Resources

News Article

How to Fortify Defenses Before Threats Materialize

Cyber threats are becoming more sophisticated and frequent, yet many organizations still face challenges due to limited resources. In ITSecurityWire, Fortra's Chris Reffkin highlights prioritizing remediation, closing the skills gap, and ongoing improvement.
Article

What is Intelligent Process Automation (IPA)?

Text In nearly all industries, artificial intelligence (AI) is held up as the vision for the future, with the promise to transform every aspect of business. But not all hype lives up to reality....
Article

What's New in Automate

That latest version of Automate has just been released. Find out more about what's new!
Article

The Difference Between OCR and IDP

Compare optical character recognition (OCR) and intelligent document processing (IDP) to learn when to use each to make structured and unstructured data more usable.
Article

The 2020 MFT Data Quadrant Report is Here

With a new year brings a new Info-Tech Managed File Transfer Data Quadrant Report. Find out about our ranking here.
Article

How GoAnywhere MFT Can Support You During COVID-19

Due to COVID-19, workforces are now more remote than ever. Unfortunately, this means sensitive data is likely not as safe as it should be. Secure MFT solutions are a proactive practice to implement.
Article

Getting Started with Website Automation

Set up a website automation task using Automate, robotic process automation (RPA) software from Fortra. Download a free trial of automation software and set up a web automation task today.
Article

A Case for PEDM

Learn how one company benefitted from incorporating Core Privileged Access Manager (BoKS), a PEDM solution, into their security portfolio.
Article

Three Signs You’ve Outgrown Password Vaulting

The article highlights the signs to look out for that it’s time to consider add another type of PAM solution—Privilege Elevation and Delegation Management (PEDM)—to help your organization as it continues to grow.
Article

The Lifecycle of a Security Event

This article seeks to illustrate the contrast between stagnant security events at an organization without a SIEM, and the distinct life cycle of events when a SIEM is streamlining security threats.