Watch this webinar to learn how to effectively leverage a web-based document & workflow management solution to address the top five document management use cases.
Cybersecurity experts continue to warn of sophisticated email attacks that prey on enterprise users. Advanced human-targeted attacks that trick unsuspecting recipients into interacting with or responding are becoming more pervasive, including:Quishing (also called QR code phishing)Trending social engineering tacticsO365 luresThese, among others, require advanced threat...
Watch IBM i pros Steve Sisk and Amy Williams to discover how to securely deploy ACS, how to use IBM i as a Certificate Authority (CA), how to configure ACS to use TLS, and other ACS security best practices.
Watch IBM i pros Steve Sisk and Amy Williams to discover how to securely deploy ACS, how to use IBM i as a Certificate Authority (CA), how to configure ACS to use TLS, and other ACS security best practices.
About Fortra’s Release Day
Each quarter, we at Fortra get to roll out the fruits of our labors for the past few months. We showcase new features, updates, and even products.
This Release Day features several groundbreaking projects. We’ve broken into the XDR arena and are thrilled to introduce you to our new offering. We’ve issued major releases for over a half-dozen of our flagship products....
Global Police Operation has taken down a major PhaaS provider, LabHost. Fortra provided details on the platform’s North American and international subscription packages.
Recently, Fortra has observed phishing campaigns targeting Verizon customers. John Wilson spoke with ConsumerAffairs and shared tips on how to stay safe.
Verizon consumers are being targeted in a phishing campaign. Scammers have found ways to bypass traditional email security gateways and land in inboxes instead of junk folders.
The concept of using a Zero Trust architecture in cybersecurity has been around for more than a decade, and its fundamental principle of “never trust, always verify” sounds straightforward enough. However, there’s a lot of noise around Zero Trust, often generated by vendors promising that their solution is that magic silver bullet to all of your Zero Trust problems. This can muddy the waters and...
With a citizen-based developer interface, you can make it easy for users to customize and build workflows for their department with minimal involvement from IT. Watch this webinar to learn more.
SecurID Agent brings the full functionality of the market-leading RSA SecurID two-factor authentication solution to IBM i users. Check out the datasheet to learn more.