In his Q&A with VMblog, Antonio Sanchez talked about Fortra’s activities at RSA, highlighting our latest product innovations and sharing industry insights.
Watch this session to gain insight into the best practices for migrating and staying in the cloud. Fortra’s Executive VP of Technical Solutions Tom Huntington teams up with Tom Horan of Meridian IT, a cloud expert with over 12 years of cloud experience.
As vishing campaigns are on the rise during tax season, John Wilson writes in Bloomberg Tax about the dangers and how tax professionals can protect themselves and their clients from cybercrime.
Zero Trust Security has taken on a fad-like identity. Misconceptions and lack of education have led to confusion around what Zero Trust is and how to implement its tenants – undermining the powerful role it can play in improving security maturity. In this webinar, we’ll simplify the concept of Zero Trust and share guidance from both the business as well as the security perspective to help your...
With penetration testing becoming an increasingly universal part of security strategies and compliance requirements, knowledge sharing and analysis grows more critical when defining best practices. As part of our ongoing commitment to improving cyber resilience through proactive security assessments, Fortra's Core Security conducts an annual survey of cybersecurity professionals on the usage and...
Watch as IBM i experts Tom Huntington and Chuck Losinski discuss best practices for message management on your IBM i. They’ll break down each step in the process and provide you with a range of message management options.
Watch this webinar from forms management expert Greg Schmidt to learn how Intelligent Forms Managements optimizes your ERP and how easy it is to get started.
Data access expert Greg Schmidt demonstrates how Sequel puts the power of your business data in the hands of your users using Excel integration, automated data delivery, and much more.
Safeguarding our credit and debit cards is something we all need to prioritize. In his latest Forbes Advisor article, John Wilson provides tips to keep your payment card details safe from fraud.
The threat of malware and ransomware is nothing new—but now even AIX servers are at risk. Join this session to learn about the current threat landscape and how to minimize your exposure to malicious programs.
While employing defensive measures to prevent cybercriminals from breaching security measures are critical initiatives, more is needed to protect your infrastructure. Proactive, offensive layered security solutions are now just as much of a necessity. Security teams need to be able to get into the mind of an attacker and see where an organization’s exploitable weaknesses are so they can close them...
Join Sequel Support Manager Sheryl Quinlan as she breaks down Sequel Viewpoint’s key components, how and when to use them, and other best practices for maximizing your Sequel experience.