Robuta

https://www.fortra.com/es/node/14264
joan blanchfortra
https://www.fortra.com/blog/personal-identifiable-information-pii-tips-strategies
Personal Identifiable Information (PII) is any information that can be used to identify a specific individual.
personalidentifiableinformationpiitips
https://www.helpnetsecurity.com/2024/06/27/cve-2024-5276-poc/
A critical SQL injection Vulnerability in Fortra FileCatalyst Workflow (CVE-2024-5276) has been patched, a PoC is already available online.
pocexploitcriticalfortraflaw
https://www.fortra.com/pt/product-lines/core-security
core securityfortra
https://www.e-channelnews.com/adistec-and-fortra-announce-strategic-partnership-to-accelerate-cybersecurity-growth-across-latin-america/
Nov 21, 2025 - Adistec announce a strategic alliance with global cybersecurity leader Fortra, to expand the availability of its cybersecurity portfolio throughout all...
strategic partnershipfortraannounceacceleratecybersecurity
https://www.fortra.com/blog/friday-five-doj-launches-new-cybercrime-unit-regulating-ai-and-consolidating-cybersecurity
DOJ establishes cybercrime enforcement unit as U.S. warning mount over Chinese hacking by AJ Vicens.
dojnewcybercrimeunitai
https://www.fortra.com/blog/hsbc-us-customers-hit-data-breach
HSBC, one of the largest banks in the world, confirmed this week that some of its US customers' bank accounts were hacked in October, possibly by stolen...
data breachhsbcushitfortra
https://www.fortra.com/blog/document-security
Document security protects sensitive data through secure storage, access control, and compliance across the document lifecycle.
what isdocument securityfortra
https://www.fortra.com/blog/us-intelligence-community-warns-about-china-collecting-healthcare-data
China's voracious collection of U.S. healthcare data, including DNA, can pose a national security risk, not to mention harm the privacy of Americans.
u sintelligence communitywarnschinacollecting
https://www.fortra.com/blog/top-data-vulnerabilities-cause-data-loss
In this blog we take a high level look at some of the vulnerabilities or flaws in a system that can lead to data loss, the stages of exploiting a...
topdatavulnerabilitiescauseloss
https://www.fortra.com/blog/what-drm-protected-content-definition-how-it-works-more
What does it mean when digital content is DRM protected? We explain how DRM works and protects intellectual property in this blog.
how it workswhat isdrmprotectedcontent
https://www.fortra.com/blog/what-does-data-breach-cost-2020
Ponemon Institute's annual Cost of a Data Breach report tracks how industry data breach costs have changed over time.
what doesdata breachcostfortra
https://www.fortra.com/resources/press-releases/data-classification-solutions-data-discovery-and-classification-report-Q4
Report provides an overview of 33 different solutions providers including Boldon James and Titus, both recently acquired by Fortra London, UK
data classificationfortrasolutionsnamedtech
https://www.fortra.com/profile/roberto-enea
Bringing over 20 years of technical experience, Roberto Enea is Lead Data Scientist for Fortra, w
robertoeneafortra
https://www.fortra.com/resources/press-releases/how-quickly-hackers-access-use-your-personal-data-following-data-breach
How quickly do cyber criminals can reach your data once it hits the dark web? Within an hour, cybersecurity researcher says.
your dataquicklyhackersaccessfollowing
https://www.fortra.com/security
Check out Fortra Security and Trust Center. Also, Explore the latest Fortra news and read about customer experiences.
security trustfortracenter
https://www.fortra.com/es/platform/data-loss-prevention/integrations/palo-alto
Fortra DLP y Palo Alto se comunican para proteger mejor tus datos sensibles.
palo altofortradlp
https://www.fortra.com/blog/network-monitoring-back-school-season
Intermapper network monitoring software is a useful tool for monitoring educational networks in the back-to-school season.
back to schoolnetwork monitoringseasonfortra
https://www.fortra.com/blog/information-life-cycle-management
Data is the cornerstone of the digital economy, but its constant generation creates challenges for organizations. One such challenge is storing and managing...
what islifecycle managementinformationilmexplained
https://www.fortra.com/products/it-service-monitoring-business-insights/pricing-plans
Explore our free version, get pricing information for our enterprise options, and find the right version for your needs.
pricing plansbusinessmonitoringfortra
https://www.fortra.com/it?f%5B0%5D=field_platform%3A9&f%5B1%5D=field_platform%3A11&f%5B2%5D=field_solution%3A14882&f%5B3%5D=field_solution%3A13878&f%5B4%5D=field_solution%3A13882&f%5B5%5D=field_platform%3A7&page=6
Fortra fornisce soluzioni avanzate di sicurezza offensiva e difensiva che garantiscono una protezione completa lungo tutta la catena di attacco informatico.
