Resources | Fortra

Resources

Live Webinar
Jun
20

Help! I Inherited an IBM i!

If you've inherited an IBM i and are unfamiliar with the platform, join our experts on June 20th as they share proven strategies for your successful education in IBM i systems management.
Live Webinar
Join Tyler Reguly to take a deep dive into MITRE ATT&CK and its uses within various Center for Internet Security (CIS) offerings. From the Critical Security Controls to the Community Defense Model, CIS has provided plenty of mappings that show how knowledge from MITRE ATT&CK can be integrated. Last year, CIS went a step further, integrating mappings from MITRE ATT&CK into their Benchmarks. This...
Blog

Data Classification and Data Loss Prevention (DLP): A Comprehensive Data Protection Strategy

Data is the world’s currency and has been for some time. Protecting data should be at the top of the list for organizations of any size, and the heart of any security strategy. Think about it: the purpose of any firewall, email solution, compliance regulation, or XDR platform is to keep data safe. Why not cut to the heart of it with a dedicated Data Loss Prevention (DLP) solution? And why not...
Live Webinar
Join our upcoming webinar to explore why utilizing a flexible secure file transfer solution is key and how to get started using Globalscape’s many security, collaboration, and automation features to meet your unique file transfer needs. Learn how to manage your file transfers better when you attend this webinar. See how Globalscape can: Resolve file transfer headaches Protect sensitive data from...
Live Event
Join us for the annual Sydney Cyber Security Conference 20 June 2023 - a conference designed to enable collaboration between all business groups and all cyber and information security practitioners. Hear from professionals working in the cyber security and information technology sector to learn about current threats and how to best protect company operations and information. Please visit us at...
Live Webinar
You didn’t hire your accounts payable team just for data entry, chasing down invoices, and manually matching POs. Learn how an intelligent capture solution can take the pain out of data extraction, classification and routing to achieve smarter AP processes. Whether your data is structured (from a spreadsheet, database, or portal), or unstructured (from emails, forms, and invoices), we’ll show you...
Blog

How to Succeed at IBM i Security

Find out where security plans are running off course and how you can make a completely attainable plan to succeed.
Live Webinar
Learn how to manage your file transfers better when you attend this webinar. See how GoAnywhere can: Resolve file transfer headaches Protect sensitive data from external risks Achieve key compliance requirements And much more You’ll learn how GoAnywhere works, discover the benefits of implementing MFT file transfer software in your organization and watch a live demonstration of the product in...
Live Event
At Infosecurity Europe you will learn about more than just the technology. You will hear from, and network with, the people who make up our community, exchange ideas, build resilience and be able to work together protect our shared future. We’ve made learning new skills and building connections with the power to advance your career, as simple as registering to attend. Join us at Infosecurity...
Guide

The Ultimate Guide to DORA Compliance for the Financial Sector

The Digital Operational Resilience Act (DORA) applies to over 22,000 financial entities and ICT providers in the EU. It introduces an end-to-end framework for effective risk managements, ICT and cyber security operational capabilities, and third-party management to assure the consistent delivery of services along the financial value chain. This comprehensive guide covers everything you need to...
Live Event
Jun
20

Email Impersonation and Machine Learning

Over 98% of threats reaching user inboxes impersonate individuals or brands to slip past email filters. In this upcoming webinar, Fortra’s Email Security experts discuss how machine learning models can help detect and remove email impersonation threats at scale.
Live Webinar
Jun
13

How to Merge Data from Different Sources

Join BI experts Alan Jordan and Greg Schmidt on June 13 for a live webinar in which they will demonstrate how Sequel Data Warehouse makes it easy to merge data from different sources.