Blog
Data Classification and Data Loss Prevention (DLP): A Comprehensive Data Protection Strategy
Tue, 05/23/2023
Data is the world’s currency and has been for some time. Protecting data should be at the top of the list for organizations of any size, and the heart of any security strategy. Think about it: the purpose of any firewall, email solution, compliance regulation, or XDR platform is to keep data safe. Why not cut to the heart of it with a dedicated Data Loss Prevention (DLP) solution? And why not...
Guide
Fortra's Complete Guide to Layered Offensive Security
Most organizations have a decent understanding of the types of defensive security tactics they need to employ to thwart cyberattacks. But offensive security techniques are just as important for detecting existing vulnerabilities that a threat actor has yet to discover and exploit.
Learn how to approach offensive security from the ground up, including the value of using a layered security...
Datasheet
How Fortra Supports the Zero Trust Journey
What Zero Trust means, tips for getting started, and how Fortra solutions support your Zero Trust security journey.
On-Demand Webinar
Don’t Let DLP and Compliance Programs Fail – Here’s How!
In this webinar, we dive into common factors causing DLP and compliance programs to struggle, share top methods to address those factors and improve your current program, and advise on how to stay ahead of the ever-evolving threat landscape.
On-Demand Webinar
A Spotlight on Cybersecurity: 2022 Trends and 2023 Predictions
By Bob Erdman
Watch this recorded session where experts from across the Fortra cybersecurity spectrum look back on 2022, analyzing cybersecurity trends that promise to continue into 2023 and beyond.
On-Demand Webinar
Infrastructure Protection for Proactive Security
By Nick Hogg
Infrastructure Protection for Proactive Security
Today’s threat landscape is moving so rapidly that it’s essential to anticipate attacks and adapt your cybersecurity strategy to avoid becoming the next security breach. Such devastating breaches can cripple an organization, slowing or halting day-to-day operations and doing significant harm to a business’ reputation.
Join our infrastructure...
Blog
The Challenges and Opportunities of the Modern CISO: Chris Reffkin
Fri, 11/18/2022
As CISO for Fortra, Chris Reffkin spends a great deal of time thinking about security and what the industry can do to get more efficient and effective with the right focus.
Case Study
SFT Threat Protection Helps Credit Card Company Securely Transfer Files
Mercury® Financial needed a way to protect data in transit to stay secure and compliant. The added data security and peace of mind through the use of Clearswift Secure ICAP Gateway paired with the GoAnywhere MFT solution became the perfect pairing for the credit card company.
Blog
Evolving the Brand From HelpSystems to Fortra: Mike Devine
Wed, 11/02/2022
Over the past year, the chief marketing officer at Fortra has led the company’s effort to build upon its HelpSystems roots and redefine its role as a cybersecurity beacon for threat-weary security professionals. Learn about the monumental effort required to update the brand and why there’s a groundswell of excitement about what it means for the future.
Blog
Industry Leaders in Security Awareness Training: What You Should Know About Terranova Security
Mon, 10/03/2022
Terranova Security provides security awareness training that helps organizations build and grow security-aware cultures worldwide. This end goal is accomplished by constructing training programs that leverage our industry-leading course content, which is also supported by real-world phishing simulations.
Blog
Insider Threat Awareness Month: What You Need to Know
Fri, 09/30/2022
So much time, effort, and resources are spent defending the perimeter-less network from outside attacks that a key risk factor is often overlooked: the insider threat.
Blog
Security Solutions for Managed File Transfer
Tue, 08/30/2022
The next in our guest blog series from Tag Cyber looks the advantages of MFT and what organizations must consider when selecting a software provider.
Blog
Source Authentication for Email
Mon, 07/04/2022
This guest blog from Dr Edward Amoroso, Tag Cyber provides a high-level overview of modern advances in email security using source authentication and how the Fortra cybersecurity portfolio supports this important method for reducing information risk in enterprise.
Blog
Modern Data Security for the Enterprise
Fri, 07/01/2022
In this guest blog, Christopher Wilder of Tag Cyber provides a high-level overview of how companies can layer security solutions to ensure their data is fully protected no matter where it resides, how it travels or is shared.
Video
Zero Trust File Transfer Bundle
Fri, 06/24/2022
What happens to files after they are securely transferred to their end recipients? Our Zero Trust File Transfer Bundle helps you maintain control and security for files wherever they travel. Watch the video for a quick overview of how the bundle can easily encrypt and control file access.
...
Blog
Cybersecurity Made Easy: Alert Logic Brings Comprehensive MDR Coverage to Fortra
Thu, 06/16/2022
The unrivaled security experts add their white-glove, managed detection and response approach to a robust suite of solutions. Onkar Birk explains why this is a very good thing.
Blog
Building Cybersecurity Resilience in Financial Services
Wed, 05/25/2022
Learn how financial services CISOs can maintain cybersecurity resilience in a complex, highly regulated environment with sophisticated threats.
Blog
Missed CYBERUK 2022? Highlights from NCSC’s Main Event
By David Zacharias on Fri, 05/20/2022
Fortra VP of Global IT, David Zacharias looks at some of the takeaways including the threat of ransomware, supply chain security, and more.
Blog
4 Ways You Can Use Your Digital Rights Management Tool
Thu, 05/19/2022
Digital Rights Management tools can help give your organization the highest level of control and visibility possible over its data. Here are 4 ways to use it.