Blog
What Is SIEM?
Fri, 12/20/2019
SIEM (security information and event management) software provides insights into potential security threats through data normalization and threat prioritization, giving IT professionals an effective method of automating processes and centralizing security management in a way that helps them simplify the difficult task of protecting sensitive data.
On-Demand Webinar
Cybersecurity Trends in 2019 and Predictions for 2020
By Bob Erdman
Count down the top cybersecurity trends of 2019 and hear predictions for what’s to come in 2020. 2020 looks to be just as exciting as 2019, with ample opportunities for organizations to improve their cybersecurity stance.
Blog
Monitoring Application Security with SIEM
By Bob Erdman on Wed, 11/27/2019
Learn about the large variety of information a SIEM can consolidate, becoming your organization’s primary security monitoring tool.
Article
When Should You Replace Your Free SIEM Tools?
By Bob Erdman on Wed, 11/06/2019
Free SIEM tools often come with limitations that will lead security teams to consider commercial options. How do you know when it’s time to upgrade?
On-Demand Webinar
How FRS Integrated Webdocs to Transform Their Business
Check out this important discussion on how integrating Webdocs within your current processes can truly transform your business.
On-Demand Webinar
How to Take a Planned Approach to Document and Forms Management for AP
Watch our on-demand webinar to learn the smartest way to implement document and forms management solutions for Accounts Payable (AP).
Blog
You Can’t Protect What You Can’t See: Improving Cybersecurity with Monitoring Solutions
By Bob Erdman on Mon, 10/07/2019
Find out how SIEMs with threat escalation, centralization, diverse integrations, and collaboration with network monitoring tools can help clear the line of sight.
On-Demand Webinar
How to Mitigate Cyber Risk with Security Information and Event Management (SIEM)
By Bob Erdman
In this webinar, cybersecurity experts Bob Erdman, Security Product Manager at Fortra, and Holger Schulze, CEO and Founder of Cybersecurity Insiders will discuss how to mitigate cyber risk through SIEM.
On-Demand Webinar
How Organizations are Responding to the Continuing Challenge of Ransomware
By Bob Erdman
In this webinar, cybersecurity experts discuss ransomware motivations and perpetrators of attacks, who is at the highest risk, and the most effective solutions to this pervasive problem to help you better understand ransomware and reduce the large threat it poses.
Blog
Silencing the Bells: How a SIEM Can Prevent Alert Fatigue
By Bob Erdman on Tue, 07/30/2019
Find out how Security Information and Event Management (SIEM) solutions can streamline security and prevent alert fatigue.
Blog
Choosing a Document Management Solution: 3 Questions to Ask
By Greg J. Schmidt on Tue, 07/09/2019
Make choosing a document management solution easier with these 3 questions you should ask when determining the best electronic document management system (EDMS) for your business.
Product Video
Watch a Demo of Event Manager
Separate the critical events from the noise with security information and event management.Event Manager relays actionable intelligence that enables you to manage potential vulnerabilities proactively, protecting your business and your customers from devastating data breaches. Our software can become your eyes and ears by aggregating, normalizing, and interpreting the vast data feeds from your...
On-Demand Webinar
Powertech Event Manager Feature Tour
By Bob Erdman
Watch this in-depth feature tour to see how our SIEM solution, Powertech Event Manager, combats alert fatigue and translates data into actionable intelligence, allowing security teams to stay ahead of the curve.
Blog
Evaluating Security Information and Event Management: Eight Criteria for Choosing the Right SIEM Solution
By Bob Erdman on Tue, 04/16/2019
SIEMs differ widely in terms of features, so it’s important to evaluate your own environment to determine what your priorities are. Consider these eight criteria when looking at different options in order to find a solution that meets your specific needs.
Blog
What is Forms Management Software?
By Greg J. Schmidt on Tue, 04/16/2019
Find out how forms management differs from document management. You’ll get real-life examples of forms management in practice, plus tips for getting started.
Blog
How Do Digital Signatures Work?
Mon, 04/15/2019
Learn how digital signatures work and why you should be using them.
Blog
Five Malicious Insider Threat Indicators and How to Mitigate the Risk
By Bob Erdman on Fri, 04/05/2019
There are some telltale signs of malicious insider threats that can enable you to identify and rectify problems as quickly as possible using the strategies detailed.