On-Demand Webinar
I Have All Object Authority and I’m Not Afraid to Use It!
By Amy Williams
In this webinar, security expert Amy Williams explores best practices for All Object authority and strategies for correcting this vulnerability.
Blog
Corporate Data Security Policy: What, Why, and How
By Steph Charbonneau on Tue, 10/12/2021
Creating a corporate data security policy is a “must” in today’s evolving cybersecurity environment. Here’s a few tips on best practices.
Case Study
Fortra MFT and Secure ICAP Gateway Keep Government Services Rolling Securely and Remotely
A North American government agency with more than 1,500 employees needed to give citizens better ways to perform civic data sharing remotely due to the COVID-19 pandemic.
Press Release
The Argument for a National US Data Privacy Framework
Consumer privacy legislation is a critical foundation in protecting the rights of consumers and ensuring their safety and privacy online. Many countries around the world have already adopted comprehensive legal protections for personal data.
On-Demand Webinar
Analyze Traffic Flow with a Bandwidth Monitoring Tool
Identify bandwidth hogs and traffic congestion with a NetFlow analyzer. Find out how Intermapper can help.
On-Demand Webinar
Protecting Mission-Critical Systems from Modern Malware Threats
By Bob Erdman
Most organizations are vigilant about scanning their workstation PCs. Unfortunately, malware can just as easily target your servers, both on-premise and in the cloud.
As malware and ransomware attacks have grown, so have the number of compliance mandates—and yet many organizations are still getting breached.
Join this webinar with Bob Erdman, cybersecurity expert and Associate Director of...
Press Release
HelpSystems’ (now Fortra's) Cybersecurity Guide Reveals the Evolving Risks and Data Privacy Landscape in India
In today’s remote working digital economy, having a robust data security strategy that centers on people, process, and technology is imperative.
On-Demand Webinar
Survival of the Fittest: Defending IBM i Against a Cyber Attack
By Robin Tatam
Your odds of experiencing a data breach are now one in four, but a much larger number of attacks are unsuccessful. So, how are some organizations able to escape an attack unscathed while others suffer crushing financial losses?
The difference is often found in the cybersecurity controls in place to guard mission-critical systems. Of course, the devil is in the details.
In this webinar, IBM i...
Press Release
The Pervasiveness of Data and Data-Centric Security Strategy
Adam Strange illustrates the pitfalls of information security architecture and explains how shifting to data-centric strategies will protect data at file level throughout its entire life cycle.
Press Release
US Data Privacy Gains Momentum
Data privacy and protection laws are becoming increasingly more commonplace across the US, with different states introducing new regulations.
Press Release
Why a "One-Size-Fits-All" Approach to Data Classification Won't Deliver in an Era of Enhanced Regulation
Data Classification solutions help companies understand and manage their data, however, in this era of regulatory obligation, a "one-size-fits-all" solution doesn’t provide the granularity or flexibility needed to remain compliant.
Press Release
Why India has Introduced the New Personal Data Protection Bill
India’s data privacy regulations are currently undergoing an overhaul. A new law, the Personal Data Protection (PDP) Bill, has been proposed and is likely to be phased in shortly. What does this mean for organizations in India?
On-Demand Webinar
Malware on Power Systems Servers: Breaking Down the Myths
By Sandi Moore
Learn how malware and viruses have successfully infiltrated Linux, AIX, and IBM i systems and get expert tips for protecting your servers.
On-Demand Webinar
Expert Tips for IBM i Security: Beyond the Basics
By Robin Tatam
In this session, IBM i security expert Robin Tatam will provide a quick recap of IBM i security basics and guide you through some advanced cybersecurity techniques that can help you take data protection to the next level.
On-Demand Webinar
Simple Strategies for Malware Defense on IBM i - presented with COMMON
By Robin Tatam
With today's advanced malware and ransomware threats, malicious programs can cause a massive business disruption. Not all organizations can recover from attack. To avoid corrupted data and downtime, you need to consider a comprehensive approach to malware defense for Power Systems servers running IBM i, AIX, and Linux.
Watch this webinar to learn about advanced malware threats and simple...
Blog
Network Monitoring and Identity Governance: How They Work Together to Enhance Your Security Posture
By Kevin Jackson on Thu, 07/15/2021
Discover three key areas where network monitoring and identity governance strategies go hand-in-hand, and work collaboratively to improve and enhance security within organizations today.
Article
15 Tips for When It's Time to Upgrade Your Network
By Kevin Jackson on Wed, 07/14/2021
While every network faces different challenges, we’ve identified three key areas that are currently seeing the most change for organizations needing to grow their network infrastructure.