fortralacatena
https://www.fortra.com/blog/how-improve-it-efficiency-3-strategies-keep-services-and-costs-down
IT efficiency increases in importance as new technologies come into play. Keep services up and costs down with these 3 strategies to improve.
improve itstrategiesefficiencyservicescosts
https://www.fortra.com/resources/press-releases/helpsystems-acquires-mvp-systems-software-bolster-enterprise-workload-automation
Fortra announced today that it has acquired MVP Systems Software, a leader in enterprise workload automation software
systems softwarefortraacquiresmvp
https://www.fortra.com/resources/press-releases/helpsystems-makes-it-easier-identify-security-events-ibm-i
Fortra announced a new release of Powertech SIEM Agent for IBM i. This version provides enhanced flexibility to meet the demands of increasingly complex IT...
fortramakeseasieridentifysecurity
https://automate.fortra.com/profile/paul-necklen
Paul is an RPA expert and evangelist. For over 15 years, he has been successfully solving key business problems with software solutions. At Fortra, Paul played...
paulrpaexpertevangelistfortra
https://www.fortra.com/?f%5B0%5D=field_product_line%3A19854&f%5B1%5D=field_product_line%3A16874&f%5B2%5D=field_product_line%3A21421&f%5B3%5D=field_product_line%3A18052&f%5B4%5D=field_product_line%3A19864&f%5B5%5D=field_product_line%3A8918&f%5B6%5D=field_product_line%3A20017&page=10
Fortra provides advanced offensive and defensive security solutions that deliver comprehensive protection across the cyber kill chain.
cyber attackfortrabreakchain
https://www.fortra.com/es/about/newsroom?page=20
newsroomfortra
https://www.fortra.com/platform
Fortra's cloud-native platform delivers multi-vector cyber defense with advanced automation and orchestration. Purpose-built to optimize security operations...
cloud nativefortracybersecurityplatform
https://www.fortra.com/blog/network-monitoring-and-identity-governance-how-they-work-together-enhance-your-security-posture
Discover three key areas where network monitoring and identity governance strategies go hand-in-hand, and work collaboratively to improve and enhance security...
how toenhancesecurityposturefortra
https://www.fortra.com/security/advisories/product-security/fi-2025-003
sensitive informationdisclosurefortraapplicationhub
https://www.fortra.com/resources/press-releases/fortra-welcomes-beyond-security
Fortra acquires vulnerability management platform to continue expansion of cybersecurity portfolio
fortraacquiresbeyondsecurity
https://www.fortra.com/blog/what-usb-control-encryption
USB ports make data transfer easy, but they also pose serious security risks. Learn why uncontrolled USB access can lead to data breaches and malware.
what isusbcontrolencryptionfortra
https://www.fortra.com/resources/press-releases/intelligent-cio-ciaran-rafferty-managing-director-email-security
Ciaran Rafferty, Managing Director, Email Security at Fortra, shares his thoughts on everything from cybersecurity trends to the future of email security in...
intelligentciointerviewciaranrafferty
https://www.fortra.com/resources/datasheets/microsoft-information-protection-mip
Learn how the Microsoft and Fortra DLP integration gives you data protection for the modern enterprise.
information protectionexpandmicrosoftfortradlp
https://www.fortra.com/blog/4-benefits-premises-enterprise-file-sync-and-sharing
Securely storing documents and collaborating has never been easier. GoDrive, an EFSS solution from GoAnywhere, gives you control over your file sync and share...
on premisesfile syncbenefitsenterprisesharing
https://www.fortra.com/resources/guides/six-ways-make-your-cloud-more-affordable
Cloud capacity is only infinite if you have unlimited budget. Avoid sticker shock from your first cloud bill with a smart cloud migration and continuous cloud...
cloud migrationcost managementthe guidedownloadfortra
https://www.fortra.com/resources/press-releases/fortra-takes-gold-once-again-cybersecurity-excellence-awards-1
Fortra, a global cybersecurity software and services provider, announced today that it has won gold in 20 categories at the 2023 Cybersecurity Excellence...
once againfortratakesgoldcybersecurity
https://www.fortra.com/beyond-security?p=508
Beyond Security products offer simplified network and application security testing.
beyondsecurityproductsfortra
https://www.fortra.com/offers
Software is supposed to make your life easier, right? We sure think so. Fortra has built a suite of best-in-class solutions that make security simpler and more...
