On-Demand Webinar
Your Side of the AWS Shared Security Model
Tue, 11/21/2023
Discover the breadth of solutions that Fortra offers to help you with your side of the AWS shared security model.
Guide
2023 Domain Impersonation Report
Current Domain Threats, Trends, and Techniques
Domain impersonation is the foundation for a multitude of online threats. Because a domain is dynamic, identifying when and how it will be used for malicious purposes can be challenging for security teams, and requires constant monitoring for behavior that will validate removal.
In the 2023 Domain Impersonation Report, we review look-alike domain...
Guide
Preventing Domain Impersonation
How to Stop Look-Alike Domains and Spoofing
In the first half of 2023, cybercriminals targeted company brands using an average of 40 look-alike domains per month. Domain impersonation threats trick users into giving away sensitive information by convincing them an email is from a trusted source or a website is authentic.
It’s crucial that companies take preventive measures against look-alike...
On-Demand Webinar
Email Security Best Practices: How to Protect Against Advanced Threats
Fri, 09/30/2022
Unfortunately, the bad news about data breaches, cybersecurity scams, and email attacks is constant and the numbers are more staggering with each year. Learn which steps to take NOW to protect your organization’s email ecosystem, such as collecting threat intelligence, mitigating against brand impersonation, and training your employees on security awareness, all while maintaining compliance.
...
On-Demand Webinar
How to Prepare for PCI DSS 4.0
PCI DSS 4.0 is here, and you may have questions. Our webinar can help you navigate questions your organization may have in order to get ready for the March 2025 deadline.
On-Demand Webinar
Top Mistakes You Could be Making in Email Security
By Alyn Hockey
Email threats are constant and remain a highly sought-after opportunity for data theft. Alyn Hockey, Vice President of Product Management, discusses the top mistakes made in email security, the problems they cause, and how to fix these mistakes.
On-Demand Webinar
How to Keep Sensitive Data Safe and Compliant
By Nick Hogg
Keeping data secure is a constant exercise of fighting cyber threats that change daily and maintaining a strong training program for employees to stay vigilant. On top of protecting your data, it needs to be compliant which can be a daunting task - especially if your business transcends geographical boarders. Some of the most impactful regulations are General Data Protection Regulation (GDPR) and...
On-Demand Webinar
Panel Discussion: Email Security Trends and Your Protection Ecosystem
Watch this webinar to hear about the latest email scams and how they can impact your protection ecosystem.
On-Demand Webinar
Clearswift Secure Email Gateway - Bridging the Security Gaps
By Alyn Hockey
Watch this video to see where you may be at risk for cyberattacks not currently protected from your existing email security.
On-Demand Webinar
Storage Best Practices for HA/DR on IBM i
Watch this webinar where you’ll learn how to clean up IBM i storage to improve your high availability and disaster recovery plans and reach your business continuity objectives.
On-Demand Webinar
Virtual Tape Library (VTL) Technology for IBM i
During this 1-hour session, Fortra and LaserVault experts join forces to discuss the merits of virtual tape and show you how VTL technology can replace your traditional tape backups.
Guide
Robot in Modern IBM i Environments
Robot systems management solutions can improve processes and enhance the return on investment for new technologies running in modern IBM i environments. Find out how.
On-Demand Webinar
Remote Management for IBM i Backups
Watch this recorded webinar to learn the tools and techniques you need to set up remote management for unattended IBM i (iSeries, AS/400) backups.
On-Demand Webinar
Lights-Out Automation for IBM i Data Centers
In a time when unattended computer operations are expected, IBM i is the right platform. Watch this webinar to get the success formula for lights-out automation.
On-Demand Webinar
An Automated Recovery Plan Auditors Will Love
Boom. Disaster strikes. Now, it’s up to you to find the tape volume that contains the lost data and restore it quickly to the correct location. Luckily, recovering your IBM i data is easy with Robot Save.
On-Demand Webinar
An Introduction to PCI Compliance on IBM Power Systems
By Robin Tatam
Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?