Live Event
8:00 - 8:45am PDT
EJ Stanley
Blog
Using Reviews to Choose RPA Software
Thu, 09/12/2024
Analyze RPA reviews with a more critical eye to better understand how a robotic process automation vendor can meet your organization’s needs.
News Article
How to Fortify Defenses Before Threats Materialize
By Chris Reffkin on Mon, 09/09/2024
Cyber threats are becoming more sophisticated and frequent, yet many organizations still face challenges due to limited resources. In ITSecurityWire, Fortra's Chris Reffkin highlights prioritizing remediation, closing the skills gap, and ongoing improvement.
Guide
Avoid These Common Ransomware Prevention Oversights
Most breaches and data losses are caused by simple "honest" mistakes that inadvertently create security weaknesses for attackers to target. In fact 68% of data breaches originate from some type of non-malicious human element*. When it comes to ransomware prevention, if you focus too intently on your defensive cybersecurity tactics, you may be overlooking some fundamental security measures, like...
Blog
Troubleshooting Advanced Web UI Automation Issues
By Darrell Walker on Thu, 08/29/2024
When web browser automation challenges arise, use these helpful Automate tips and tricks for troubleshooting issues and building stronger automation.
Blog
Introduction to Advanced Web UI Automation
By Darrell Walker on Thu, 08/29/2024
Learn web browser automation best practices using Fortra's Automate. Easily build out automations for web processes involving browsers and portals to eliminate manual tasks.
Blog
Comparing RPA Platforms: Fortra’s Automate vs. Microsoft’s Power Automate
By EJ Stanley on Tue, 08/20/2024
See a head-to-head matchup between RPA platforms—Fortra’s Automate vs. Microsoft’s Power Automate—and compare licensing, functionality, support, and more.
Blog
Managing the Rising Tide of CVEs
By Mieng Lim on Fri, 07/26/2024
If you are watching recent security stats, you’ll likely spot an alarming trend.Common Vulnerabilities and Exposures (CVEs) are on the rise and expected to increase by 25% in 2024, reaching 2,900 CVEs per month¹. It’s not a huge surprise that the number of known vulnerabilities is growing, given the proliferation of systems and software. Unfortunately, average time to remediation is increasing as...
Blog
What Is Vulnerability Management? Process & Use Cases
By Antonio Sanchez on Tue, 07/23/2024
Recent years have seen confusion around how to define vulnerability management. In this blog, security expert Antonio Sanchez sets the record straight, exploring the technology’s process and use cases.
Blog
RPA Implementation Guide
Tue, 07/23/2024
Robotic process automation (RPA) implementation is about more than just finding a software tool. RPA can transform your business by simplifying the tedious, repetitive processes holding you back, but to do so, you need a proper RPA implementation strategy.Companies want to embrace the transformative technology but struggle with where to start, what processes to automate, and how to measure the...
Blog
3 Components of a Proactive Security Strategy
By Mieng Lim on Mon, 07/22/2024
Your organization might have many cybersecurity defenses in place, but defenses alone are not enough to protect you from today’s multi-faceted cyberattacks. Proactively adding a layer of offensive security assessment and testing helps you pinpoint your system weaknesses before they are exploited. Proactive security measures help you stay ahead of attackers by:Identifying vulnerabilities and...
Article
Browser Automation: Automate Website Actions like Clicks or Data Extraction
Mon, 07/22/2024
With process automation revolutionizing the handling of routine tasks throughout organizations, many wonder if there are applications they may be missing. Automating browser tasks is one area that can simplify administrative processes and give time back to key employees.
Blog
How to Automate Login to a Website and Download a File
Mon, 07/22/2024
If you're a developer, scripting automations like webpage logins and file downloads can be fun. But most business users don't have the time or skill for such an undertaking. Learn how robotic process automation (RPA) offers an alternative to scripting and makes it easy to automate login to a website and download a file.
News Article
IT Nerd: Exclusive Insights from Fortra’s 2024 Penetration Testing Report
By Chris Reffkin on Fri, 06/28/2024
Fortra CISO Chris Reffkin spoke with IT Nerd and shared valuable insights from Fortra’s 2024 Penetration Testing Report.
Demo
Watch a Demo of Fortra Vulnerability Management
Fortra Vulnerability Management (formerly Frontline VM) is more than a scan. This risk-based, scalable VM solution streamlines vulnerability identification and prioritization, producing accurate, actionable reports that empower quick remediation. Whether your team is just beginning network security assessments or establishing on-going, automated assessments and reporting, our feature-rich VM is...