On-Demand Webinar
Why Your IBM i Security Will Fail (and How to Fix It)
By Robin Tatam
The most common approaches to IBM i security share a serious flaw. Watch this webinar to learn how to fix it.
Press Release
HelpSystems (now Fortra) buys 'ethical hacking' company, beefing up its cybersecurity business
HelpSystems has bought Strategic Cyber LLC, an "ethical hacker" that does business as Cobalt Strike, in the Eden Prairie company's latest move to beef up its cybersecurity presence.
On-Demand Webinar
Is the California Consumer Privacy Act (CCPA) the Next GDPR and Why Should I Care?
In this session, you’ll learn why most organizations—not just those in California—are affected by the CCPA and what it means for IT pros.
Press Release
HelpSystems (now Fortra) Makes It Easier to Identify Security Events on IBM i
Fortra today announced the latest release of Powertech SIEM Agent for IBM i. The new version provides enhanced flexibility to meet the demands of increasingly complex IT environments.
Press Release
HelpSystems (now Fortra) Offers Free Version of Security Monitoring Software to Small and Mid-Sized Businesses
Fortra announced today the release of a free version of its security software for smaller organizations who need to protect their data with greater insight on what’s happening with their systems.
Core Password and Secure Reset
Convenient and secure automated password management solution with self-service password resets
cta_page
Schedule an IBM i Risk Assessment
Identifying the security gaps on your system is the first step toward fixing them.
That’s why vulnerability assessments are a cybersecurity best practice and a requirement for mandates like PCI DSS, HIPAA, and GDPR.
A Risk Assessment from Fortra is a thorough appraisal of your organization’s IBM i security configuration, including a micro-level analysis of system-specific...
cta_page
Free SIEM Software
What's included in Event Manager's free security event monitoring software?
You get the same core features we offer in our enterprise Event Manager product:
Real-time threat detection
Out of the box templates for simplified integration
Custom integrations for non-standard data sources
Streamlined incident response
Data normalization for easy interpretation
Detailed event...
On-Demand Webinar
IBM i Security for Programmers
By Robin Tatam
In the first of this two-part webinar series, Robin Tatam combines his skills as a certified RPG developer with his IBM i security expertise. He’ll cover the security considerations that native application programmers should be keenly aware of as they design their applications.
On-Demand Webinar
The Rise of Insider Threats and How to Prevent Them
By Bob Erdman
Watch this webinar to get actionable advice on how to keep insider threats out of your organization. Learn about important, achievable strategies
Press Release
Fortra's Core Security Announces New Release of Leading Penetration Testing Software
Core Security, a Fortra Company, announced today the release of Core Impact 19.1, the newest version of its market-leading penetration testing software.
Blog
Silencing the Bells: How a SIEM Can Prevent Alert Fatigue
By Bob Erdman on Tue, 07/30/2019
Find out how Security Information and Event Management (SIEM) solutions can streamline security and prevent alert fatigue.
Access Assurance Suite
As part of the Core Security Identity Governance and Administration portfolio of solutions, previously known as Courion, Access Assurance Suite is an intelligent identity and access management (IAM) software solution that enables organizations to deliver informed provisioning, meet ongoing regulatory compliance, and leverage actionable analytics for improved identity governance.
On-Demand Webinar
Expert Tips for Securing AIX Systems
By Bob Erdman
Servers running AIX and other operating systems are frequent targets of cyberattacks, according to the Data Breach Investigations Report. From DDoS to malware, attackers have many strategies at their disposal—and common cybersecurity mistakes make their attacks much easier.
One of the most serious mistakes is failing to create a well-defined security policy.
A written...
Core Impact
Simple enough for your first test, powerful enough for the rest.
Demo
Request a Demo from Core Security, by Fortra
Core Security’s analytics-driven approach to security and remediation enables customers to manage access and identify vulnerabilities to minimize risks and maintain continuous compliance. By sharing intelligence across various security disciplines, customers can automate manual processes using consistent data, prioritization methods, and reporting to cut remediation time,...