On-Demand Webinar
Data Security Challenges: How Our Suite Helps
By Nick Hogg
Image
Data security is hard. We’re not going to sugarcoat it.
In this 60-minute webinar we'll:
Discuss the best practices for protecting your data throughout its lifecycle
Introduce our full data security suite, which provides protection from creation to publication, and sharing of your sensitive data.
Explore some common use...
On-Demand Webinar
Cybersecurity Trends in 2019 and Predictions for 2020
By Bob Erdman
Count down the top cybersecurity trends of 2019 and hear predictions for what’s to come in 2020. 2020 looks to be just as exciting as 2019, with ample opportunities for organizations to improve their cybersecurity stance.
On-Demand Webinar
How Organizations are Responding to the Continuing Challenge of Ransomware
By Bob Erdman
In this webinar, cybersecurity experts discuss ransomware motivations and perpetrators of attacks, who is at the highest risk, and the most effective solutions to this pervasive problem to help you better understand ransomware and reduce the large threat it poses.
On-Demand Webinar
How to Mitigate Cyber Risk with Security Information and Event Management (SIEM)
By Bob Erdman
In this webinar, cybersecurity experts Bob Erdman, Security Product Manager at Fortra, and Holger Schulze, CEO and Founder of Cybersecurity Insiders will discuss how to mitigate cyber risk through SIEM.
On-Demand Webinar
Powertech Event Manager Feature Tour
By Bob Erdman
Watch this in-depth feature tour to see how our SIEM solution, Powertech Event Manager, combats alert fatigue and translates data into actionable intelligence, allowing security teams to stay ahead of the curve.
On-Demand Webinar
Pro Tips for IBM i User Access Management
By Robin Tatam
Watch this webinar to learn how to increase user efficiency and improve your IBM i security posture at the same time.
On-Demand Webinar
Top Reasons to Move from Syslog to a SIEM
By Bob Erdman
Join cybersecurity expert Bob Erdman, Security Product Manager at Fortra as he discusses how a SIEM can make a world of difference when it comes to efficiently managing security events.
Guide
Choosing the Right SIEM Solution to Face Today's Security Challenges
What Makes a SIEM Solution Effective?
SIEM solutions have become an essential part of many organization's security toolkits. SIEM technology gives organizations helpful insights into potential security threats across critical business networks, streamlines compliance reporting, improves efficiencies, and provides peace of mind.
Given the immense benefits and an increase in...
On-Demand Webinar
How to Get Real-Time Cybersecurity Insight for IBM i
By Robin Tatam
Security expert Robin Tatam and Fortra Security Product Manager Bob Erdman show how mid-market SIEM solutions combine ease-of-use with the functionality you need, and preview Powertech Event Manager.
On-Demand Webinar
Controlling Insider Threats on IBM i
By Robin Tatam
Despite the avalanche of regulations, news headlines remain chock full of stories about data breaches, all initiated by insiders or intruders masquerading as insiders.
Guide
Download “Identity & Access Management for IBM i”
Insiders are responsible for 34 percent of data breaches—and insiders are also the most difficult threat to control control on IBM i. You can't lock them out completely because your IBM i users need at least some level of access to do their jobs.
So, how do you ensure users have only the access they need without overburdening IT with manual...
On-Demand Webinar
A Primer on IBM i User Profiles and How To Deploy Them
By Robin Tatam
Knowing how to configure and maintain user profiles correctly is critical to preventing unauthorized access to your data.
Guide
Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide
The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data.
The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best...