On-Demand Webinar
PAM Without Passwords: Fast Tracking 2020 Compliance Regimes Without Add-Ons
Tue, 07/16/2019
Explore the changes in the way systems are deployed, and get a current view of Privileged Access Management in a world without passwords.
On-Demand Webinar
How to Avoid IFS Security Mistakes
By Sandi Moore
In this webinar, IBM i security expert Sandi Moore teaches you how to correct IFS vulnerabilities that are often overlooked, including one that allows the IFS to spread malware throughout your environment.
On-Demand Webinar
The Good, the Bad, and the Ugly of Penetration Testing
Thu, 06/27/2019
Watch this webinar to learn what pen testing is, what you should expect from one, and how your organization can prepare.
Product Video
Watch a Demo of Event Manager
Separate the critical events from the noise with security information and event management.Event Manager relays actionable intelligence that enables you to manage potential vulnerabilities proactively, protecting your business and your customers from devastating data breaches. Our software can become your eyes and ears by aggregating, normalizing, and interpreting the vast data feeds from your...
Blog
Sophos Alternative for UNIX Centralized Management for Antivirus: Fortra is Here to Stay
By Bob Erdman on Tue, 06/11/2019
Find out how our solutions are growing and why we’re prioritizing UNIX and UNIX-like operating systems like Linux.
On-Demand Webinar
Capacity Planning for Your Peak Season
By Doug Mewmaw
Are you confident that your Power Systems servers are set up to handle your busiest season? Watch this webinar to learn tired-and-true methodology from the experts.
Article
Capacity Planning and the Culture of Proof
By Timothy Prickett Morgan on Fri, 05/31/2019
Capacity planning is one of the most important things that a company will do, and yet there are still many companies that do it on the back of the envelope. Read this article and learn how to do it right.
On-Demand Webinar
Powertech Event Manager Feature Tour
By Bob Erdman
Watch this in-depth feature tour to see how our SIEM solution, Powertech Event Manager, combats alert fatigue and translates data into actionable intelligence, allowing security teams to stay ahead of the curve.
Blog
Diversionary Tactics: The Use of Ransomware as Misdirection
By Bob Erdman on Fri, 05/10/2019
As long as the dark web exists, organizations must learn more about the threat they pose, and how to protect themselves.
Blog
Fortra is Headed to the Red Hat Summit
By Bob Erdman on Wed, 05/01/2019
It’s an important year as Red Hat celebrates its 15th summit, and we couldn’t be prouder to be a sponsor of this exciting event.
Blog
The Cybersecurity Dangers of the Dark Web and How to Protect Your Organization
By Bob Erdman on Thu, 04/25/2019
As long as the dark web exists, organizations must learn more about the threat they pose, and how to protect themselves.
On-Demand Webinar
Pro Tips for IBM i User Access Management
By Robin Tatam
Watch this webinar to learn how to increase user efficiency and improve your IBM i security posture at the same time.
Blog
Evaluating Security Information and Event Management: Eight Criteria for Choosing the Right SIEM Solution
By Bob Erdman on Tue, 04/16/2019
SIEMs differ widely in terms of features, so it’s important to evaluate your own environment to determine what your priorities are. Consider these eight criteria when looking at different options in order to find a solution that meets your specific needs.
Blog
Staying Ahead of the Curve: Implementing Privileged Access Management Solutions
Fri, 03/22/2019
Find out why Privileged Access Management (PAM) has become such a priority, and why your organization should stay ahead of the curve and adopt a PAM solution.
On-Demand Webinar
Responding to Ransomware: Steps to Take to Reduce Your Risk
By Bob Erdman
Join cybersecurity experts Bob Erdman, Security Product Manager at Fortra, and Holger Schulze, CEO and Founder of Cybersecurity Insiders, as they discuss the continuing challenge of ransomware.
Product Video
Watch a Demo of Core Privileged Access Manager (BoKS)
Transform your server environment into one streamlined managed security domain.
Core Privileged Access Manager (BoKS) is an identity, account, and privileged access management platform that will simplify your organization’s ability to enforce security policies, and control access to critical systems and information. It can not only centralize security policy but will also make your Linux/UNIX...