Blog
What is the Fortra Value Proposition for Cybersecurity?
Tue, 03/29/2022
In this guest blog, Dr Ed Amoroso, CEO, Tag Cyber, provides a high-level overview of the Fortra cybersecurity portfolio value proposition based on a mapping of its component solution offerings to the NIST Cybersecurity Framework (CSF) phases.
On-Demand Webinar
6 Hidden Gems in Robot Console
Watch this webinar and learn 6 how-to tips to use the Robot Console software to maximize IBM i message management.
Blog
Keeping Cloud Security Top Priority in Your Digital Transformation
By Chris Spargen on Tue, 03/15/2022
Digital transformation is quickly becoming a must for many organizations, and cloud security is perhaps the most fundamental component in its success.
Blog
Solving Big Cybersecurity Challenges Needs Big Thinking. Fortra's John Grancarich is Ready.
Fri, 03/11/2022
Tech visionary John Grancarich discusses today’s cybersecurity challenges and Fortra’ innovative plans for helping customers succeed.
Blog
Secure Data Sharing Solves These 3 Cybersecurity Challenges
Thu, 03/10/2022
As more of your organization's data is shared, protecting it gets more difficult. Securing your data-sharing capabilities solves these 3 challenges.
Article
What is SNMP, and How Does It Work?
By Kevin Jackson on Thu, 03/03/2022
SNMP is one of the most widely accepted protocols for network monitoring. Here’s a quick summary of what is SNMP, how it works, and why it matters to network professionals.
On-Demand Webinar
Performance Navigator Training: Automated Performance Reporting
Watch this webinar and learn how to automate daily, weekly, and monthly performance reporting using the Performance Navigator software from Fortra.
Blog
Key Considerations in The Ever-Evolving Data Privacy Landscape – The Optimal Technology Mix
Wed, 02/16/2022
Enza Iannopollo, principal analyst at Forrester, recently answered some of the pressing questions we’ve received when it comes to data security, and more importantly building the foundations of your data security strategy. Today we’re looking at what Enza had to say about the prime mix of technologies when it comes to data protection.
Q: What mix of technologies do you see as being the optimum...
Blog
Data Security Best Practices Every CISO Should Know
By Scott Messick on Tue, 02/15/2022
Shouldering data security as a CISO is a hefty job. Adopting a few of the best practices to surround data can make it a lot easier.
Blog
Key Considerations in The Ever-Evolving Data Privacy Landscape – Understanding GDPR
Mon, 02/14/2022
Blog
10 Best Tips to Improve Your Data Security Plan
Thu, 02/10/2022
Follow these 10 tips to help create a comprehensive data security plan for your organization or improve your existing plan.
Blog
How and Why to Implement Zero Trust Architecture via Layered Security
Wed, 02/02/2022
Perimeter-based security is out, Zero Trust architecture is in. Learn what Zero Trust means, why your organization should use it, and how Fortra can help.
Blog
Automatic vs. Manual Network Mapping: Finding the Right Balance
By Kevin Jackson on Mon, 01/31/2022
Learn why automatic network mapping software might not give you the full picture of your network infrastructure and why you might still need some manual effort to keep your network healthy.
Blog
Your 5-Minute CUI Training Study Guide
Fri, 01/28/2022
Use our Fortra CUI Training study guide to help you understand what CUI is, who creates and complies with it, and to ultimately pass your training course.
Datasheet
Zero Trust File Transfer
A powerful combination of Digital Guardian Secure Collaboration digital rights management and Fortra SFT solutions can give your organization more control and protection over sensitive data.