Guide
Fortra's Complete Guide to Layered Offensive Security
Most organizations have a decent understanding of the types of defensive security tactics they need to employ to thwart cyberattacks. But offensive security techniques are just as important for detecting existing vulnerabilities that a threat actor has yet to discover and exploit. Learn how to approach offensive security from the ground up, including the value of using a layered security approach...
Datasheet
How Fortra Supports the Zero Trust Journey
What Zero Trust means, tips for getting started, and how Fortra solutions support your Zero Trust security journey.
On-Demand Webinar
Fortra’s Vulnerability Management Solutions for Proactive Security
By Nick Hogg
Cybersecurity needs have grown well beyond antiviruses and firewalls. Proactive, offensive security measures are crucial to help avoid the damaging effects of an attack, including customer and credibility loss, compliance penalties, and expensive corrective security actions. Fortra Vulnerability Manager, formerly Frontline VM, and beSTORM Dynamic Application Black Box Fuzzer can save your team...
cornerstone
Infrastructure Protection & Data Security Solutions
Protect business-critical data with automated security solutions that help you stay ahead of today's ever-changing threats.
News Article
Brakeing Down Security Podcast with Mieng Lim: Ransomware Best Practices
Vice President of Product Management, Mieng Lim joins the Brakeing Down Security podcast to discuss how to outsmart ransomware as a service (RaaS), looking in detail at strategies to implement before, during and after a ransomware attack.
Press Release
Ransomware Remains a Threat 30 Years On
At the ripe old age or 30, ransomware is nothing new. However, attack methods have evolved and so must our defenses.
News Article
Cybersecurity Interview with Mieng Lim
In Unite.AI’s cybersecurity interview, Mieng Lim, VP Product Management at Digital Defense by Fortra, talks about her career at Digital Defense and explains why vulnerability management is fundamental for today’s connected organization.
Press Release
Identifying Threats in the Network with Digital Defense’s Frontline.Cloud Solution
The onset of the pandemic and subsequent boom in remote working forced many organizations to accelerate their digital transformation programs. But in the rush to migrate to the cloud and against a backdrop of evolving cyber threats, are organizations leaving themselves vulnerable to cyber-attacks?
Press Release
Savvy Cyber Criminals Using Employees' Social Media Habits as a Weapon Against Companies
How do cyber criminals use the social media habits of employees to infiltrate organizations? Find out in this report.
Press Release
Despite the headlines, there's no need to feel hopeless about cybersecurity
What lessons are to be learned from the many cyber-attacks we hear about in the news? The advice from Mark Bell, Managing Director, Digital Defense by Fortra, is that companies shouldn’t lose hope.
Press Release
HelpSystems’ (now Fortra's) Data Security Week LIVE to Give Powerful Insights into Navigating Today’s Cyberthreat Landscape
Data security experts will present virtual, interactive sessions focused on protecting valuable information assets for attendees
On-Demand Webinar
Why Your IBM i Security Will Fail (and How to Fix It)
By Robin Tatam
The most common approaches to IBM i security share a serious flaw. Watch this webinar to learn how to fix it.
On-Demand Webinar
Is the California Consumer Privacy Act (CCPA) the Next GDPR and Why Should I Care?
In this session, you’ll learn why most organizations—not just those in California—are affected by the CCPA and what it means for IT pros.
Press Release
HelpSystems (now Fortra) Makes It Easier to Identify Security Events on IBM i
Fortra today announced the latest release of Powertech SIEM Agent for IBM i. The new version provides enhanced flexibility to meet the demands of increasingly complex IT environments.
cta_page
Schedule an IBM i Risk Assessment
Identifying the security gaps on your system is the first step toward fixing them. That’s why vulnerability assessments are a cybersecurity best practice and a requirement for mandates like PCI DSS, HIPAA, and GDPR. A Risk Assessment from Fortra is a thorough appraisal of your organization’s IBM i security configuration, including a micro-level analysis of system-specific configuration options and...
On-Demand Webinar
IBM i Security for Programmers
By Robin Tatam
In the first of this two-part webinar series, Robin Tatam combines his skills as a certified RPG developer with his IBM i security expertise. He’ll cover the security considerations that native application programmers should be keenly aware of as they design their applications.