Blog
How Do You Go Paperless? Tips to Help You Get Started
By Greg J. Schmidt on Thu, 04/25/2019
Find out. And if you aren’t there yet, get tips for actually going paperless.
Blog
What is Document Capture Automation and What are the Benefits?
By Richard Schoen on Fri, 04/19/2019
Learn about document capture—and why you should be automating it.
Blog
Evaluating Security Information and Event Management: Eight Criteria for Choosing the Right SIEM Solution
By Bob Erdman on Tue, 04/16/2019
SIEMs differ widely in terms of features, so it’s important to evaluate your own environment to determine what your priorities are. Consider these eight criteria when looking at different options in order to find a solution that meets your specific needs.
Blog
Five Malicious Insider Threat Indicators and How to Mitigate the Risk
By Bob Erdman on Fri, 04/05/2019
There are some telltale signs of malicious insider threats that can enable you to identify and rectify problems as quickly as possible using the strategies detailed.
Blog
How Does a Document Management System Work?
By Greg J. Schmidt on Fri, 03/15/2019
A document management system captures, stores, and distributes documents electronically. Learn how (and why you’ll benefit).
Blog
Cryptoviral Extortion: The Enduring Problem of Ransomware
By Bob Erdman on Wed, 03/13/2019
Learn about the long arms of ransomware, and how to protect your organization from its grasp.
Blog
Insider Threat Awareness: Preventing Attacks from Disgruntled Ex-Employees
By Bob Erdman on Wed, 02/06/2019
Learn about a recent example of the damage insider attacks can cause, and how your organization can prevent them.
Blog
5 Quick Wins for Document Management this Year
By Richard Schoen on Tue, 01/15/2019
Do you need document management in 2019? Discover five quick wins that make it easy to get started.
Blog
Enterprise Security: Best Practices and Tips
By Bob Erdman on Mon, 12/03/2018
How much security is really necessary to protect yourself? Read on for tips on how to best protect your organization and avoid becoming a headline.
On-Demand Webinar
Why Your CRM System Needs RPA
By Pat Cameron
Watch our on-demand webinar to learn how you can use RPA to power your CRM system with the most up-to-date data from your critical business applications.
Blog
The Shared Responsibility of Cloud Security
By Bob Erdman on Fri, 10/26/2018
The agreement that cloud security is a shared responsibility between cloud providers and cloud users has now firmly taken hold. How those responsibilities shake out, however, is an ongoing conversation.
Blog
How SIEM Protects Cloud Servers
Tue, 10/16/2018
Security information and event management (SIEM) applications help IT professionals oversee their vast technology infrastructures, including cloud repositories. SIEM applications aggregate data from many different types of systems to present a clear view of the actionable security tasks your team must address to protect your business.
On-Demand Webinar
Top Reasons to Move from Syslog to a SIEM
By Bob Erdman
Join cybersecurity expert Bob Erdman, Security Product Manager at Fortra as he discusses how a SIEM can make a world of difference when it comes to efficiently managing security events.
On-Demand Webinar
How to Integrate GoAnywhere with Document Management Solutions
With GoAnywhere's Webdocs Cloud Connector, you can direct your files from different sources into Webdocs, then set up workflows for order processing, invoice approval, employee onboarding, and more!
Guide
Choosing the Right SIEM Solution to Face Today's Security Challenges
What Makes a SIEM Solution Effective?
SIEM solutions have become an essential part of many organization's security toolkits. SIEM technology gives organizations helpful insights into potential security threats across critical business networks, streamlines compliance reporting, improves efficiencies, and provides peace of mind.
Given the immense benefits and an increase in the number of SIEM...
Blog
SAO vs. SIEM: Not Enemies, But a Security Defending Duo
Thu, 08/16/2018
As both SAOs and SIEMs grow in popularity, it's clear that these two pieces of software should not be viewed as competitors, but rather as collaborative partners in the battle against security breaches.
Blog
A SIEM that Speaks IBM i
Tue, 07/03/2018
Organizations of all sizes can benefit from capturing, logging, and responding to security events in real time, but one important operating system is often overlooked: IBM i.