Datasheet
Clearswift Secure ICAP Gateway
The Secure ICAP Gateway complements existing web proxy infrastructures and MFT software to provide an added layer of data security.
Press Release
Ransomware Remains a Threat 30 Years On
At the ripe old age or 30, ransomware is nothing new. However, attack methods have evolved and so must our defenses.
Datasheet
SFT Threat Protection
Fortra offers seamless threat protection within our secure file transfer solutions to ensure every file transfer crossing your MFT platform has been inspected and cleared to continue.
Blog
Data-Centric Security: What is it and Why Does it Matter?
By Steph Charbonneau on Mon, 11/29/2021
A data-centric security architecture takes data security a vital step further to protect the actual data from ever-increasing data breach threats.
Press Release
Top Secure Email Gateway Solutions for 2021
What is a Secure Email Gateway and what key features do you need? Find out in this eSecurityPlanet article which also identifies Clearswift’s Secure Email Gateway as one of the top solutions for 2021.
Datasheet
Clearswift Secure Email Gateway
Clearswift’s award-winning Secure Email Gateway to provide the highest level of protection for email, transforming it from a high-risk communication channel to one that is safe and secure.
Blog
Top 6 Data Security Challenges and How to Address Them
By Scott Messick on Tue, 11/16/2021
Addressing an organization’s data security challenges requires some heavy lifting – no question about it. Rather than cobble together a piecemeal solution strategy, rely on trusted, integrated, and scalable data security solutions.
On-Demand Webinar
2021 Business Intelligence Week
Watch this webinar series for your FREE opportunity to learn what every user should know about Sequel Data Access, plus advanced tips and tricks for improved IBM i (iSeries, AS/400) business intelligence.
On-Demand Webinar
IBM i Automation Series: Performance
Watch this webinar series for your FREE opportunity to learn what every user should know about Robot Monitor and Performance Navigator software for IBM i (iSeries, AS/400) monitoring, plus advanced tips and tricks.
Blog
Data Privacy vs. Data Security: What’s the Difference?
Tue, 11/09/2021
Learn the Difference between Data Privacy and Data Security. Data privacy can’t happen without layered Data Security measures applied throughout the sensitive Data’s lifecycle.
Blog
Three Ways Intermapper Supports Regulatory Compliance and Auditor Requirements
By Kevin Jackson on Thu, 11/04/2021
Complying with cybersecurity mandates like HIPAA, SOX, PCI-DSS, NIST or CMMC is challenging. But proving your organization is compliant can be even more difficult. Discover how Intermapper offers leading network monitoring, mapping, and alerting tools that can help you meet regulatory requirements and prepare for compliance audits.
Blog
A Beginners Guide to Protecting Your Data
By Steph Charbonneau on Wed, 11/03/2021
In this blog, Steph Charbonneau, Senior Director of Industry Strategy at Fortra, talks you through some of the most valuable aspects of data protection and how to measure success of your organizational programs.
On-Demand Webinar
Mobilize Your IBM i Data in a Browser
With Sequel Web Interface, users get the benefit of up-to-the-minute data access in a comfortable environment: the browser. Watch this webinar to learn more!
Press Release
What Firms Should Know About A New Python Ransomware that Targets VMs
Sophos recently observed a new python-based ransomware attack. Mieng Lim joins the commentary in this CXO Today article.
Blog
Corporate Data Security Policy: What, Why, and How
By Steph Charbonneau on Tue, 10/12/2021
Creating a corporate data security policy is a “must” in today’s evolving cybersecurity environment. Here’s a few tips on best practices.
Case Study
Fortra MFT and Secure ICAP Gateway Keep Government Services Rolling Securely and Remotely
A North American government agency with more than 1,500 employees needed to give citizens better ways to perform civic data sharing remotely due to the COVID-19 pandemic.
Article
Where Does CPU Go When It’s Missing?
By Kurt Thomas on Thu, 10/07/2021
Have you ever noticed that the CPU used by individual jobs does not add up to 100 percent? As it turns out, your jobs and subsystems are only part of the story. For the stunning conclusion, we return you to the Licensed Internal Code (LIC).
Press Release
What can Organizations do to Reduce the Risk of Ransomware?
With the news that the Biden Administration is bringing together 30 countries to discuss and address the threat of ransomware later this month, Digital Defense provides insight on how organizations can reduce their risk in this IT Nerd guest blog.
News Article
Cybersecurity Interview with Mieng Lim
In Unite.AI’s cybersecurity interview, Mieng Lim, VP Product Management at Digital Defense by Fortra, talks about her career at Digital Defense and explains why vulnerability management is fundamental for today’s connected organization.