Blog
Going Phishing Isn't Seasonal–Get the Latest Results from 2023's Tournament
By Monica Delyani on Fri, 02/23/2024
Preview the latest global phishing benchmarking results and expert security awareness recommendations from Fortra's Terranova Security 2023 Gone Phishing Tournament.
page
The ROI of Capacity Management Software
Discover the return on invetment (ROI) you can expect when investing in capacity management software.
Blog
Patch Tuesday Update December 2023
By Tyler Reguly on Thu, 12/14/2023
It would seem that Microsoft was feeling particularly festive and wanted to give admins around the world a bit of a break this holiday season. This month, we see 36 Microsoft CVEs and six non-Microsoft CVEs for a total of 42 CVEs and eight of those CVEs are Edge (Chromium-based) vulnerabilities that were announced last week.
page
CIS Critical Security Controls
The CIS Critical Security Controls are widely accepted as a foundational security reference point for the modern enterprise. Fortra’s advanced portfolio of solutions provides organizations with the tools they need to meet the Controls and advance their cybersecurity maturity.
On-Demand Webinar
Navigating Today's HMC
The Hardware Management Console (HMC) has been around for many years, however, we still get plenty of questions from customers that are not familiar with the HMC. The HMC is nothing to be scared about – and IBM Power Champion Tom Huntington and we'll will show you why during this recorded webinar.
product_page
Tripwire ExpertOps
The Industry’s Best FIM, SCM, and VM as a Managed Service Tripwire® ExpertOps provides file integrity monitoring (FIM), security configuration management (SCM), and vulnerability management (VM) as a managed service to arm you with the solution operation, support, and advice you need to stay compliant and reduce your attack surface.
product_page
Tripwire Enterprise
Real-time Change Monitoring for Unmatched Security and Compliance With decades of proven success, Tripwire® Enterprise leads the way in file integrity monitoring (FIM) and security configuration management (SCM) to catch indicators of compromise and automate compliance.
Blog
Evolve Your Security Strategy to Prepare for DORA
By Antonio Sanchez on Thu, 07/27/2023
Although the DORA compliance deadline is further away, financial institutions regulated by the Act should start preparing their journey now, before the last minute panic keeps knocking on your door. Antonio Sanchez breaks down the five DORA pillars and highlights what it takes to evolve your security effort.
On-Demand Webinar
IBM i Capacity Planning – Cloud, On-Prem, or Hybrid?
By Randy Watson
Our IBM i experts discuss the most important items to consider when developing a capacity plan – from necessary skills and software licensing to financial implications.
Guide
The Ultimate Guide to DORA Compliance for the Financial Sector
The Digital Operational Resilience Act (DORA) applies to over 22,000 financial entities and ICT providers in the EU. It introduces an end-to-end framework for effective risk managements, ICT and cyber security operational capabilities, and third-party management to assure the consistent delivery of services along the financial value chain. This comprehensive guide covers everything you need to...
On-Demand Webinar
Expert Advice on IBM i in the Cloud
Watch this session to gain insight into the best practices for migrating and staying in the cloud. Fortra’s Executive VP of Technical Solutions Tom Huntington teams up with Tom Horan of Meridian IT, a cloud expert with over 12 years of cloud experience.
Guide
Fortra's Complete Guide to Layered Offensive Security
Most organizations have a decent understanding of the types of defensive security tactics they need to employ to thwart cyberattacks. But offensive security techniques are just as important for detecting existing vulnerabilities that a threat actor has yet to discover and exploit. Learn how to approach offensive security from the ground up, including the value of using a layered security approach...
Datasheet
How Fortra Supports the Zero Trust Journey
What Zero Trust means, tips for getting started, and how Fortra solutions support your Zero Trust security journey.
On-Demand Webinar
Fortra’s Adversary Simulation and Red Teaming Solution for Proactive Security
By Nick Hogg
While employing defensive measures to prevent cybercriminals from breaching security measures are critical initiatives, more is needed to protect your infrastructure. Proactive, offensive layered security solutions are now just as much of a necessity. Security teams need to be able to get into the mind of an attacker and see where an organization’s exploitable weaknesses are so they can close them...