fortraoffers
https://www.fortra.com/resources/datasheets/identify-protect-data-at-rest
The speed of data creation continues to increase, and that means the volume of data at rest is growing exponentially.
data at restfortradcsdatasheetclassification
https://www.fortra.com/blog/what-security-operations-and-analytics-platform-architecture-definition-soapa-how-it-works
Learn about Security Operations and Analytics Platform Architecture, or SOAPA, in Data Protection 101, our series on the fundamentals of information security.
how it worksand moresoapadefinitionbenefits
https://www.fortra.com/blog/employee-accessed-abused-customer-data-american-express
One of the largest financial services companies in the U.S. is dealing with the repercussions of a data breach apparently caused by one of its employees.
customer dataamerican expressemployeeaccessedabused
https://www.fortra.com/blog/50-aws-security-tips-secure-your-environment
Looking to secure your AWS environment? We've gathered 50 security tips to help you manage credentials, protect data, mitigate abuse, and more.
security tipsawssecureenvironmentfortra
https://www.fortra.com/?page=60
Fortra provides advanced offensive and defensive security solutions that deliver comprehensive protection across the cyber kill chain.
cyber attackfortrabreakchain
https://www.fortra.com/blog/what-content-inspection
Get a definition of content inspection and learn how this technology plays a key role in data loss prevention and regulatory compliance.
what iscontentinspectionfortra
https://www.fortra.com/blog/data-resiliency-ensuring-business-continuity
Data resiliency refers to a data system's ability to recover quickly and smoothly after a disruption.
business continuitydataresiliencyfortra
https://www.fortra.com/blog/jackpotting-attacks-hitting-us-atms-secret-service
It was at the Black Hat computer security conference that Barnaby Jack identified flaws in the design of some automated teller machines (ATM) that made them...
u ssecret servicejackpottingattackshitting
https://www.fortra.com/blog/top-tips-preventing-bec-scams
Business email compromise scams have cost companies billions over the past several years. How can businesses best protect themselves against a BEC scam?
toptipspreventingbecscams
https://www.fortra.com/platform/data-security-posture-management?utm_source=cybersectools.com&utm_medium=tool-detail
Understand and protect your entire data landscape with data security posture management (DSPM) from Fortra.
data securityfortraposturemanagementdspm
https://www.fortra.com/products/privileged-access-management/demo-watch
Watch how Core Privileged Access Manager (BoKS) can help you gain control over accounts and privileged access with centralized management of user profiles and...
watch aprivileged accessdemocoremanager
https://www.fortra.com/resources/press-releases/how-international-scam-artists-pulled-epic-theft-covid-benefits
In this article by NBC News, spokespeople from Agari explain how threat actors used email to fraudulently claim Covid relief unemployment benefits.
internationalscamartistspulledtheft
https://www.fortra.com/resources/articles/cybernews-what-kind-cyberattacks-are-expected-black-friday-and-cyber-monday
Threat actors are always looking for opportunities, and the holiday season is no exception. John Wilson spoke to Cybernews about the potential retail brand...
black fridaycyber mondaycyberattacksexpectedfortra
https://www.fortra.com/?f%5B0%5D=field_platform%3A9&f%5B1%5D=field_platform%3A11&f%5B2%5D=field_solution%3A6285&f%5B3%5D=field_solution%3A13883&f%5B4%5D=field_solution%3A13882&f%5B5%5D=field_author%3A10328&f%5B6%5D=field_author%3A14116&f%5B7%5D=field_solution%3A14882&f%5B8%5D=field_author%3A14264&page=16
Fortra provides advanced offensive and defensive security solutions that deliver comprehensive protection across the cyber kill chain.
cyber attackfortrabreakchain
https://www.fortra.com/products/remote-network-monitoring-software
Remote network monitoring software that keeps tabs of network performance whether at home, the office, or off-site with secure, safe access.
remote accessintermapperfortra
https://www.fortra.com/profile/bob-cormier
Vice President and Principal Consultant, Forrester
bob cormierfortra
https://www.fortra.com/blog/dan-geer-trade-offs-cyber-security
A speech by cyber security expert Dan Geer
dan geercyber securitytradeoffsfortra
https://www.fortra.com/profile/thomas-fischer
Thomas Fischer was a global security advocate at Digital Guardian based out of our former EMEA he
thomas fischerfortra
https://www.fortra.com/resources/datasheets/extending-microsoft-rms-to-mobile
Find out how Fortra Mail for IOS makes it possible to view and protect information using Microsoft Rights Management Services on iPhone and iPad.
data classificationextendingmicrosoftrmsmobile
https://www.fortra.com/products/black-box-fuzzing/protocols/dynamic-fuzzing-testing-service-location-protocol-slp20srvloc
Boost the security of your network services with beSTORM's dynamic testing on the Service Location Protocol (SLP, srvloc).
