Join this webinar to learn how to effectively leverage a web-based document & workflow management solution to address the top five document management use cases.
Join this live webinar to learn why companies aren't role swapping and how simple role swaps can be with Robot HA’s intuitive technology and dedicated services team.
Penetration testing has become a cornerstone of proactive security strategies by offering a practical way to assess security by using real-world attack techniques to gauge the feasibility of a threat actor compromising an IT enterprise. Through the exploitation of security vulnerabilities, pen testers can determine which security weaknesses pose the most risk and provide guidance for remediation...
Join Brandy Lulling on May 22nd for this training-focused webinar where she will walk you through a step-by-step approach on how to deliver these valuable drilldown processes to your users.
SecurID Agent brings the full functionality of the market-leading RSA SecurID two-factor authentication solution to IBM i users. Check out the datasheet to learn more.
The first thing that anyone looking at the Microsoft security guidance this month will notice is the inclusion of Common Weakness Enumeration (CWE) information.
Join this live webinar on June 6th to learn more about AI and other document and forms management trends and how you can get started implementing them.
Your organization’s data is its most valuable asset. Retaining data properly helps ensure you meet industry compliance requirements and keep the trust of your customers or trading partners. Whatever your organization’s specific data retention policies may be, you’ll need to ensure that your data is secured at rest as well as in motion, with robust auditing and reporting of all file movements.
It is the largest phishing simulation in the world: Fortra’s Terranova Security’s yearly Gone Phishing Tournament (GPT) tests over 1.37 million end users across 142 countries and 31 languages. The results don’t lie – but this year they may be surprising.
Browser fingerprinting is one of many tactics phishing site authors use to evade security checks and lengthen the lifespan of malicious campaigns. While browser fingerprinting has been used by legitimate organizations to uniquely identify web browsers for nearly 15 years, it is now commonly exploited by cybercriminals.
Session Details **This session meets at multiple times.** Cybersecurity is a team sport. It’s heroes versus adversaries. All for one and one for all. Or else. With mounting cyber threats, tectonic changes in the digital landscape, and AI infiltrating all aspects of business, seasoned cybersecurity leaders turn to fellow practitioners to find solace and solutions. On May 8, Fortra CISO Chris...
As organizations embrace digital transformation, there are certain concepts and technologies that are crucial to maximizing the benefits. The various types of automation are essential for achieving your digital transformation, but without application integration , you could end up with a tangled mess of siloed applications and systems. And while automation and application integration may seem like...
JavaScript injection is a very powerful action for web browser automations. This allows users to interact with a website exactly as the website is expecting. Adding JavaScript to Automate’s web browser actions takes your automation a step further, allowing users to build automation that controls the site as a human would when needed. Join Austin Stanley, Technical Consultant, in this customer...
On March 31, the payments industry will need to fulfil all new PCI DSS v.4.0 requirements. Find out what the new obligations will be, how to tie them into your enterprise, and how Fortra can help.
Lack of network visibility makes life hard for IT. Network monitoring helps you stay ahead of outages with real-time visibility into your network health.
This month’s Patch Tuesday drop includes a total of 65 CVEs – 61 issues by Microsoft, 3 issued by Chrome, and 1 issued by Intel. For those worried about the Intel update, which requires you apply both an Intel microcode update and a Microsoft update, it only applies to Atom processors.
When is the right time to rely on an Option 21 save and when should I turn to an enterprise-class solution like BRMS or Robot Save? Read on to find out.