Blog
Going Phishing Isn't Seasonal–Get the Latest Results from 2023's Tournament
By Monica Delyani on Fri, 02/23/2024
Preview the latest global phishing benchmarking results and expert security awareness recommendations from Fortra's Terranova Security 2023 Gone Phishing Tournament.
Blog
How to Succeed at IBM i Security
Mon, 02/19/2024
Find out where security plans are running off course and how you can make a completely attainable plan to succeed.
Article
What is Intelligent Process Automation (IPA)?
By Ravi Dirckze on Tue, 01/09/2024
Text
In nearly all industries, artificial intelligence (AI) is held up as the vision for the future, with the promise to transform every aspect of business. But not all hype lives up to reality....
Blog
Generative AI in Cybersecurity
By Antonio Sanchez on Tue, 09/12/2023
Understand the challenges and benefits of generative AI on today’s cybersecurity landscape and learn how Fortra’s advanced cybersecurity solutions can help.
Blog
Ransomware Attacks: Why Email Is Still THE Most Common Delivery Method
Thu, 01/26/2023
Organizations face a growing danger from phishing and ransomware, which have been the most common forms of cybercrime in recent years. Most businesses have fallen victim to phishing or ransomware attacks at some point. Every business needs to act against the growing threat of phishing, the primary method through which ransomware and other malware are spread. On the bright side, organizations have...
Case Study
Portmade NV Saves Time and Labour Creating Customs Declarations with Automate
Learn how Portmade NV uses intelligent automation to capture, extract, and import data on customs declarations forms, saving the equivalent of 3.5 FTEs.
Article
The Difference Between OCR and IDP
Thu, 06/23/2022
Compare optical character recognition (OCR) and intelligent document processing (IDP) to learn when to use each to make structured and unstructured data more usable.
On-Demand Webinar
Clearswift Secure Email Gateway - Bridging the Security Gaps
By Alyn Hockey
Watch this video to see where you may be at risk for cyberattacks not currently protected from your existing email security.
On-Demand Webinar
Email Security Best Practices: What to Look for in Email Security
By Nick Hogg
As it continues to be a primary corresponding channel for most organizations, email remains a central target for cyberattacks. In this webinar we breakdown what is needed for strong email security and the best practices for maintaining it.
On-Demand Webinar
Transform Accounts Payable Processes with Intelligent Automation
By EJ Stanley
Whether your data is structured (from a spreadsheet, database, or portal), or unstructured (from emails, forms, and invoices), we’ll show you how an intelligent capture solution can transform your AP processes to save your team hours of manual work, cut back on errors, and save money by avoiding duplicate, late or overcharged invoices.
On-Demand Webinar
What the Latest Data Encryption Trends Mean for IBM i
By Sandi Moore
Join IBM i experts Sandi Moore and Chuck Losinski to examine why encryption has become such a hot topic in the cybersecurity community.
On-Demand Webinar
Intelligent Automation: The Smartest Way to Automate
Thu, 07/22/2021
Robotic process automation (RPA) is great for handling repetitive manual tasks, but what about tasks involving data that require more critical thinking? Turn to Intelligent Automation (IA). Discover how IA uses machine learning and other cutting-edge technology to take the pain out of data classification and analysis.
Whether your data is structured (from a spreadsheet, database, or portal),...
On-Demand Webinar
Fight Cyber Threats with IBM i Encryption
By Sandi Moore
Watch this webinar to learn how to quickly encrypt sensitive data on IBM i—and avert a data breach disaster.
On-Demand Webinar
Get More Control Over Your Data with Intelligent Automation
Fri, 04/30/2021
Learn how your organization can use intelligent automation to maintain control of critical information with more speed and accuracy in this on-demand webinar.
Blog
What Is NVMe?
By Randy Watson on Thu, 04/01/2021
NVMe is a communications interface plus high-performance protocol for accessing non-volatile memory. Learn more here.
On-Demand Webinar
5 Myths About Encryption on IBM i
By Sandi Moore
In this live webinar, IBM i security expert Sandi Moore breaks down some of the most common (and persistent!) myths that stop IT pros from implementing encryption on IBM i.
On-Demand Webinar
IBM i Data Encryption: What, Why, and How
By Sandi Moore
In this live webinar, IBM i security expert Sandi Moore breaks down some of the most common (and persistent!) myths that stop IT pros from implementing encryption on IBM i.
Article
Key Management and Strong Encryption For PCI DSS Compliance With Powertech Encryption for IBM i
By Bob Luebbe on Tue, 12/29/2020
PCI DSS now includes requirements for strong encryption of cardholder data. Learn how key management is an essential element of preventing unauthorized data access.