Article
Getting Started with Website Automation
Wed, 07/24/2019
Set up a website automation task using Automate, robotic process automation (RPA) software from Fortra. Download a free trial of automation software and set up a web automation task today.
On-Demand Webinar
PAM Without Passwords: Fast Tracking 2020 Compliance Regimes Without Add-Ons
Tue, 07/16/2019
Explore the changes in the way systems are deployed, and get a current view of Privileged Access Management in a world without passwords.
Blog
Choosing a Document Management Solution: 3 Questions to Ask
By Greg J. Schmidt on Tue, 07/09/2019
Make choosing a document management solution easier with these 3 questions you should ask when determining the best electronic document management system (EDMS) for your business.
Blog
How to Get Started with RPA
By John Grancarich on Fri, 07/05/2019
RPA is one of the fastest growing segments in the enterprise software space, and I want to tell you just a little bit about it. So, what is RPA? Well, at its simplest, RPA is software that automates human tasks.
Four characteristics for a good RPA project
Repetitive Tasks
Rule Based
High Volume
Prone to Human Error
You might be wondering, is this even...
Product Video
Watch a Demo of Event Manager
Separate the critical events from the noise with security information and event management.
Event Manager relays actionable intelligence that enables you to manage potential vulnerabilities proactively, protecting your business and your customers from devastating data breaches. Our software can become your eyes and ears by aggregating, normalizing, and interpreting the vast data feeds from your...
On-Demand Webinar
Powertech Event Manager Feature Tour
By Bob Erdman
Watch this in-depth feature tour to see how our SIEM solution, Powertech Event Manager, combats alert fatigue and translates data into actionable intelligence, allowing security teams to stay ahead of the curve.
Blog
Evaluating Security Information and Event Management: Eight Criteria for Choosing the Right SIEM Solution
By Bob Erdman on Tue, 04/16/2019
SIEMs differ widely in terms of features, so it’s important to evaluate your own environment to determine what your priorities are. Consider these eight criteria when looking at different options in order to find a solution that meets your specific needs.
Blog
What is Forms Management Software?
By Greg J. Schmidt on Tue, 04/16/2019
Find out how forms management differs from document management. You’ll get real-life examples of forms management in practice, plus tips for getting started.
Blog
How Do Digital Signatures Work?
Mon, 04/15/2019
Learn how digital signatures work and why you should be using them.
Blog
Five Malicious Insider Threat Indicators and How to Mitigate the Risk
By Bob Erdman on Fri, 04/05/2019
There are some telltale signs of malicious insider threats that can enable you to identify and rectify problems as quickly as possible using the strategies detailed.
Blog
Staying Ahead of the Curve: Implementing Privileged Access Management Solutions
Fri, 03/22/2019
Find out why Privileged Access Management (PAM) has become such a priority, and why your organization should stay ahead of the curve and adopt a PAM solution.
Product Video
Watch a Demo of Core Privileged Access Manager (BoKS)
Transform your server environment into one streamlined managed security domain.
Core Privileged Access Manager (BoKS) is an identity, account, and privileged access management platform that will simplify your organization’s ability to enforce security policies, and control access to critical systems and information. It can not only centralize security policy but will also make your Linux/UNIX...
Blog
How Does a Document Management System Work?
By Greg J. Schmidt on Fri, 03/15/2019
A document management system captures, stores, and distributes documents electronically. Learn how (and why you’ll benefit).
Blog
Cryptoviral Extortion: The Enduring Problem of Ransomware
By Bob Erdman on Wed, 03/13/2019
Learn about the long arms of ransomware, and how to protect your organization from its grasp.
Blog
Insider Threat Awareness: Preventing Attacks from Disgruntled Ex-Employees
By Bob Erdman on Wed, 02/06/2019
Learn about a recent example of the damage insider attacks can cause, and how your organization can prevent them.
Blog
Three Signs You've Outgrown Your Password Vault
Mon, 01/28/2019
Watch the vlog to find out the signs to look out for when it’s time to consider adding another type of PAM solution to help your organization as it continues to grow.