service location protocolfuzzingfortra
https://www.opentext.com/uk/customers/digital-guardian
Fortra reduced data breach risks by 90% using OpenText to identity classify, monitor, and protect sensitive information across multiple systems.
data loss preventionsuccess storyfortra
https://www.fortra.com/security/emerging-threats/cisco-asa-and-ftd-zero-day
Fortra is actively researching two critical Cisco vulnerabilities, CVE-2025-20333 and CVE-2025-20363 that could allow attackers to execute arbitrary code on...
cisco asazero dayftdfortra
https://www.fortra.com/resources/vulnerabilities/webdav-detection
WebDAV is an industry standard extension to the HTTP specification that can cause a major vulnerability, learn how to fix it here.
security riskswebdavvulnerabilityfixfortra
https://www.fortra.com/blog/what-scada-security
Learn about what SCADA security is, examples of threats and vulnerabilities, and more in Data Protection 101, our series on the fundamentals of information...
what isscada securityfortra
https://www.fortra.com/blog/what-email-encryption
Learn the fundamentals of email encryption and why it's an important part of a cybersecurity strategy.
what isemail encryptionfortra
https://www.fortra.com/blog/importance-security-service-edge-sse-integrated-cloud-delivered-solutions
Security Service Edge is a cybersecurity concept delivering key security capabilities from a cloud-based platform.
security service edgeimportancesseintegratedcloud
https://www.fortra.com/about/experts
fortracybersecurityexperts
https://www.fortra.com/blog/ultimate-guide-byod-security-overcoming-challenges-creating-effective-policies-and-mitigating
Bring Your Own Device (BYOD) remains both a major opportunity and challenge for enterprises. By following the right approach to identifying BYOD risk and...
the ultimate guidebyodsecuritydefinitionfortra
https://www.fortra.com/blog/better-together-microsoft-aip-and-fortras-classifer-suite
How AIP is better when paired with Fortra's Classifier Suite, and the business value you will get from this partnership.
microsoftaipfortradataclassifier
https://www.fortra.com/products/privileged-access-management
Centralize your multi-vendor infrastructure into a a single security domain with Fortra's Core Privileged Access Manager (BoKS) [formerly BoKS ServerControl]...
privileged access managementfortraidentityaccountlinux
https://www.fortra.com/resources/datasheets/threat-landscape
Threat Landscape enables organizations to prioritize remediation with threat intelligence data that has granular risk identifiers.
threatlandscapedatasheetfortra
https://www.fortra.com/profile/tim-shaw
Prior to joining Fortra Tim had many years experience as a systems con
tim shawfortra
https://www.fortra.com/solutions/application-security/dynamic-application-security-testing/black-box-fuzzing
What is a black box fuzzer, how is fuzzing used to help cybersecurity, and when is it necessary to implement it?
black boxs andfuzzingfaqguide
https://prooptimizegroup.com/
prooptmize is a leading consultancy firm specializing in AI-powered enterprise process automation, offering tailored solutions to optimize operational...
fortraautomationsolutionsproviderangola
https://www.fortra.com/it?f%5B0%5D=field_author%3A10295&f%5B1%5D=field_author%3A10328&f%5B2%5D=field_author%3A10310&f%5B3%5D=field_platform%3A7&f%5B4%5D=field_author%3A14148&page=1&type%5B0%5D=guide
Fortra fornisce soluzioni avanzate di sicurezza offensiva e difensiva che garantiscono una protezione completa lungo tutta la catena di attacco informatico.
fortralacatena
https://www.fortra.com/blog/building-and-sustaining-effective-ransomware-defense-strategy
Understand the high-stakes ransomware landscape and how Fortra Ransomware Defense supports a layered approach to threat prevention and detection.
defense strategybuildingsustainingeffectiveransomware
https://www.fortra.com/platform/data-loss-prevention/integrations/splunk
See Fortra DLP events in your splunk console. Fortra DLP delivers the critical events and alerts surrounding your enterprise data to Splunk.
fortradlpsplunk
https://www.fortra.com/blog/equifax-breach-could-have-far-reaching-effects
Though numbingly similar to many past incidents, the Equifax breach is also unusual in at least one important way.
equifax breachcouldfarreachingeffects
https://www.fortra.com/offers/powerful-tools
vulnerability managementfortrapowerfultools
https://www.fortra.com/blog/mfa-fatigue-understanding-risks-and-how-mitigate-them
Learn about MFA fatigue attacks, their signs, risks, and how to protect users from falling victim to this growing cybersecurity threat.
