Tripwire Enterprise
Real-time Change Monitoring for Unmatched Security and ComplianceWith decades of proven success, Tripwire® Enterprise leads the way in file integrity monitoring (FIM) and security configuration management (SCM) to catch indicators of compromise and automate compliance.
...
Blog
Accelerating Security Maturity with Fortra Bundles
Tue, 08/29/2023
In The Importance of Layering Offensive Security Solutions, Fortra experts underscore the advantage of developing a single source offensive security tooling portfolio. Read on to find out the necessary ingredients for a proactive strategy and why Fortra’s ability to combine and maximize solutions optimizes security and produces the most effective outcomes.The Five Elements of an Offensive Security...
On-Demand Webinar
Zero Trust on IBM i: What It Is and Why It Matters
By Kurt Thomas
Watch Kurt Thomas and George Hibler discuss why Zero Trust on IBM i is important, what Zero Trust on IBM i looks like, and how to implement it.
News Article
Black Hat 2023: Bob Erdman on the Dark Reading News Desk
By Bob Erdman on Mon, 08/21/2023
Bob Erdman joined the Dark Reading News Desk live at Black Hat 2023. He spoke about Fortra’s collaboration with Microsoft and Health-ISAC to stop unauthorized software usage.
Press Release
Fortra Introduces New Integrations for Offensive Security
Fortra today announced new integrations for its offensive security solutions that streamline capabilities for vulnerability management, penetration testing, and red teaming. Working together, the solutions apply the same techniques used by threat actors to identify and exploit gaps in an organizations’ security. With this proactive security approach, customers can find and fix weaknesses in their security posture before they are exploited.
Blog
Understanding CVE 2023-30990: The Vulnerability Exploiting the DDM
By Amneris Teruel on Tue, 07/25/2023
Discover CVE-2023-30990 - Unauthenticated RCE in IBM i DDM Service. Learn what this vulnerability is, how it impacts the IBM i, and how you can prevent as well as assess your exposure to it.
On-Demand Webinar
Help! I inherited an IBM i!
If you've inherited an IBM i and are unfamiliar with the platform, watch this recorded session where our experts share proven strategies for your successful education in IBM i systems management.
Fortra Cybersecurity Software Bundles
Learn how Fortra software bundles feature powerful product combinations that solve complex cybersecurity challenges in innovative ways.
Offensive Security Product Bundles
Our modern threat landscape is constantly evolving, and a proactive approach must now be as central to any security strategy as defensive tactics. Reactive controls will always be a necessity, but organizations can also work to reduce the attack surface by anticipating a breach and detecting and responding to security weaknesses before serious impact is felt. Get ahead of attackers with...
On-Demand Webinar
The Foundation of IBM i Security Defense
By Sandi Moore
At the core of every successful IBM i security strategy is the exact same set of fundamentals. In this recorded session, IBM i security expert Sandi Moore discusses what those fundamentals are and how to get started.
Guide
PCI DSS 4.0 Compliance: Tips to Avoid Last-Minute Panic
The impending Payment Card Industry Data Security Standard (PCI DSS) 4.0 requirements were created to curtail rampant fraud and the billions in losses victims incur. That said, retooling your operations to meet ever-evolving compliance standards isn’t easy.
This guide gives you a detailed look at PCI DSS 4.0 changes and how you can achieve compliance with the updated requirements. Having a...
On-Demand Webinar
Expert Advice on IBM i in the Cloud
Watch this session to gain insight into the best practices for migrating and staying in the cloud. Fortra’s Executive VP of Technical Solutions Tom Huntington teams up with Tom Horan of Meridian IT, a cloud expert with over 12 years of cloud experience.
Guide
Fortra's Complete Guide to Layered Offensive Security
Most organizations have a decent understanding of the types of defensive security tactics they need to employ to thwart cyberattacks. But offensive security techniques are just as important for detecting existing vulnerabilities that a threat actor has yet to discover and exploit.
Learn how to approach offensive security from the ground up, including the value of using a layered security...
Datasheet
How Fortra Supports the Zero Trust Journey
What Zero Trust means, tips for getting started, and how Fortra solutions support your Zero Trust security journey.
Blog
How to Meet Cyber Insurance Requirements for IBM i
Thu, 03/02/2023
Discover what cyber insurance is, the solutions you may need to qualify or lower premiums, and what Fortra offers to assist your IBM i organization with becoming cyber insured.
Datasheet
Advanced Red Team Bundle
Core Impact, Cobalt Strike, and Outflank Security Tooling (OST) are three powerful security solutions that use the same techniques as today’s threat actors in order to safely evaluate organizational infrastructures and provide guidance on closing security gaps, enhancing defenses, and creating more resilient security strategies.
Core Impact is an automated penetration testing tool, typically...
Datasheet
Red Team Bundle
Cobalt Strike and Outflank Security Tooling (OST) are two elite red teaming solutions ideal for assessing the security posture of an organization by deploying sophisticated adversary simulations.
Cobalt Strike is a threat emulation tool that provides a post-exploitation agent and covert channels, replicating the tactics and techniques of an advanced adversary in a network. OST is a curated set...
On-Demand Webinar
How to Protect Your AIX Servers from Malware
By Sandi Moore
The threat of malware and ransomware is nothing new—but now even AIX servers are at risk. Join this session to learn about the current threat landscape and how to minimize your exposure to malicious programs.