Demo
Want to see what's new in Automate 24.2?
Watch an on-demand demo of the latest Automate release now! Get instant access to an on-demand demo showcasing the latest and greatest features in Automate. Automate 24.2 is here! What you'll see in our latest version:Agent NotificationsDynamic 365 ActionEvaluateExpression(Expression) Extended FunctionWeb Browser Action EnhancementAnd more! ...
Article
What's New in Automate
Mon, 10/16/2023
That latest version of Automate has just been released. Find out more about what's new!
Fortra Cybersecurity Software Bundles
Learn how Fortra software bundles feature powerful product combinations that solve complex cybersecurity challenges in innovative ways.
Video
Zero Trust File Transfer Bundle
Fri, 06/24/2022
What happens to files after they are securely transferred to their end recipients? Our Zero Trust File Transfer Bundle helps you maintain control and security for files wherever they travel. Watch the video for a quick overview of how the bundle can easily encrypt and control file access.
...
Case Study
Summit Credit Union Transforms Mortgage Department with RPA
Summit Credit Union turned to mortgage process automation from Automate to connect Blend and Mortgage Cadence to achieve a streamlined mortgage application process.
Datasheet
Clearswift Secure ICAP Gateway
The Secure ICAP Gateway complements existing web proxy infrastructures and MFT software to provide an added layer of data security.
Datasheet
SFT Threat Protection
Fortra offers seamless threat protection within our secure file transfer solutions to ensure every file transfer crossing your MFT platform has been inspected and cleared to continue.
Blog
Data-Centric Security: What is it and Why Does it Matter?
By Steph Charbonneau on Mon, 11/29/2021
A data-centric security architecture takes data security a vital step further to protect the actual data from ever-increasing data breach threats.
Blog
Data Privacy vs. Data Security: What’s the Difference?
Tue, 11/09/2021
Learn the Difference between Data Privacy and Data Security. Data privacy can’t happen without layered Data Security measures applied throughout the sensitive Data’s lifecycle.
Blog
A Beginners Guide to Protecting Your Data
By Steph Charbonneau on Wed, 11/03/2021
In this blog, Steph Charbonneau, Senior Director of Industry Strategy at Fortra, talks you through some of the most valuable aspects of data protection and how to measure success of your organizational programs.
Blog
Corporate Data Security Policy: What, Why, and How
By Steph Charbonneau on Tue, 10/12/2021
Creating a corporate data security policy is a “must” in today’s evolving cybersecurity environment. Here’s a few tips on best practices.
Case Study
Fortra MFT and Secure ICAP Gateway Keep Government Services Rolling Securely and Remotely
A North American government agency with more than 1,500 employees needed to give citizens better ways to perform civic data sharing remotely due to the COVID-19 pandemic.
Guide
A Guide to IBM i Message Management
This guide teaches you how to handle IBM i message management, including the fastest and more accurate ways to monitor for messages, filter critical messages, and escalate messages to members of your team as needed.
Article
Be in Control of Your ERP
By Chuck Losinski on Wed, 03/31/2021
Many ERP packages have built-in schedulers. However, these schedulers are typically not flexible or robust enough to meet the needs of even the smallest data center.
Guide
Robot in Modern IBM i Environments
Robot systems management solutions can improve processes and enhance the return on investment for new technologies running in modern IBM i environments. Find out how.
Blog
Realize ROI with Robot
By Tom Huntington on Sun, 03/28/2021
Robot has a reputation for providing high-quality systems management software and backing it up with great support. These additional benefits can help you justify the cost of automation at your company.
Blog
15 Business Process Automation Examples
Sun, 11/29/2020
Read these 15 top business process automation (BPA) examples and see how your organization can streamline mission-critical processes.