page
Fortra Vulnerability Disclosure Policy Statement
Purpose Fortra LLC (“Fortra”), a global cybersecurity software and services provider, is committed to the safety and security of its customers, employees, and partners. We believe that the security community and security researchers play a vital role in protecting all users from harm and appreciate their contributions to the greater good. Reporting security vulnerabilities will help us improve the...
Guide
The Definitive Guide to Security Awareness Training
Mon, 10/02/2023
With this comprehensive guide, you’ll be well on your way to making lasting behavioral changes within your organization.
Live Event
Are you heading to Melbourne for AISA Cyber Conference 2023? Fortra will be there at BOOTH 121 with information about our entire cybersecurity portfolio. We have transformed the industry by bringing leading solutions into one best-in-class portfolio, creating a stronger line of defence from a single provider. Our offerings are better together and give you the tools you need to meet the challenges...
Live Event
Are you heading to WA Mining Conference 2023? Fortra will be there at BOOTH C102 with information about our entire cybersecurity portfolio. We have transformed the industry by bringing leading solutions into one best-in-class portfolio, creating a stronger line of defence from a single provider. Our offerings are better together and give you the tools you need to meet the challenges of today’s...
Blog
Securing the Government and Public Sector in 2023
Fri, 09/29/2023
Securing the public sector requires knowing the industry, its regulations, and its most prevalent threats. Discover Fortra’s government security solutions.
Blog
Top 5 Takeaways from Fortra’s 2023 Business Email Compromise (BEC) Report
By Antonio Sanchez on Thu, 09/28/2023
Business email compromise cost organizations $2.7 billion dollars last year, compared to ransomware’s $34 million. In this blog, discover the trends and tell-tale signs of one of 2023’s most lucrative threats.
Blog
Data Classification in Finance
By Antonio Sanchez on Thu, 09/28/2023
As complex threats make securing the financial services sector increasingly more complex, data classification solutions bring financial security back to basics. Start with a foundation of identifying assets, organizing them by criticality, and prioritizing response.
Live Event
Wrestling with the complex format of cron, or dealing with the limited features in Windows Task Scheduler or SQL Agent? Native schedulers are a great way to get started with job scheduling, but as your IT environment gets more complex, scheduling batch jobs using native tools can be hard to manage, and difficult to scale. Join our webinar to learn how JAMS, an enterprise job scheduler, makes it...
Live Webinar
If you're curious about IBM i in the cloud or have already made the switch, you don’t want to miss this session that will equip you with the knowledge and tools necessary to navigate the complex landscape of cloud security for Power servers.
On-Demand Webinar
Building Cyber Resilience in European Financial Services – What You Need to Know
By Nick Hogg
The financial services industry has long been a prime target for cybercriminals. As a result, it's among the most heavily regulated sectors in the world. A recent IDC report explains how and why financial organisations in Europe are investing in security to build operational resilience.
On-Demand Webinar
Navigating Today's HMC
The Hardware Management Console (HMC) has been around for many years, however, we still get plenty of questions from customers that are not familiar with the HMC. The HMC is nothing to be scared about – and IBM Power Champion Tom Huntington and we'll will show you why during this recorded webinar.
News Article
PCMag: Hackers are Targeting LastPass Users with Phishing Emails
Thu, 09/28/2023
LastPass partnered with Fortra’s PhishLabs to disrupt a phishing campaign targeting its customers.
Blog
INFOGRAPHIC: How to Protect Your Data from Ransomware Attacks
Wed, 09/27/2023
Ransomware can take on multiple forms. From phishing emails or USB keys containing malicious files to downloaded files from the internet, ransomware takes over your computer and holds your data hostage. Here are 7 tips for prevention.
Product Video
Performance Navigator Overview and Demonstration
Wed, 09/27/2023
Watch this video for an overview of Performance Navigator’s key components and a demonstration of how you can use it to optimize your IT enterprise.
product_sub_page
IBM i Cloud Migration Bundle
The increasing IBM i skills gap and the desire to eliminate the costs of operating a data center continue to encourage IBM i customers to begin their cloud journey. Migrating IBM Power workloads is a multifaceted process in which many IT teams have little to no experience performing. Our cloud migration bundle offers you the tools as well as the personnel necessary to successfully migrate to the c...