Blog
Is Your Data REALLY Safe on the IBM i (AS/400)?
By Tom Huntington on Thu, 08/29/2024
Discover the three things you can do, starting today, to ensure your data is properly secured on your IBM i (AS/400).
Blog
The Top 5 Benefits of Remote Network Monitoring
By Kevin Jackson on Mon, 06/10/2024
If your network equipment is located in multiple locations, or your IT team wants to monitor the network on-the-go, remote network monitoring can help.
Blog
How to Make a Network Map in 5 Easy Steps
Thu, 03/21/2024
Your network is complex, but creating a helpful, dynamic map doesn't have to be - learn how to create a network map with Intermapper.
Blog
Top 8 Benefits of Network Monitoring
Thu, 03/14/2024
Lack of network visibility makes life hard for IT. Network monitoring helps you stay ahead of outages with real-time visibility into your network health.
Blog
Going Phishing Isn't Seasonal–Get the Latest Results from 2023's Tournament
By Monica Delyani on Fri, 02/23/2024
Preview the latest global phishing benchmarking results and expert security awareness recommendations from Fortra's Terranova Security 2023 Gone Phishing Tournament.
Blog
Compliance Mandates Apply to IBM i Too
By Amy Williams on Tue, 02/20/2024
The most overlooked aspects of IBM i compliance with PCI-DSS, SOX, HIPAA, and other standards, how to configure them correctly, and what Fortra can do to help.
Article
Identifying Security Threats with Network Monitoring Software
By Kevin Jackson on Tue, 12/05/2023
Now more than ever, securing your infrastructure is critical to the success of your organization.
Blog
The Changing Role of Government in Cybersecurity
By Antonio Sanchez on Wed, 11/29/2023
Governments are responsible for carrying out their duties to defend the rights and safety of their citizens. Find out their role in the cyber landscape and how Fortra plays a part.
Article
What's New in Automate
Mon, 10/16/2023
That latest version of Automate has just been released. Find out more about what's new!
Blog
Ransomware Attacks: Why Email Is Still THE Most Common Delivery Method
Thu, 01/26/2023
Organizations face a growing danger from phishing and ransomware, which have been the most common forms of cybercrime in recent years. Most businesses have fallen victim to phishing or ransomware attacks at some point. Every business needs to act against the growing threat of phishing, the primary method through which ransomware and other malware are spread. On the bright side, organizations have...
Blog
Preparing for the Impact of PCI DSS 4.0
Thu, 11/10/2022
Stealing credit card data is a perennial favorite of cybercriminals everywhere, whose aggressive tactics to score sensitive accountholder details result in breach after breach for organizations small and large. In its most recent research on payment card fraud, The Nilson Report found $28.6 billion in losses for 2020 (nearly 36% in the U.S. alone),...
Blog
Secure Data Sharing Solves These 3 Cybersecurity Challenges
Thu, 03/10/2022
As more of your organization's data is shared, protecting it gets more difficult. Securing your data-sharing capabilities solves these 3 challenges.
Article
What is SNMP, and How Does It Work?
By Kevin Jackson on Thu, 03/03/2022
SNMP is one of the most widely accepted protocols for network monitoring. Here’s a quick summary of what is SNMP, how it works, and why it matters to network professionals.
On-Demand Webinar
Clearswift Secure Email Gateway - Bridging the Security Gaps
By Alyn Hockey
Watch this video to see where you may be at risk for cyberattacks not currently protected from your existing email security.
On-Demand Webinar
How to Protect Your Data with Layered Security
By Nick Hogg
Does your organization need to better protect data across its entire lifecycle, from when it’s created to when it leaves the organization? Learn how to protect your data with layered security.
Blog
Automatic vs. Manual Network Mapping: Finding the Right Balance
By Kevin Jackson on Mon, 01/31/2022
Learn why automatic network mapping software might not give you the full picture of your network infrastructure and why you might still need some manual effort to keep your network healthy.
Datasheet
Zero Trust File Transfer
A powerful combination of Digital Guardian Secure Collaboration digital rights management and Fortra SFT solutions can give your organization more control and protection over sensitive data.
On-Demand Webinar
The Power of 24/7 Network Monitoring for Government Entities
Watch now to learn how you can ensure network health of your government entity with comprehensive network monitoring.
On-Demand Webinar
Email Security Best Practices: What to Look for in Email Security
By Nick Hogg
As it continues to be a primary corresponding channel for most organizations, email remains a central target for cyberattacks. In this webinar we breakdown what is needed for strong email security and the best practices for maintaining it.