguards.
Blog
HelpSystems’ (now Fortra's) Steph Charbonneau Discusses Data Security, Corporate Culture, and More
Tue, 06/29/2021
Data security, corporate culture and more are discussed by Fortra’ Steph Charbonneau on popular blog, ModernCTO.
Blog
Data Classification Best Practices
Mon, 06/14/2021
Data classification tools not only help organizations to protect their data, they also help users understand how to treat different types of data with different levels of sensitivity. Automation plays a central role in data governance and helps to maintain the required balance between technology and people-focused training to achieve an inclusive security culture.
Blog
The Internet of Things: What's the Impact on IT Admins?
By Kevin Jackson on Thu, 06/03/2021
What does the growing Internet of Things mean for your network admins? Learn key challenges as well as our top tips for monitoring your network during this ever-changing time.
Blog
Key Takeaways from Biden's Sweeping Executive Order on Cybersecurity
Thu, 06/03/2021
Learn more about the key takeaways of the Biden Executive Order, issued on May 12, 2021 and how you can use layered security to mitigate risk.