Quote
Get Custom Penetration Testing Services Pricing
Find Your VulnerabilitiesCore Security's Security Consulting Services (SCS) simulates trending and new cyber threats to uncover security weaknesses, comply with regulatory compliance standards, and strengthen your security landscape. See how affordable pen testing can be, complete the form and get a customized quote from our experts based on your security needs.Get More With Security Consulting...
News Article
IT Nerd: Exclusive Insights from Fortra’s 2024 Penetration Testing Report
By Chris Reffkin on Fri, 06/28/2024
Fortra CISO Chris Reffkin spoke with IT Nerd and shared valuable insights from Fortra’s 2024 Penetration Testing Report.
Article
How to Implement the CIS Controls and Benchmarks on IBM i
By Amy Williams on Mon, 06/24/2024
Discover what the CIS Benchmarks and Controls are, why IBM i organizations should implement them, and how Powertech can help.
Demo
Watch a Demo of Fortra Vulnerability Management
Fortra Vulnerability Management (formerly Frontline VM) is more than a scan. This risk-based, scalable VM solution streamlines vulnerability identification and prioritization, producing accurate, actionable reports that empower quick remediation. Whether your team is just beginning network security assessments or establishing on-going, automated assessments and reporting, our feature-rich VM is...
On-Demand Webinar
How to Securely Deploy ACS and Use Encrypted Sessions
By Steve Sisk
Watch IBM i pros Steve Sisk and Amy Williams to discover how to securely deploy ACS, how to use IBM i as a Certificate Authority (CA), how to configure ACS to use TLS, and other ACS security best practices.
On-Demand Webinar
Making the Most of the Audit Journal
By Amy Williams
Watch IBM i pros Steve Sisk and Amy Williams to discover how to securely deploy ACS, how to use IBM i as a Certificate Authority (CA), how to configure ACS to use TLS, and other ACS security best practices.
News Article
Healthcare IT News: HHS Offers $50M to Help Providers Patch Ransomware Vulnerabilities
By Tyler Reguly on Fri, 06/07/2024
Is AI enough to help organizations keep up with constantly changing vulnerabilities? Tyler Reguly spoke with Healthcare IT News and shared his take on it.
News Article
ComputerWeekly: Critical Sharepoint, Qakbot-Linked Flaws Focus of May Patch Tuesday
By Tyler Reguly on Fri, 06/07/2024
Tyler Reguly spoke with ComputerWeekly about the elevation of privilege (EoP) vulnerability in Windows DWM Core Library.
Guide
How to Use Upskilling and Reskilling to Scale Your Cybersecurity Team
The cybersecurity skills shortage is not just an ongoing inconvenience—it is a serious vulnerability that can be exploited by attackers. But how can organizations go about patching this gap while the talent gap endures? The answer lies in leveraging the resources you already have on hand: your existing workforce. How do you transform your existing personnel to meet today’s cybersecurity demands?...
On-Demand Webinar
Be an Automation Hero: Unleash Your Superhuman Abilities
Facing increased workloads, fewer resources, and waiting for someone to come save the day? Never fear, Fortra’s Automate is here! Automate takes the power of robotic process automation (RPA) to new heights using four distinct capabilities. These superpowers come together to turn anyone—regardless of coding experience—from a zero to an automation hero.
In this on-demand webinar, Darrell Walker,...
Blog
Major Launches Announced on Release Day 2024.2
Fri, 05/17/2024
About Fortra’s Release Day
Each quarter, we at Fortra get to roll out the fruits of our labors for the past few months. We showcase new features, updates, and even products.
This Release Day features several groundbreaking projects. We’ve broken into the XDR arena and are thrilled to introduce you to our new offering. We’ve issued major releases for over a half-dozen of our flagship products....
Add Advanced File Transfer Features with GoAnywhere
Transferring business-critical files requires a solution designed to handle those specialized processes securely and effortlessly. Fortra’s managed file transfer (MFT) solution, GoAnywhere, delivers the protection and streamlined ease needed.
On-Demand Webinar
How Fortra Enables Your Zero Trust Strategy
By Nick Hogg
The concept of using a Zero Trust architecture in cybersecurity has been around for more than a decade, and its fundamental principle of “never trust, always verify” sounds straightforward enough. However, there’s a lot of noise around Zero Trust, often generated by vendors promising that their solution is that magic silver bullet to all of your Zero Trust problems. This can muddy the waters and...
Blog
6 Pro Tips from the 2024 State of IBM i Security Study
Mon, 05/06/2024
If you're responsible for IBM i security, you don't want to miss the top 6 expert tips pulled from the 2024 State of IBM i Security Study!
Guide
2024 Pen Testing Report
Penetration testing has become a cornerstone of proactive security strategies by offering a practical way to assess security by using real-world attack techniques to gauge the feasibility of a threat actor compromising an IT enterprise. Through the exploitation of security vulnerabilities, pen testers can determine which security weaknesses pose the most risk and provide guidance for remediation. ...