Blog
Key Considerations in The Ever-Evolving Data Privacy Landscape – The Optimal Technology Mix
Wed, 02/16/2022
Enza Iannopollo, principal analyst at Forrester, recently answered some of the pressing questions we’ve received when it comes to data security, and more importantly building the foundations of your data security strategy. Today we’re looking at what Enza had to say about the prime mix of technologies when it comes to data protection. Q: What mix of technologies do you see as being the optimum for...
Blog
Data Security Best Practices Every CISO Should Know
By Scott Messick on Tue, 02/15/2022
Shouldering data security as a CISO is a hefty job. Adopting a few of the best practices to surround data can make it a lot easier.
Blog
Key Considerations in The Ever-Evolving Data Privacy Landscape – Understanding GDPR
Mon, 02/14/2022
On-Demand Webinar
How to Protect Your Data with Layered Security
By Nick Hogg
Does your organization need to better protect data across its entire lifecycle, from when it’s created to when it leaves the organization? Learn how to protect your data with layered security.
Blog
10 Best Tips to Improve Your Data Security Plan
Thu, 02/10/2022
Follow these 10 tips to help create a comprehensive data security plan for your organization or improve your existing plan.
Press Release
HelpSystems (now Fortra) Signs Agreement to Acquire Tripwire to Extend Cybersecurity Portfolio
Leading file integrity monitoring solution helps compliance-driven organizations detect changes that could indicate a security breach.
Press Release
The New HelpSystems (now Fortra) Global Partner Program Introduces the Concept of Solution Selling
Following the launch of our new Global Partner Program, Renee Ritter features in this interview with Channel Futures Magazine.
News Article
Workplace Mentoring for Cybersecurity Talent
Adam Burns, Director of Cybersecurity at Digital Guardian, writes in Teiss magazine about the importance of workplace mentoring in building and maintaining cybersecurity talent.
Press Release
HelpSystems (now Fortra) Launches New Global Channel Program to Expand and Strengthen its Partner Community
Fortra today launched its new worldwide channel program, focusing on the strategic recruitment, development, and enablement of its partners in North America, Latin America, APAC, and EMEA. Renee Ritter appointed as the program’s Managing Director.
Blog
How and Why to Implement Zero Trust Architecture via Layered Security
Wed, 02/02/2022
Perimeter-based security is out, Zero Trust architecture is in. Learn what Zero Trust means, why your organization should use it, and how Fortra can help.
Blog
Your 5-Minute CUI Training Study Guide
Fri, 01/28/2022
Use our Fortra CUI Training study guide to help you understand what CUI is, who creates and complies with it, and to ultimately pass your training course.
News Article
Prioritizing Data Protection in a Changing World
Data is more at risk than even before. In this Cyber Protection Magazine article, industry experts give their views on the state of data privacy.
Datasheet
Zero Trust File Transfer
A powerful combination of Digital Guardian Secure Collaboration digital rights management and Fortra SFT solutions can give your organization more control and protection over sensitive data.
On-Demand Webinar
Email Security Best Practices: What to Look for in Email Security
By Nick Hogg
As it continues to be a primary corresponding channel for most organizations, email remains a central target for cyberattacks. In this webinar we breakdown what is needed for strong email security and the best practices for maintaining it.
Guide
Key Considerations in The Ever-Evolving Data Privacy Landscape
Following our recent webinar on The Ever-Evolving Data Privacy Landscape guest speaker and principal analyst at Forrester. Enza Iannopollo, has answered some of the pressing questions we have seen when it comes to building the foundation of your data security strategy.
Blog
Getting Started with PCI and Why Every Company Should Be in Compliance
By Robin Tatam on Mon, 01/24/2022
Few things strike fear into the hearts of consumers and businesses more than a breach of financial information. Why? Because it hits us where we’re most sensitive: our pocket books!