Blog
The Evolution and Advancement of Penetration Testing Under Covid-19
Fri, 05/21/2021
Brian Wenngatz, general manager at Core Security, a Fortra company, discusses the advancement of penetration testing during Covid-19.
Blog
Six Strategies to Ensure You Give the Right Access to the Right People at the Right Time
Mon, 08/31/2020
Part 2 of the Improving Your Security-Efficiency Balance Series:
One of the primary challenges organizations wrestle with in identity governance is how to achieve the right balance in their company between security and efficiency. In Part 1 of the Improving Your Security-Efficiency Balance Series, we examined the unique balancing act organizations face when it comes to user...
Blog
The Evolution of Cybersecurity Solutions for Organizations
Tue, 08/11/2020
In the early days of the internet, cybersecurity was fairly straightforward, with all solutions and strategies geared toward prevention. While prevention remains critical, cybersecurity has also had to evolve, with businesses layering their defenses and regularly evaluating the status of their safeguards to adapt to change—whether those be organizational or within the wider cybersecurity sphere.
Blog
Open Source SIEM vs. Enterprise-Level SIEM: Which Is Right for You?
Thu, 07/16/2020
Open source and enterprise-level SIEM solutions all have pros and cons. Here are some factors to look at when comparing your options—including one you might not have considered yet.
Blog
Four Network Security Challenges for Organizations with a Remote Workforce
By Bob Erdman on Wed, 03/25/2020
Blog
Three Lessons Learned from A Data Breach
By Bob Erdman on Mon, 02/24/2020
Simple lessons learned from the many breaches we’ve observed, like careless employees and unusual attack vectors, and ways they can be avoided.
Blog
What Is SIEM?
Fri, 12/20/2019
SIEM (security information and event management) software provides insights into potential security threats through data normalization and threat prioritization, giving IT professionals an effective method of automating processes and centralizing security management in a way that helps them simplify the difficult task of protecting sensitive data.
Blog
Monitoring Application Security with SIEM
By Bob Erdman on Wed, 11/27/2019
Learn about the large variety of information a SIEM can consolidate, becoming your organization’s primary security monitoring tool.
Blog
You Can’t Protect What You Can’t See: Improving Cybersecurity with Monitoring Solutions
By Bob Erdman on Mon, 10/07/2019
Find out how SIEMs with threat escalation, centralization, diverse integrations, and collaboration with network monitoring tools can help clear the line of sight.
Blog
How to Calculate RPA ROI
By John Grancarich on Fri, 09/27/2019
Once you get an RPA project up and running, how do you know if it's successful or not? How do you measure the ROI?
I'm going to walk you through, in real time, how to calculate RPA ROI for your project. To show you how we can do this, we're going to take a real Fortra RPA customer example and walk you through the analysis.
Visit this page to...
Blog
Navigating Toward a Password-Free Future with Privileged Access Management
By Bob Erdman on Fri, 09/13/2019
Discover how you can move toward a password-free future with privileged access management (PAM) solutions and adopt a more secure standard for authentication in your organization.
Blog
Working with Software Robots: Top 5 Ways to Spark Collaboration with RPA Bots
Tue, 09/10/2019
Learn how with robotic process automation (RPA), your employees can work with collaborative robots to be more productive, accurate, and get more free time.
Blog
Silencing the Bells: How a SIEM Can Prevent Alert Fatigue
By Bob Erdman on Tue, 07/30/2019
Find out how Security Information and Event Management (SIEM) solutions can streamline security and prevent alert fatigue.
Blog
How to Get Started with RPA
By John Grancarich on Fri, 07/05/2019
RPA is one of the fastest growing segments in the enterprise software space, and I want to tell you just a little bit about it. So, what is RPA? Well, at its simplest, RPA is software that automates human tasks.
Four characteristics for a good RPA project
Repetitive Tasks
Rule Based
High Volume
Prone to Human Error
You might be wondering,...
Blog
Fortra is Headed to the Red Hat Summit
By Bob Erdman on Wed, 05/01/2019
It’s an important year as Red Hat celebrates its 15th summit, and we couldn’t be prouder to be a sponsor of this exciting event.
Blog
The Cybersecurity Dangers of the Dark Web and How to Protect Your Organization
By Bob Erdman on Thu, 04/25/2019
As long as the dark web exists, organizations must learn more about the threat they pose, and how to protect themselves.
Blog
Evaluating Security Information and Event Management: Eight Criteria for Choosing the Right SIEM Solution
By Bob Erdman on Tue, 04/16/2019
SIEMs differ widely in terms of features, so it’s important to evaluate your own environment to determine what your priorities are. Consider these eight criteria when looking at different options in order to find a solution that meets your specific needs.