Resources

Blog

Evolving the Brand From HelpSystems to Fortra: Mike Devine

Over the past year, the chief marketing officer at Fortra has led the company’s effort to build upon its HelpSystems roots and redefine its role as a cybersecurity beacon for threat-weary security professionals. Learn about the monumental effort required to update the brand and why there’s a groundswell of excitement about what it means for the future.
Blog

What's It Like to Be in Development at Fortra? 

Fortra has a dedicated global development team of creative problem solvers who excel at collaboration. Hear from several of our software engineers why they love their jobs and how they spend their days.
Blog

From Receptionist to Senior Scrum Master: Dana Halvorson

Dana Halvorson supported grieving families as a funeral director before becoming a Fortra  receptionist in 1999. Now a senior scrum master, she has a unique perspective on the importance of empathy, continued learning, and having fun at work.  
Blog

From Intern to Email Marketing Specialist: Paola R.

Paola’s Fortra journey started with an online internship posting. Today, the email marketing specialist loves using her native Spanish at work and remembers the pivotal project where everything clicked. What’s your favorite internship memory?
On-Demand Webinar

Meet Fortra: Your Cybersecurity Ally

This session is a must for those eager to understand how the Fortra team of expert problem solvers is ready to find answers to your organization’s toughest problems, and how we remain committed to being a people-first company ready to collaborate with our customers.  
Blog

What's It Like to Be in Marketing at Fortra?

The Fortra Marketing team is known for its commitment to producing great content with great people. Hear from some of our amazing marketing leads and specialists about their day-to-day and why they love what they do.
Blog

From Intern to Software Engineer I: Megan O.

As her software engineering internship wrapped up in 2021, Megan knew Fortra was where she wanted to be. Hear how she got connected with the company and why she’s passionate about the culture. Tell us about your internship experience!
Datasheet

Offensive Security - Elite Bundle

Fortra Vulnerability Management (formerly Frontline VM™), Core Impact, and Cobalt Strike are three powerful security tools that evaluate the security of their environments in order to better identify security vulnerabilities and predict their potential impact. Though they all share the same goal of proactively assessing risk, they are still distinct tools with distinguishing features that...
Datasheet

Offensive Security - Essentials Bundle

Fortra Vulnerability Management (formerly Frontline VM™) and Core Impact are two robust security tools designed to evaluate business critical networks and infrastructure for security vulnerabilities.Though both tools work to identify and prioritize security weaknesses, each offers unique strengths and distinct features. Fortra VM is a SaaS vulnerability management solution, mostly used for...
Datasheet

Offensive Security - Advanced Bundle

Core Impact and Cobalt Strike are two powerful tools that help organizations assess the security of their environments. Though they share the same goal of providing insights to help bolster security efforts, they are otherwise distinct tools with unique features. Core Impact is a penetration testing tool, primarily used for exploitation and lateral movements in various environments. Cobalt Strike...
Blog

What is a Vulnerability Management Program?

The Equifax breach was caused by a vulnerability. The WannaCry virus exploited a vulnerability. The stories don’t seem to end but it seems like no one is talking about how to solve this problem which is: start a vulnerability management program. “Manage the vulnerabilities in my network? Sounds easy” well, not so much, but not so difficult that you shouldn’t be spending time and resources on it....
Blog

6 Ways to Defend Yourself Against Password Attacks

Ever since Ali Baba uttered “open sesame,” thieves have been using stolen passwords to access hidden riches. In the digital world, password attacks have been and continue to be a common way for threat actors to gain access to an organization’s treasure trove of data. No matter how many emails we get from IT explaining what makes a good password, many of us still use the same basic password in...