Watch this webinar to learn how to effectively leverage a web-based document & workflow management solution to address the top five document management use cases.
Understanding the document lifecycle is the first step in implementing a document management strategy that can bolster your security and compliance efforts. Watch this webinar to learn more.
Elevating your organization’s security maturity level requires a forward-leaning approach to cybersecurity leadership. This article discusses key security fundamentals, advanced strategies, and steps to assess and build a robust security maturity model that supports business goals.
The popularity of cloud-based file sharing services such as AWS, Dropbox, and OneDrive is undeniable. However, these user-friendly solutions come with some critical security drawbacks.Join Scott Messick, Lead Solutions Engineer, Fortra Dec. 12, as he discusses the pros and cons of cloud file sharing and introduce the advantages secure, managed file transfer (MFT) offers for...
Watch the recordings from Fortra's virtual event with COMMON, where our experts offered insight and examples of how organizations on IBM i can improve their security, operations, business intelligence, and document management strategy.
Research suggests that 98% of organizations are currently doing business with a third party that’s been breached. Learn about the main types of supply chain attacks today and the simplest steps to stay safe.
For National Cybersecurity Awareness Month 2024, Antonio Sanchez, Principal Cybersecurity Evangelist at Fortra, contributed expert tips to VM Blog’s latest collection.
Bob Erdman |
Chris Reffkin |
John Wilson |
Theo Zafirakos
In many ways, 2024 has been a landmark year for cybersecurity. At Fortra, our cybersecurity experts have no shortage of opinions on where we’ll go next. From cyber insurers raising the bar with their own compliance requirements to shifting market dynamics, the events of 2024 will have significant consequences for the shape of the industry in the months ahead. Tune in as a...
Session DetailsThe risk you carry as an enterprise is no longer entirely in your control. Or is it?Join Fortra as we discuss one of the hottest topics in cybersecurity today: third-party risk. Partnering with outside organizations can be an instant liability, but in today’s vastly interconnected business economy, it's a necessary evil. Lengthened supply chains facilitate faster and cheaper...
Surveyor/400 allows I.T. personnel and end-users to easily work with IBM i data, files, libraries, objects, and reports from within a graphical desktop interface. Powerful security and audit features are included in Surveyor/400 to provide complete control over user activity within the product.A wide variety of users can take advantage of the benefits of Surveyor/400. With its extensive built-in...
RPG Toolbox will modernize your RPG source code with the most up-to-date free form syntax available for your IBM i release. The conversions can be performed from IBM's RDi development environment, PDM or from SEU. The flexibility of the RPG Toolbox allows you to convert entire source members or just blocks of source code within a member.With RPG Toolbox, developers can watch how the old source...
In a new article for CyberTech Insights, John Grancarich, Fortra's Chief Strategy Officer, explores why security awareness training matters more than ever. Drawing from personal experiences with cyber extortion and phishing, John highlights how continuous practice can better prepare us for real-world risks.Originally published in CyberTech Insights.Excerpt:“We’re not going to get any less busy, so...
Fortra’s cybersecurity experts share insights into their customers’ top concerns and strategies for 2025. This article uncovers how businesses prepare to navigate the evolving cybersecurity landscape, from static budgets to compliance pressures and modern threats.
As the world prepares for the 2024 election cycle, cybersecurity, disinformation, and AI-driven manipulation are emerging as major threats to democratic processes. From deepfakes to foreign influence campaigns, the risks to election integrity are growing. Individuals, businesses, and governments must unite to protect global elections from these evolving challenges.