Resources

Blog

Managing Critical File Transfers

For those wanting to collaborate on a sensitive document, there are a variety of cloud-based solutions that enable this - for sharing a file or simultaneously editing a document. Use of cloud solutions is also required if large files need to be shared.
Blog

Reflecting on RSA Conference 2014

The end of February. The RSA Conference 2014. Downtown San Francisco with 25,000+ other security professionals. It’s big... really, really big... 400 exhibitors, 500 speakers and tens of thousands of attendees. But what was hot? (Other than the Clearswift of course…)
Blog

How to Remove the Data Security Risk from File Transfers

The ability to communicate and share information – both inside and outside the organization – is key to the success of any modern business. Many industries have a requirement to request or share information for compliance purposes and some of that data will be sensitive in nature. For example, HR teams receiving copies of passports, driver’s licenses and bank details for new employees, healthcare...
Blog

How to Prevent Data Exfiltration

To mitigate the threat of data exfiltration, organizations deploy data loss prevention software tools at key egress points – email, web (cloud), and the endpoint. The security software provides visibility of the data being shared (who is sending what to whom) and allows controls to be put in place that prevent sensitive data from leaving the organization and malware from getting in.
Blog

Today’s Email Encryption Options. Which One is Right For You?

Email encryption is the process of encrypting or disguising the content of email messages, protecting sensitive information from being read by anyone other than the intended recipient. With the continual evolution and enforcement of data protection laws, email encryption is more necessary than ever before to protect sensitive data from being exposed unauthorized and to mitigate the risk of data...
Press Release

Fotra's Data Security Week LIVE to Give Powerful Insights into Navigating Today’s Cyberthreat Landscape

MINNEAPOLIS (June 16, 2021) — Fortra today announced an upcoming virtual event designed to educate IT and security professionals about how to meet the challenges of the rapidly changing data security and compliance landscape. Data Security Week LIVE will feature a panel of security experts who will explore the often-hidden vulnerabilities surrounding corporate data in all its forms at rest and...
Press Release

Scammers Access 50% of Compromised Accounts Within 12 Hours According to New Research

Email Security Company Agari Identifies How Cybercriminals Use Compromised Accounts with New Insight Into Credential Phishing Scams FOSTER CITY, Calif. and LONDON (June 8, 2021) — Agari by Fortra , the market share leader in phishing defense for the enterprise, unveiled today the results of an investigation into the anatomy of compromised email accounts. The threat intelligence brief, titled...
Press Release

Fortra's Robust Growth Draws New Investment from Harvest Partners SCF, LP

MINNEAPOLIS (May 6, 2021) – Fortra today announced that funds managed by Harvest Partners SCF, LP (“HP SCF”), the non-control private equity strategy of Harvest Partners, LP, have signed a definitive agreement to lead a minority investment in Fortra. HP SCF will join existing investors TA Associates (“TA”), Charlesbank Capital Partners (“Charlesbank”), HGGC and Fortra employees to propel the...
Blog

Data Security Best Practices Every CISO Should Know

The responsibility for an organization’s information and data security is a hefty one, knowing each day that it’s not a matter of whether a cybersecurity attack will happen, but rather when it will happen on your watch.
Press Release

Fortra's BuildIT Virtual User Conference - Helping Organizations Build a Better IT™

Fortra announced recently that its BuildIT virtual user conference will provide a fresh perspective on reducing IT complexity through advancements in security and automation. The agenda delves into pressing topics such as data security, achieving regulatory compliance, tackling the evolving threat landscape, leveraging intelligent automation, supporting remote workforces, and addressing the widening IT skills gap.