Blog
Modern Data Security for the Enterprise
Fri, 07/01/2022
In this guest blog, Christopher Wilder of Tag Cyber provides a high-level overview of how companies can layer security solutions to ensure their data is fully protected no matter where it resides, how it travels or is shared.
Video
Zero Trust File Transfer Bundle
Fri, 06/24/2022
What happens to files after they are securely transferred to their end recipients? Our Zero Trust File Transfer Bundle helps you maintain control and security for files wherever they travel. Watch the video for a quick overview of how the bundle can easily encrypt and control file access.
...
On-Demand Webinar
Building a Proactive Security Strategy
Advancing your vulnerability management programme may be a journey, but it is a journey well worth taking and cannot be done overnight. As your programme matures the better your organisation can avoid costly attacks and breaches that may harm your business and reputation.Learn how a proactive cybersecurity program can be a game changer for an organisation's success through continuously assessing...
On-Demand Webinar
Streamlining the Exchange of Secure Data
Discover tactics for simplified data management in a world of huge data volumes
Blog
Secure Data Sharing Solves These 3 Cybersecurity Challenges
Thu, 03/10/2022
As more of your organization's data is shared, protecting it gets more difficult. Securing your data-sharing capabilities solves these 3 challenges.
On-Demand Webinar
How to Protect Your Data with Layered Security
By Nick Hogg
Does your organization need to better protect data across its entire lifecycle, from when it’s created to when it leaves the organization? Learn how to protect your data with layered security.
Datasheet
Zero Trust File Transfer
A powerful combination of Digital Guardian Secure Collaboration digital rights management and Fortra SFT solutions can give your organization more control and protection over sensitive data.
Blog
What is the Data Security Lifecycle?
By Brian Pick on Tue, 01/18/2022
What is the data security lifecycle, and how does it impact your business? Discover the stages of the data security lifecycle, and how end-to-end encryption can help with your data protection.
Datasheet
SFT Threat Protection
Fortra offers seamless threat protection within our secure file transfer solutions to ensure every file transfer crossing your MFT platform has been inspected and cleared to continue.
Blog
Data-Centric Security: What is it and Why Does it Matter?
By Steph Charbonneau on Mon, 11/29/2021
A data-centric security architecture takes data security a vital step further to protect the actual data from ever-increasing data breach threats.
Blog
Top 6 Data Security Challenges and How to Address Them
By Scott Messick on Tue, 11/16/2021
Addressing an organization’s data security challenges requires some heavy lifting – no question about it. Rather than cobble together a piecemeal solution strategy, rely on trusted, integrated, and scalable data security solutions.
Blog
Data Privacy vs. Data Security: What’s the Difference?
Tue, 11/09/2021
Learn the Difference between Data Privacy and Data Security. Data privacy can’t happen without layered Data Security measures applied throughout the sensitive Data’s lifecycle.
Blog
A Beginners Guide to Protecting Your Data
By Steph Charbonneau on Wed, 11/03/2021
In this blog, Steph Charbonneau, Senior Director of Industry Strategy at Fortra, talks you through some of the most valuable aspects of data protection and how to measure success of your organizational programs.
Blog
Corporate Data Security Policy: What, Why, and How
By Steph Charbonneau on Tue, 10/12/2021
Creating a corporate data security policy is a “must” in today’s evolving cybersecurity environment. Here’s a few tips on best practices.
Case Study
Fortra MFT and Secure ICAP Gateway Keep Government Services Rolling Securely and Remotely
A North American government agency with more than 1,500 employees needed to give citizens better ways to perform civic data sharing remotely due to the COVID-19 pandemic.
Guide
A Single Pane of Glass for Multi-Platform Systems Management
Bring disparate systems, platforms, devices, and applications together in one place and on one screen to make systems management easier and create a consistent and common methodology to varying departments within the IT infrastructure. Combining Halcyon’s Enterprise Console, Operations Center Suite, and Network Server Suite can provide a single pane of glass for managing your IT environment. See how here.
Article
Three Essential Steps to Successful Performance Management
Tue, 08/24/2021
Performance management is often made to look cumbersome and complex, but we’ve distilled the process down to three essential steps.
Blog
Open PGP for IBM i (iSeries)
Tue, 08/10/2021
GoAnywhere MFT for IBM i (iSeries) includes native commands for performing PGP encryption and decryption functions directly on the IBM i (formerly known as and often still called AS/400). These commands can be placed in CL programs, the job scheduler or run from IBM i menus.
With GoAnywhere MFT, files can additionally be digitally signed with a private key on the IBM i. In turn, you can verify...