Blog
How to Make a Network Map in 5 Easy Steps
Thu, 03/21/2024
Your network is complex, but creating a helpful, dynamic map doesn't have to be - learn how to create a network map with Intermapper.
Blog
Top 8 Benefits of Network Monitoring
Thu, 03/14/2024
Lack of network visibility makes life hard for IT. Network monitoring helps you stay ahead of outages with real-time visibility into your network health.
Blog
Going Phishing Isn't Seasonal–Get the Latest Results from 2023's Tournament
By Monica Delyani on Fri, 02/23/2024
Preview the latest global phishing benchmarking results and expert security awareness recommendations from Fortra's Terranova Security 2023 Gone Phishing Tournament.
Guide
Going Beyond the GUI
Modernization is more than simply switching from a green screen to a GUI. To have a truly modern IBM i data center, you must consider all areas of IT from your software and applications to your hardware and devices to the processes that support the whole operation. This guides helps you modernize your IBM i from the ground up.
Blog
Patch Tuesday Update December 2023
By Tyler Reguly on Thu, 12/14/2023
It would seem that Microsoft was feeling particularly festive and wanted to give admins around the world a bit of a break this holiday season. This month, we see 36 Microsoft CVEs and six non-Microsoft CVEs for a total of 42 CVEs and eight of those CVEs are Edge (Chromium-based) vulnerabilities that were announced last week.
page
CIS Critical Security Controls
The CIS Critical Security Controls are widely accepted as a foundational security reference point for the modern enterprise. Fortra’s advanced portfolio of solutions provides organizations with the tools they need to meet the Controls and advance their cybersecurity maturity.
Product Video
Performance Navigator Overview and Demonstration
Wed, 09/27/2023
Watch this video for an overview of Performance Navigator’s key components and a demonstration of how you can use it to optimize your IT enterprise.
product_page
Tripwire ExpertOps
The Industry’s Best FIM, SCM, and VM as a Managed Service Tripwire® ExpertOps provides file integrity monitoring (FIM), security configuration management (SCM), and vulnerability management (VM) as a managed service to arm you with the solution operation, support, and advice you need to stay compliant and reduce your attack surface.
product_page
Tripwire Enterprise
Real-time Change Monitoring for Unmatched Security and Compliance With decades of proven success, Tripwire® Enterprise leads the way in file integrity monitoring (FIM) and security configuration management (SCM) to catch indicators of compromise and automate compliance.
Article
The Importance of VIOS
Thu, 08/31/2023
VIOS is considered a standard in organizations running IBM i, AIX, and Linux workloads. But don’t put your business at risk by letting it run unchecked. Learn five areas you must be monitoring.
Blog
Evolve Your Security Strategy to Prepare for DORA
By Antonio Sanchez on Thu, 07/27/2023
Although the DORA compliance deadline is further away, financial institutions regulated by the Act should start preparing their journey now, before the last minute panic keeps knocking on your door. Antonio Sanchez breaks down the five DORA pillars and highlights what it takes to evolve your security effort.
Product Video
Robot Monitor Product Overview and Demonstration
Wed, 07/26/2023
Watch this recording to get an overview of Robot Monitor’s key features – including SQL monitoring, customization to workloads, and the ability to create your own SQL-based monitor – as well as an inside look at how to operate Robot Monitor and customize its outputs to your liking.
Guide
The Ultimate Guide to DORA Compliance for the Financial Sector
The Digital Operational Resilience Act (DORA) applies to over 22,000 financial entities and ICT providers in the EU. It introduces an end-to-end framework for effective risk managements, ICT and cyber security operational capabilities, and third-party management to assure the consistent delivery of services along the financial value chain. This comprehensive guide covers everything you need to...
Guide
Fortra's Complete Guide to Layered Offensive Security
Most organizations have a decent understanding of the types of defensive security tactics they need to employ to thwart cyberattacks. But offensive security techniques are just as important for detecting existing vulnerabilities that a threat actor has yet to discover and exploit. Learn how to approach offensive security from the ground up, including the value of using a layered security approach...