Resources

Guide

What Experts Have to Say About Choosing the Right Cybersecurity Frameworks

How to Get the Most Out of Cybersecurity Best Practice Frameworks Frameworks like the Center for Internet Security (CIS) Controls, MITRE ATT&CK and the National Institute of Standards and Technology (NIST) Cybersecurity Framework give organizations clear, step-by-step methodologies for protecting their sensitive data, leveraging a wealth of industry knowledge to take the guesswork out of your...
Guide

Going Beyond the GUI

Modernization is more than simply switching from a green screen to a GUI. To have a truly modern IBM i data center, you must consider all areas of IT from your software and applications to your hardware and devices to the processes that support the whole operation. This guides helps you modernize your IBM i from the ground up.
Guide

Fortra's Complete Guide to Layered Offensive Security

Most organizations have a decent understanding of the types of defensive security tactics they need to employ to thwart cyberattacks. But offensive security techniques are just as important for detecting existing vulnerabilities that a threat actor has yet to discover and exploit. Learn how to approach offensive security from the ground up, including the value of using a layered security...
Press Release

Fortra Names Matthew Schoenfeld President

Fortra announced today that it welcomes Matthew Schoenfeld to the organization as its new president. A software industry veteran with more than a decade of experience in cybersecurity, Schoenfeld has a proven record as a dynamic, purposeful leader.
News Article

SC Magazine: Reduce Risk By Redefining Security

In his contribution to SC Magazine, Tom Gorup, Vice President, Security Operations at Fortra's Alert Logic, draws from his experience as a combat veteran to offer insights on how security leaders can improve their security posture, with tips for gaining greater visibility to the threat landscape.
News Article

IT Jungle: How HelpSystems Became Fortra

IT Jungle looks at how we became Fortra – following our growth and transition into a ‘tier one supplier of security software and services for companies around the world’.
News Article

SecurityInfoWatch: Future Proofing File Transfer Methods

Sending confidential information with basic encryption is no longer enough. In this SecurityInfoWatch.com article by Chris Bailey, Sr Product Manager at Fortra, find out why Digital Rights Management (DRM) is needed for true Zero Trust.