Quote
Get Custom Pricing for the Offensive Security - Essentials Bundle
Build and enhance your offensive security program with this foundational security testing bundle that features both a powerful vulnerability management solution, Fortra VM, and an advanced penetration testing tool, Core Impact. Though these tools provide distinct ways to identify and prioritize security weaknesses, they are even more powerful when integrated together.
Pairing Fortra VM and Core...
News Article
Forbes: Scammers are Cracking Today’s More Secure Passwords
In his latest Forbes Advisor article, John Wilson, Senior Fellow, Threat Research at Fortra, looks at how fraudsters are targeting multifactor authentication and provides 3 ways to protect yourself.
News Article
7 Steps to Switch Your Organization to a Zero Trust Architecture
With so much information published on Zero Trust, it’s easy to see why organizations remain unsure about what it means, let alone move forward with adopting a framework. In this Help Net Security video, John Grancarich cuts through all the material and aligns it with the process recommended by NIST to create a Zero Trust Playbook.
News Article
Email Fraud Cyber Work Podcast Featuring John Wilson
John Wilson, Senior Fellow, Threat Research at Fortra features in this episode of Infosec’s Cyber Work Podcast. John covers all aspects of email fraud including business email compromise and phishing, and shares career tips and advice for budding threat researchers at all levels.
News Article
Infosecurity Magazine: Video Interview with Donnie MacColl Live from Infosec 22
Infosecurity Magazine’s Editorial Director, Eleanor Dallaway, interviews Donnie MacColl, Senior Director of EMEA Technical Services and DPO at Fortra, live from Infosec22.
News Article
Intelligent CIO: Interview with Ciaran Rafferty, Managing Director of Email Security, Fortra
Ciaran Rafferty, Managing Director, Email Security at Fortra, shares his thoughts on everything from cybersecurity trends to the future of email security in this interview with Intelligent CIO.
Press Release
Forta's Core Security Introduces New Ransomware Simulator
Core Security by Fortra, a leading provider of cyber threat solutions, today announced the addition of ransomware simulation to its penetration testing solution, Core Impact. Using an automated Rapid Pen Test, Core Impact users can now efficiently simulate a ransomware attack.
Article
The Difference Between OCR and IDP
Thu, 06/23/2022
Compare optical character recognition (OCR) and intelligent document processing (IDP) to learn when to use each to make structured and unstructured data more usable.
Resource
What Is Observability?
By Scott Adams on Thu, 06/09/2022
This blog explores the true definition of observability, its history, and the ideal outcome stemming from it.
Blog
4 Ways You Can Use Your Digital Rights Management Tool
Thu, 05/19/2022
Digital Rights Management tools can help give your organization the highest level of control and visibility possible over its data. Here are 4 ways to use it.
News Article
Brakeing Down Security Podcast with Mieng Lim: Ransomware Best Practices
Vice President of Product Management, Mieng Lim joins the Brakeing Down Security podcast to discuss how to outsmart ransomware as a service (RaaS), looking in detail at strategies to implement before, during and after a ransomware attack.
On-Demand Webinar
Affordable and Easy-to-Use High Availability with Robot HA
Watch this webinar to learn from our IBM i experts as they demonstrate how easy it is to navigate Robot HA and the simplicity of creating new rules.
News Article
The Dark Side of Business Email Attacks
Episode 194 of the Hacking Human’s podcast features John Wilson, Senior Fellow, Threat Research at Agari by Fortra.
Demo
Watch a Demo of Core Impact
Core Impact allows organizations to easily and efficiently conduct penetration tests, using the same techniques as today’s threat actors to assess the security of an IT environment. With an intuitive interface, security professionals can easily uncover and safely exploit security weaknesses, minimizing risk and protecting critical assets.
Core Impact can be used across vectors and helps...
On-Demand Webinar
Halcyon Features for Large Environments
Watch this webinar and learn how to leverage Halcyon monitoring software in large environments such as managed service providers (MSPs) and companies with multiple IBM i environments.
On-Demand Webinar
Streamlining the Exchange of Secure Data
Discover tactics for simplified data management in a world of huge data volumes