Resources

On-Demand Webinar

Out With AFP, in With iForms

Watch now for an informative webinar where Document Management expert Greg Schmidt discusses iForms' value as a modern alternative to AFP and walks you through how to use iForms to create a variety of business critical documents.
Datasheet

iForms™

iForms enables you to create professional forms and reports from any data source.
On-Demand Webinar

Top Mistakes You Could be Making in Email Security

Email threats are constant and remain a highly sought-after opportunity for data theft. Alyn Hockey, Vice President of Product Management, discusses the top mistakes made in email security, the problems they cause, and how to fix these mistakes.
Press Release

Response-Based Email Threats Targeting Corporate Inboxes Are The Highest Since 2020, According To Fortra's Latest Agari And PhishLabs Report

Response-based attacks targeting corporate inboxes have climbed to their highest volume since 2020, representing 41 percent of all email-based scams targeting employees, during Q2 of this year. This is according to the latest Quarterly Threat Trends & Intelligence Report from Agari and PhishLabs, part of the Fortra cybersecurity portfolio.
Datasheet

Offensive Security - Elite Bundle

Fortra Vulnerability Management (formerly Frontline VM™), Core Impact, and Cobalt Strike are three powerful security tools that evaluate the security of their environments in order to better identify security vulnerabilities and predict their potential impact. Though they all share the same goal of proactively assessing risk, they are still distinct tools with distinguishing features that...
Datasheet

Offensive Security - Essentials Bundle

Fortra Vulnerability Management (formerly Frontline VM™ ) and Core Impact are two robust security tools designed to evaluate business critical networks and infrastructure for security vulnerabilities. Though both tools work to identify and prioritize security weaknesses, each offers unique strengths and distinct features. Fortra VM is a SaaS vulnerability management solution , mostly used for...
Datasheet

Offensive Security - Advanced Bundle

Core Impact and Cobalt Strike are two powerful tools that help organizations assess the security of their environments. Though they share the same goal of providing insights to help bolster security efforts, they are otherwise distinct tools with unique features. Core Impact is a penetration testing tool, primarily used for exploitation and lateral movements in various environments. Cobalt Strike...
News Article

Email Fraud Cyber Work Podcast Featuring John Wilson

John Wilson, Senior Fellow, Threat Research at Fortra features in this episode of Infosec’s Cyber Work Podcast. John covers all aspects of email fraud including business email compromise and phishing, and shares career tips and advice for budding threat researchers at all levels.
Blog

What is a Vulnerability Management Program?

The Equifax breach was caused by a vulnerability. The WannaCry virus exploited a vulnerability. The stories don’t seem to end but it seems like no one is talking about how to solve this problem which is: start a vulnerability management program. “Manage the vulnerabilities in my network? Sounds easy” well, not so much, but not so difficult that you shouldn’t be spending time and resources on it...
Blog

6 Ways to Defend Yourself Against Password Attacks

Ever since Ali Baba uttered “open sesame,” thieves have been using stolen passwords to access hidden riches. In the digital world, password attacks have been and continue to be a common way for threat actors to gain access to an organization’s treasure trove of data. No matter how many emails we get from IT explaining what makes a good password, many of us still use the same basic password in...
Guide

2022 Pen Testing Report

How effective are your existing security controls against a skilled threat actor? With cyber attacks now a common place occurrence, organizations are regularly having to ask themselves this question, and often get the answer only after an attack occurs. Penetration tests are a safe way to proactively evaluate cybersecurity programs, uncovering and exploiting security threats to find out what level...
Blog

Source Authentication for Email

This guest blog from Dr Edward Amoroso, Tag Cyber provides a high-level overview of modern advances in email security using source authentication and how the Fortra cybersecurity portfolio supports this important method for reducing information risk in enterprise.