On-Demand Webinar
Your Side of the AWS Shared Security Model
Tue, 11/21/2023
Discover the breadth of solutions that Fortra offers to help you with your side of the AWS shared security model.
On-Demand Webinar
Strike First: Strengthen Your IBM i Security Against Ransomware
By Sandi Moore
Don’t give cybercriminals the upper hand— watch this webinar to learn how to strengthen your IBM i security against ransomware
Video
Zero Trust File Transfer Bundle
Fri, 06/24/2022
What happens to files after they are securely transferred to their end recipients? Our Zero Trust File Transfer Bundle helps you maintain control and security for files wherever they travel. Watch the video for a quick overview of how the bundle can easily encrypt and control file access.
On-Demand Webinar
Combatting Ransomware on IBM i
By Sandi Moore
Join this webinar to learn how to create an effective strategy for ransomware prevention.
On-Demand Webinar
Streamlining the Exchange of Secure Data
Discover tactics for simplified data management in a world of huge data volumes
On-Demand Webinar
How to Protect Your Data with Layered Security
By Nick Hogg
Does your organization need to better protect data across its entire lifecycle, from when it’s created to when it leaves the organization? Learn how to protect your data with layered security.
On-Demand Webinar
Simple Strategies for Malware Defense on IBM i - presented with COMMON
By Robin Tatam
With today's advanced malware and ransomware threats, malicious programs can cause a massive business disruption. Not all organizations can recover from attack. To avoid corrupted data and downtime, you need to consider a comprehensive approach to malware defense for Power Systems servers running IBM i, AIX, and Linux. Watch this webinar to learn about advanced malware threats and simple...
On-Demand Webinar
Take Mortgage Processing to the Next Level with Intelligent Automation
By Erik Fisher
Watch this on-demand webinar to learn how you can streamline the loan origination process, intelligently automate interactions between applications, relieve overwhelmed staff, and provide a higher-quality mortgage lending experience.
On-Demand Webinar
Data Security Challenges: How Our Suite Helps
By Nick Hogg
Data security is hard. We’re not going to sugarcoat it. In this 60-minute webinar we'll: Discuss the best practices for protecting your data throughout its lifecycle Introduce our full data security suite, which provides protection from creation to publication, and sharing of your sensitive data. Explore some common use cases that our suite helps address And more! If you are curious about our...
On-Demand Webinar
Streamline the Day-to-Day with IT Automation
Thu, 01/14/2021
In this on-demand webinar, the automation experts from Fortra and CM First to explore ways to leverage IT automation tools in your most critical business projects—including those on IBM I, including those generated with CA 2E(Synon) and CA Plex.
On-Demand Webinar
How to Protect IBM i from the New Malware Threats of 2020
By Sandi Moore
IBM i has never been immune to malware—but threats to businesses are greater than ever. Watch this webinar to learn how to keep your systems up and running.
On-Demand Webinar
Replacing FTP Scripts with Managed File Transfer
Many companies are still using custom scripts or manual processes to exchange information with customers, partners or other locations. And they do it despite the extra time and headache required to maintain these methods – and the lack of security these methods provide. If this sounds familiar, join us as our cybersecurity experts explain why using FTP and other insecure, manual methods is a...
On-Demand Webinar
Secure and Automate Your File Transfers for IBM i
By Heath Kath
Are you using legacy programs or unsecured processes to transfer files on the IBM i? Watch this webinar to learn how to streamline, secure, and audit your file transfers.
On-Demand Webinar
Why Your CRM System Needs RPA
By Pat Cameron
Watch our on-demand webinar to learn how you can use RPA to power your CRM system with the most up-to-date data from your critical business applications.
Guide
Free eBook: Secure File Transfer Project Examples
IT and cybersecurity teams frequently envision, create, and implement innovative uses for their secure file transfer software. These unique applications allow them to solve critical industry and organizational needs without using a secondary solution or tool! In this informational ebook , you'll discover countless ways your peers use managed file transfer (MFT) in their organizations. We share...
On-Demand Webinar
The Keys to Securing Data in Motion
In this third-party webinar from InfoSecurity Magazine, you'll explore the five keys to securing sensitive data in motion—compliance, collaboration, encryption, secure email, and automation—and how to implement them in your organization.
Guide
The Ultimate Guide to Investing in Secure File Transfer Software
We know finding the right file transfer solution for your organization isn’t an easy process. There are dozens of details to consider - from industry and compliance concerns, to critical cybersecurity needs; choosing a vendor can be complex. In this ultimate buyer’s guide, you’ll find the information you need to successfully evaluate different managed file transfer solutions. We cover: The...
Guide
6 Users to Put on Your Security Watch List
Most IT teams have processes in place to deal with security threats like malware, spam emails, and brute-force attacks. But while these processes provide relief of mind and protection from external data breaches, it’s not always outside hackers you have to worry about. Sometimes, security threats come from the inside. In this ebook , you'll learn about eight user types we think you should put on...