and howmfafatigueunderstandingrisks
https://www.fortra.com/about/newsroom?prid=36
newsroomfortra
https://www.fortra.com/?source=dataengineering&code=cmp-0000003416&ls=100000001&utm_source=partner&utm_medium=partner&utm_campaign=hs-partner-program&utm_content=early
Fortra provides advanced offensive and defensive security solutions that deliver comprehensive protection across the cyber kill chain.
cyber attackfortrabreakchain
https://platform.fortra.com/
fortraplatform
https://www.fortra.com/resources/press-releases/threat-intel-companies-look-help-weed-out-fakes-financial-services
In SC Magazine, John LaCour, Founder and CTO of PhishLabs, points out that account takeover has become increasingly more prevalent.
financial servicesthreatintelcompaniesremove
https://www.fortra.com/blog/what-saas-security-posture-management-sspm
Discover how SaaS security posture management (SSPM) can enhance your cybersecurity strategy.
what issaassecurityposturemanagement
https://www.fortra.com/blog/forward-vs-reverse-proxy-understanding-differences-and-use-cases
Learn what a forward proxy is and how it works, and explore its primary use cases in enhancing privacy, content control, and network security.
reverse proxyuse casesforwardvsunderstanding
https://www.fortra.com/blog/friday-five-google-ads-malware-campaign-new-cyber-resources-risk-groups-more
This past week, new cyber resources were shared for at-risk organizations, open source groups announced the development of new cyber standards, a new malware...
google adsmalware campaigncyberresourcesfortra
https://www.fortra.com/blog/cybersecurity-regulatory-landscape-japan-primer-business
The article looks at the legal foundations of cybersecurity in Japan, what businesses need to do, and how Japan aligns with the global landscape.
in japanfor businesscybersecurityregulatorylandscape
https://www.fortra.com/security/research?page=1
fortraresearch
https://www.fortra.com/blog/fortra-secure-email-gateway-62-major-leap-forward-threat-detection-and-security
Discover Fortra Secure Email Gateway 6.2 with AI-powered threat intelligence, enhanced URL protection, and improved OCR scanning. Learn upgrade steps,...
secure emailfortragatewaymajorleap
https://www.fortra.com/blog/what-popia-and-how-do-you-achieve-compliance
POPIA, South Africa's Protection of Personal Information Act, establishes rules for the lawful processing of personal information in South Africa. This blog...
what isand howdo youpopiaachieve
https://www.fortra.com/platform/data-classification
Fortra's Data Classification tools deliver a policy-driven foundation for identifying, classifying, and securing sensitive data. Our data protection solutions...
data classificationproductsfortra
https://www.fortra.com/blog/five-ws-incident-response
Good incident response starts with answering these basic questions.
the five wsincident responsefortra
https://www.fortra.com/product-lines/intermapper/bulk-on-demand-table-builder
Learn more about the on-demand table builder for InterMapper SNMP probes.
on demandbulktablebuilderfortra
https://www.fortra.com/blog/what-data-risk-assessment-why-how-do-assessment
Why is performing a data risk assessment key for today's businesses? Learn how to carry out a data risk assessment, along with the key benefits of doing so.
how to dowhat isrisk assessmentdata
https://www.fortra.com/resources/guides/5-reasons-classification-first-step-successful-data-loss-prevention
Learn how Fortra Classification enables DLP and CASB systems to more effectively and efficiently protect data.
the first stepclassificationgooddlpfortra
https://www.fortra.com/blog/what-fisma-compliance-fisma-definition-requirements-penalties-and-more
FISMA compliance is compliance with The Federal Information Security Management Act (FISMA) is a United States federal law passed in 2002 that made it a...
what isfismacompliancefortra
https://www.fortra.com/resources/press-releases/helpsystems-completes-acquisition-network-monitoring-pioneer-dartware-its-third
In January 2013 Fortra acquired Dartware, the maker of Intermapper network monitoring and mapping software.
network monitoringfortraacquirespioneerdartware
https://www.fortra.com/solutions/data-classification?code=cmp-0000008414&ls=717710009&utm_source=press-release
Learn how data classification can help your business meet compliance requirements by identifying and protecting sensitive data.
what isdata classificationfortra
https://www.fortra.com/blog/favorite-soc-analyst-interview-questions
Hiring a SOC analyst? Asking the right questions is key to identifying the best employee as well as helping determine what skills can best complement your...
favoritesocanalystinterviewquestions
https://www.fortra.com/profile/mae-casazza
Mae Casazza is the Executive Operations Partner at Fortra.
maecasazzafortra