Resources

Blog

How to Automate Login to a Website and Download a File

If you're a developer, scripting automations like webpage logins and file downloads can be fun. But most business users don't have the time or skill for such an undertaking. Learn how robotic process automation (RPA) offers an alternative to scripting and makes it easy to automate login to a website and download a file.
On-Demand Webinar

IBM i in 2024: From AS400 to AI

Watch as IBM i CTO & Chief Architect/IBM Distinguished Engineer Steve Will and IBM Power Champion Tom Huntington share their unique perspective on the direction of this platform.
On-Demand Webinar

[WEBINAR] Fortra Proof of Concept

Session DetailsFortra takes being your cybersecurity ally seriously. That’s why we’ve been challenging the security status quo in 2024, and we’ve got the tangible results to prove it.We’re leaving our mark on the market with new extended detection and response capabilities, enhanced threat intelligence, BEC research, responsive development, strategic partnerships, and more!Watch this webinar as...
Blog

3 Key Takeaways from AWS re:Inforce 2024

Every year, AWS re:Inforce brings together cloud security specialists and AWS experts alike to see and advance what’s new on the cloud security horizon. Fortra’s Mike Reed, Director of Global Alliances, walks us through what he saw on the ground floor as he covers several of this year’s key highlights.
Blog

Patch Tuesday Update July 2024

The first thing that everyone’s going to talk about this month is SQL Server. More than a quarter of the CVEs assigned by Microsoft this month describe SQL Server vulnerabilities. Thankfully, none of them are critical based on their CVSS scores and they’re all listed as “Exploitation Less Likely.”
Live Event
Fortra has transformed the industry by bringing leading solutions into one best-in-class portfolio, creating a stronger line of defense from a single provider. Our offerings are better together and give you the tools you need to meet the challenges of today’s threat landscape head-on while achieving compliance. Stop by booth #2340 to connect with a Fortra cybersecurity expert...
Live Event
Fortra's leading data protection offering delivers interlocking security for all cybersecurity maturity levels. Our modular solutions for data classification, data loss prevention, and secure collaboration combine to address your immediate needs and use cases, as well as advise your next best steps as your security program evolves.IndoSec is an annual cybersecurity summit that...
Live Event
File integrity monitoring was invented by Tripwire’s founder over 25 years ago and has evolved over time to become one of the most important security controls — so critical, in fact, that it’s required by major compliance standards like the Payment Card Industry Data Security Standard (PCI DSS). But what a lot of cybersecurity professionals aren’t familiar with is how FIM has...
Blog

Four Key Cybersecurity Highlights from Infosecurity Europe

Infosecurity Europe 2024 saw a tightened focus on this year’s real security agenda: a holistic approach to data protection, scrutiny on the supply chain, and the ever-wary eye toward AI and its many uses. Fortra’s Steve Audsley, EMEA Solution Engineering Manager for Data Protection, shares his experience.
Product Video

Sequel Data Warehouse ETL (Extract, Transform, Load) Overview and Demonstration

When data comes from all over your IT environment and is accessed in different ways by different users, your organization faces a lot of issues. Not only is the data inconsistent, but each database formats and delivers data differently. And there's no single filter through which all data goes to make sure it is high quality. That's where Sequel Data Warehouse can help. By accessing any data and...
Blog

Understanding The White House’s 2024 Cybersecurity Report

To protect against mounting threats to national security via nation-state cyberattacks, domestic ransomware attacks, and threats to critical infrastructure, The White House issued its 2023 National Cybersecurity Strategy. This recently released 2024 report reviews progress made towards achieving those outlined objectives.
On-Demand Webinar

IBM i Performance Week

Robot Monitor and Performance Navigator are powerhouses when it comes to performance monitoring and management. That’s why it’s essential for your team to understand how to harness their raw potential and put them to work so that nothing you deem critical slips through the cracks. This webinar series is your chance!
On-Demand Webinar

Making the Most of the Audit Journal

Watch IBM i pros Steve Sisk and Amy Williams to discover how to securely deploy ACS, how to use IBM i as a Certificate Authority (CA), how to configure ACS to use TLS, and other ACS security best practices.