Resources

Live Webinar
The transition period from PCI DSS 3.2.1 to 4.0 ended on March 31, 2024, a date toward which many organizations have dedicated countless hours of preparation. Looking back on that time, do you know where your compliance efforts stand now? Join PCI experts Steven Sletten and Jeff Hall for the live webinar PCI 4.0 Is Here: Your Guide to Navigating Compliance Success to learn how to effectively...
Live Webinar
Jun
11

IBM i Performance Week

Robot Monitor and Performance Navigator are powerhouses when it comes to performance monitoring and management. That’s why it’s essential for your team to understand how to harness their raw potential and put them to work so that nothing you deem critical slips through the cracks. Here’s your chance!
Live Event
Facing increased workloads, fewer resources, and waiting for someone to come save the day? Never fear, Fortra’s Automate is here! Automate takes the power of robotic process automation (RPA) to new heights using four distinct capabilities. These superpowers come together to turn anyone—regardless of coding experience—from a zero to an automation hero. Join Darrell Walker, Solutions Engineer, as he...
Live Event
Fortra's GoAnywhere Managed File Transfer (MFT) is a secure MFT solution that makes it easy for everyone from small businesses to enterprise organizations to exchange files with business partners. Join our upcoming webinar to explore why utilizing a secure file transfer solution is key and how to get started using GoAnywhere MFT’s many file transfer, security, and collaboration features. Learn how...
Blog

The Value of a Tech Update

When was the last time you talked to your key ISVs? Fortra recommends an annual touch base to keep you informed on technology directions that can benefit your business.
Live Event
Most organizations have to comply with some regulation or cybersecurity standard and keeping up with changing requirements is often a challenge. DORA and the updated NIS2 directive by EU are just around the corner and will raise the bar even further. Join this session to find out what the new requirements are and how your IBM Power systems may be impacted. With a finite amount of resources, it’s...
Live Event
Our Strengthen Your Defenses: Globalscape’s Best Practices customer webinar on May 23rd will zero in on Globalscape’s System Architecture and Best Practices guides, which detail the best practices and configurations to help you further strengthen the security of your Globalscape environment. Fortra Solutions Engineers, Richard Foresyth and Jacob Bernal, will cover: Updates to the most recent...
Live Webinar
May
14

Why Don't Companies Role Swap?

Join this live webinar to learn why companies aren't role swapping and how simple role swaps can be with Robot HA’s intuitive technology and dedicated services team.
Guide

2024 Pen Testing Report

Penetration testing has become a cornerstone of proactive security strategies by offering a practical way to assess security by using real-world attack techniques to gauge the feasibility of a threat actor compromising an IT enterprise. Through the exploitation of security vulnerabilities, pen testers can determine which security weaknesses pose the most risk and provide guidance for remediation...
Live Webinar
May
22

Drilldown Options in Sequel Viewpoint

Join Brandy Lulling on May 22nd for this training-focused webinar where she will walk you through a step-by-step approach on how to deliver these valuable drilldown processes to your users.
Blog

Abusing Data to Avoid Detection: Cybercriminal Adoption of Browser Fingerprinting

Browser fingerprinting is one of many tactics phishing site authors use to evade security checks and lengthen the lifespan of malicious campaigns. While browser fingerprinting has been used by legitimate organizations to uniquely identify web browsers for nearly 15 years, it is now commonly exploited by cybercriminals.