Resources

News Article

VM Blog: Braving the Digital Risk & Email Security Landscape

How will the digital risk and email security landscape evolve in 2024? In this VM Blog article, Eric George discusses the industry's future and shares his seven predictions for 2024.
On-Demand Webinar

The Two Faces of SQL on IBM i

Watch this webinar on how to tackle the two faces of SQL on IBM i. We demonstrate how you can both monitor SQL activity on your system while also creating user-defined SQL statements to retrieve and monitor nearly anything automatically for unlimited flexibility.
On-Demand Webinar

Mastering Data Privacy: India's DPDP Act Explored

The new Digital Personal Data Protection (DPDP) Act impacts all organisations, both domestic and international, that process personal data of individuals in India. Therefore, organisations need to carefully assess their data processing practices and ensure they align with the Act's requirements to avoid financial penalties. Watch our video, as we delve into the DPDP Act. During the video, Donnie...
Article

How to Extract Data from Websites to Excel Automatically (Tutorial)

Tired of your staff wasting countless hours pulling critical information from the internet–like contact information, shipping tracking, competitor pricing, data from portals, and more? While these tasks might seem simple, searching websites and portals and copying and pasting the information into Excel can quickly take up a lot of your team’s precious time. Plus, manually entering data into a...
On-Demand Webinar

Boost Your Cloud Security with MFT

Whether your files reside in the public cloud, private cloud, or within a hybrid environment, GoAnywhere Managed File Transfer (MFT) delivers the security and control you need to move data confidently between systems, locations, users, and trading partners. In this video, Ray Sutton, Solutions Engineer, and Tim Shaw, Solutions Engineer, Fortra, will provide a high-level look at GoAnywhere MFT’s...
News Article

Hacking Humans: Unmasking the Deceptive

What are the most common phishing techniques used by cybercriminals? John Wilson joined the Hacking Humans podcast to discuss phishing and email impersonation attacks, and strategies organizations can use to stay safe.