Guide
Fortra's Complete Guide to Layered Offensive Security
Most organizations have a decent understanding of the types of defensive security tactics they need to employ to thwart cyberattacks. But offensive security techniques are just as important for detecting existing vulnerabilities that a threat actor has yet to discover and exploit.
Learn how to approach offensive security from the ground up, including the value of using a layered security...
News Article
ConsumerAffairs: Phishing Attempts are Growing Like Wildfire and Becoming Harder to Detect
John Wilson spoke to ConsumerAffairs about today’s phishing scam scene and provided tips to recognize legitimate emails from phishing attempts.
News Article
Forbes Advisor: Your Payment Cards Face A Growing Threat From Hackers
Safeguarding our credit and debit cards is something we all need to prioritize. In his latest Forbes Advisor article, John Wilson provides tips to keep your payment card details safe from fraud.
Blog
Database Transaction Log Management
Mon, 03/06/2017
Don't let database transaction logs weigh you down. Find out how to preserve data integrity and consume less disk space.
On-Demand Webinar
Deploy Robot Automation Dashboards with Sequel
Sequel Data Access isn’t just for compiling sales numbers or creating easy-to-read dashboards. It’s perfectly equipped to compile real-time performance indicators using a detailed operations history from your Robot products.
Track results from Robot Schedule, Robot Save, and Robot Console through automated, graphical dashboards, such as:
Number of Robot Schedule jobs run, completion statuses,...
On-Demand Webinar
Execute Sequel Scripts and Reports Automatically—with Robot Schedule
Learn how to turn your Sequel scripts and reports into an automated job stream.