Resources

Blog

Using Reviews to Choose RPA Software

Analyze RPA reviews with a more critical eye to better understand how a robotic process automation vendor can meet your organization’s needs.
Blog

Windows DWM Core Library Elevation of Privilege Vulnerability (CVE-2024-30051)

In this blog post, I will explain a vulnerability in the Microsoft Windows Desktop Windows Manager (DWM) Core library that I analyzed when the exploit for Core Impact was being developed. This vulnerability allows an unprivileged attacker to execute code as a DWM user with Integrity System privileges (CVE-2024-30051).Since there was not enough public information at the time to develop the exploit,...
Blog

Introduction to Advanced Web UI Automation

Learn web browser automation best practices using Fortra's Automate. Easily build out automations for web processes involving browsers and portals to eliminate manual tasks.
On-Demand Webinar

Elevating Cloud Security: MFT Best Practices & Insights

Whether your files are located in the public cloud, private cloud, or within a hybrid environment, managing file transfers securely is essential for businesses today. GoAnywhere Managed File Transfer (MFT) solution provides the security and control needed to move data confidently between systems, locations, users, and trading partners.In this webinar, we will delve into the design and architecture...
On-Demand Webinar

How Fortra Enables Your Zero Trust Strategy

The concept of using a Zero Trust architecture in cybersecurity has been around for more than a decade, and its fundamental principle of “never trust, always verify” sounds straightforward enough. However, there’s a lot of noise around Zero Trust, often generated by vendors promising that their solution is that magic silver bullet to all of your Zero Trust problems. This can muddy the waters and...
Blog

Top 8 Benefits of Network Monitoring

Lack of network visibility makes life hard for IT. Network monitoring helps you stay ahead of outages with real-time visibility into your network health.
On-Demand Webinar

Bringing Security to the Cloud

Learn key strategies and elements for effective cloud security in this Alert Logic webinar with Nicholas Laing, Solutions Engineer at Fortra. In this webinar, we cover: Challenges of cloud security Drivers for cloud adoption Critical questions for cloud strategy Cloud adoption phases Security considerations Architectural approaches Security responsibilities and cloud frameworks Key cloud...
Blog

RPA vs. API: Differences and Use Cases

At its very core, the goal of automation is to take routine, repetitive tasks off the hands of time-strapped employees. Robotic process automation (RPA) solutions are designed to do this, but some lack an important feature that can make simplifying your tasks much harder than it needs to be—API connectivity. In this blog, we’re going to take you through the definition of both RPA and APIs, share...
On-Demand Webinar

Boost Your Cloud Security with MFT

Whether your files reside in the public cloud, private cloud, or within a hybrid environment, GoAnywhere Managed File Transfer (MFT) delivers the security and control you need to move data confidently between systems, locations, users, and trading partners. In this video, Ray Sutton, Solutions Engineer, and Tim Shaw, Solutions Engineer, Fortra, will provide a high-level look at GoAnywhere MFT’s...
On-Demand Webinar

How to Transfer Data Securely When Moving to The Cloud

As more and more businesses move to a multi-cloud strategy, transferring data between cloud platforms has become a crucial aspect of the migration process, and due to the numbers of platforms and interfaces companies work with today, security, auditing, and maintainability of data transfers is growing ever more difficult.As a result of all the added complexity, operational expenses and security...