Guide
Fortra's Complete Guide to Layered Offensive Security
Most organizations have a decent understanding of the types of defensive security tactics they need to employ to thwart cyberattacks. But offensive security techniques are just as important for detecting existing vulnerabilities that a threat actor has yet to discover and exploit. Learn how to approach offensive security from the ground up, including the value of using a layered security approach...
Datasheet
How Fortra Supports the Zero Trust Journey
What Zero Trust means, tips for getting started, and how Fortra solutions support your Zero Trust security journey.
On-Demand Webinar
Fortra’s Vulnerability Management Solutions for Proactive Security
By Nick Hogg
Cybersecurity needs have grown well beyond antiviruses and firewalls. Proactive, offensive security measures are crucial to help avoid the damaging effects of an attack, including customer and credibility loss, compliance penalties, and expensive corrective security actions. Fortra Vulnerability Manager, formerly Frontline VM, and beSTORM Dynamic Application Black Box Fuzzer can save your team...
News Article
Brakeing Down Security Podcast with Mieng Lim: Ransomware Best Practices
Vice President of Product Management, Mieng Lim joins the Brakeing Down Security podcast to discuss how to outsmart ransomware as a service (RaaS), looking in detail at strategies to implement before, during and after a ransomware attack.
Datasheet
Fortra's Security & Automation Portfolios
Today’s IT environment is filled with the challenges of securing infrastructure despite lean resources and a mounting list of projects. Fortra strives to be your trusted partner as you simplify your strategy, consolidate your technology stack, and harden security across all aspects of your environment. Fortra offers a comprehensive approach to security and automation that reduces the costly...
Press Release
Ransomware Remains a Threat 30 Years On
At the ripe old age or 30, ransomware is nothing new. However, attack methods have evolved and so must our defenses.
News Article
Cybersecurity Interview with Mieng Lim
In Unite.AI’s cybersecurity interview, Mieng Lim, VP Product Management at Digital Defense by Fortra, talks about her career at Digital Defense and explains why vulnerability management is fundamental for today’s connected organization.
Press Release
Identifying Threats in the Network with Digital Defense’s Frontline.Cloud Solution
The onset of the pandemic and subsequent boom in remote working forced many organizations to accelerate their digital transformation programs. But in the rush to migrate to the cloud and against a backdrop of evolving cyber threats, are organizations leaving themselves vulnerable to cyber-attacks?
Press Release
Savvy Cyber Criminals Using Employees' Social Media Habits as a Weapon Against Companies
How do cyber criminals use the social media habits of employees to infiltrate organizations? Find out in this report.
Press Release
Despite the headlines, there's no need to feel hopeless about cybersecurity
What lessons are to be learned from the many cyber-attacks we hear about in the news? The advice from Mark Bell, Managing Director, Digital Defense by Fortra, is that companies shouldn’t lose hope.
Article
How To Maintain Your Data Integrity
By Robin Tatam on Tue, 03/21/2017
File Integrity Monitoring (FIM) helps ensure that your critical and sensitive data is viewed and changed only by authorized personnel through approved channels. Candidates for FIM include application files containing sensitive data, such as personnel or financial data, and server configuration files.