Blog
Data Classification and Data Loss Prevention (DLP): A Comprehensive Data Protection Strategy
Tue, 05/23/2023
Data is the world’s currency and has been for some time. Protecting data should be at the top of the list for organizations of any size, and the heart of any security strategy. Think about it: the purpose of any firewall, email solution, compliance regulation, or XDR platform is to keep data safe . Why not cut to the heart of it with a dedicated Data Loss Prevention (DLP) solution? And why not...
On-Demand Webinar
Fortra’s Vulnerability Management Solutions for Proactive Security
By Nick Hogg
Cybersecurity needs have grown well beyond antiviruses and firewalls. Proactive, offensive security measures are crucial to help avoid the damaging effects of an attack, including customer and credibility loss, compliance penalties, and expensive corrective security actions. Fortra Vulnerability Manager, formerly Frontline VM, and beSTORM Dynamic Application Black Box Fuzzer can save your team...
Blog
Getting Started with PCI and Why Every Company Should Be in Compliance
By Robin Tatam on Mon, 01/24/2022
Few things strike fear into the hearts of consumers and businesses more than a breach of financial information. Why? Because it hits us where we’re most sensitive: our pocket books!
Press Release
HelpSystems’ (now Fortra's) Data Security Week LIVE to Give Powerful Insights into Navigating Today’s Cyberthreat Landscape
Data security experts will present virtual, interactive sessions focused on protecting valuable information assets for attendees
Guide
5th Annual IBM AIX Community Survey Findings
The AIX Community Survey, now in its fifth consecutive year, goes in-depth with IT teams to gain a unique perspective into how this platform is being used today and how teams envision using it in the future. Over the years, the respondents of the survey have expanded to include a variety of industries, geographies, and titles within IT. More than 100 IT professionals in North America, EMEA, and APAC participated in this year’s survey, and this input enables all of us to understand the role of AIX with new clarity.
Blog
What is the LGPD? Meet Brazil’s New Powerful Data Protection Law
By Kurt Thomas on Thu, 01/28/2021
Brazil is Latin America’s largest technology hub and has the eighth-largest economy by GDP. Getting to know the ins and outs of LGPD is essential for doing business there.
Article
Key Management and Strong Encryption For PCI DSS Compliance With Powertech Encryption for IBM i
By Bob Luebbe on Tue, 12/29/2020
PCI DSS now includes requirements for strong encryption of cardholder data. Learn how key management is an essential element of preventing unauthorized data access.
Press Release
GlobalSCAPE Completes SOC 2 Type 1 Compliance Certification
GlobalSCAPE, a Fortra company, has successfully completed the SOC 2 (System and Organization Controls) audit assessment for its cloud-managed file transfer (MFT) solution, EFT Arcus.
On-Demand Webinar
Why Your IBM i Security Will Fail (and How to Fix It)
By Robin Tatam
The most common approaches to IBM i security share a serious flaw. Watch this webinar to learn how to fix it.
On-Demand Webinar
Is the California Consumer Privacy Act (CCPA) the Next GDPR and Why Should I Care?
In this session, you’ll learn why most organizations—not just those in California—are affected by the CCPA and what it means for IT pros.
Press Release
HelpSystems (now Fortra) Makes It Easier to Identify Security Events on IBM i
Fortra today announced the latest release of Powertech SIEM Agent for IBM i. The new version provides enhanced flexibility to meet the demands of increasingly complex IT environments.
On-Demand Webinar
IBM i Security for Programmers
By Robin Tatam
In the first of this two-part webinar series, Robin Tatam combines his skills as a certified RPG developer with his IBM i security expertise. He’ll cover the security considerations that native application programmers should be keenly aware of as they design their applications.
On-Demand Webinar
Expert Tips for Securing AIX Systems
By Bob Erdman
Servers running AIX and other operating systems are frequent targets of cyberattacks, according to the Data Breach Investigations Report. From DDoS to malware, attackers have many strategies at their disposal—and common cybersecurity mistakes make their attacks much easier. One of the most serious mistakes is failing to create a well-defined security policy. A written statement of how your...
Blog
Cyber Security Risk Mitigation: Statistics & Strategies
Sat, 03/23/2019
Curious about what your fellow IT professionals think about the state of cybersecurity and the risks we face at every turn? Get the visual scoop below with high-impact graphics from the recent study Fortra conducted.
Blog
5 Cybersecurity Resources You Shouldn’t Scroll Past
By Robin Tatam on Sat, 03/16/2019
It's tough to stay on top of the latest cyberthreats and what they mean for your business. Here are some go-to resources that makes it easier to educate yourself on this important topic.
Blog
Cryptoviral Extortion: The Enduring Problem of Ransomware
By Bob Erdman on Wed, 03/13/2019
Learn about the long arms of ransomware, and how to protect your organization from its grasp.
Video
5 IBM i Security Quick Wins
By Sandi Moore
IBM i security expert Sandi Moore outlines the five fastest and most impactful changes you can make to strengthen IBM i security this year.