Icon Close country selection

Fortra

Infrastructure Protection & Data Security Solutions

Fortra is a leader in infrastructure protection and data security software, providing organisations with comprehensive, automated security solutions. Fortra's solution suites help create a more secure and automated organisation, providing the tools and flexibility needed to keep operations running smoothly in an ever-changing threat environment, with security at the forefront.

TECHNOLOGY

 

With Fortra, you can lock down privileges, secure valuable data, and minimize threats, all while remaining productive. Fortra's solutions focus on two key areas to streamline every step of building security within an organization.

Data security solutions allow you to understand sensitive data and ensure its security throughout its lifecycle, regardless of where it resides (on-premises or in the cloud) and how it is accessed, while infrastructure protection solutions enable you to identify and prioritize vulnerabilities in your systems and determine how best to respond to them.

 

SOLUTIONS

 

Vulnerability management is an ongoing process. In addition to regular updates, as an organization evolves, new users, applications, and other changes can create new vulnerabilities that threat actors can exploit. With new vulnerabilities frequently being discovered, following the following steps can be the difference between staying protected and suffering a devastating breach. Vulnerability management solutions help locate, analyze, prioritize, and track security weaknesses to maximize IT resources, effectively mitigate risks, and avoid costly breaches. 

Products:

  • Digital Defense Frontline VM™
  • Beyond Security beSECURE 
  • Tripwire® IP360™

Application security testing scans customer-facing web applications, network applications, and product applications for security weaknesses and helps prioritize remediation efforts.

Products:

  • Frontline Web Application Scanning™ (WAS) 
  • Beyond Security beSTORM Dynamic Application Security Testing (DAST) 
  • Beyond Security beSOURCE Static Application Security Testing (SAST) 

Threat scanning and monitoring detects security misconfigurations and active endpoint threats, like malware, trojans, and viruses, within a network, for timely protection and faster remediation.

Products:

  • Frontline Active Threat Sweep™
  • Core Security Event Manager 
  • Core Security Network Insight 
  • Powertech Antivirus 
  • Tripwire Enterprise

 

Offensive Security solutions from Fortra pinpoint the risks that present the greatest threat to your infrastructure. These solutions work both independently and in tandem. Services can be complemented by tools to maintain constant visibility on potential new attack vectors and tools can be bundled together to create a multi-layered portfolio that advances security maturity and provides full coverage.  Use vulnerability management solutions to identify, evaluate, prioritize, track, and report on security weaknesses that may be putting your organization at risk.

Products:

  • Frontline VM
  • Frontline WAS
  • Frontline ATS
  • beSECURE
  • beSTORM
  • beSOURCE

Run advanced pen tests with a centralized solution that offers guided automation, certified exploits, and multi-vector testing capabilities.

Products:

  • Core Impact

Run Red Team engagements and adversary simulations with a threat emulation tool that mimics the tactics and techniques of a long-term embedded actor using a post-exploitation agent and covert channels.

Products:

  • Cobalt Strike

Expert services with a consultative approach, with offerings such as penetration testing, Red Teaming, software security assessments, social engineering assessments, physical security testing, and employee training.

Products:

  • Core Security SCS
  • Digital Defense Professional Services

 

Email Security & Anti-Phishing,  Keep emails, brands, and data safe from sophisticated phishing attacks, insider threats, and accidental data loss with minimal business disruption Learn how solutions from Fortra for Email Security and Anti-Phishing can protect your business better. A robust DMARC authentication & monitoring solution stops phishing by automating the process of DMARC email authentication and enforcement to protect customers from cyberattacks. In doing so, it can help preserve brand identity and improve digital engagement, even post-deployment.

Products:

  • Agari Brand Protection
  • PhishLabs DRP for Domains

Business Email Compromise (BEC) scams deceive people into believing they're interacting with a trusted sender. The right solution must detect and prevent these BEC tactics by learning sender-receiver behavior to identify suspicious emails by continuously scanning for indicators of compromise.

Products:

  • Agari Phishing Defense 
  • Agari Phishing Response 
  • Agari Active Defense 
  • PhishLabs Suspicious Email Analysis 

A Secure Email Gateway is an email security solution that monitors emails coming into and out of an organization before they reach an email inbox to protect from malicious content including spam, viruses, phishing, and malware.

Products:

  • Clearswift Secure Email Gateway

 

Data Protection,  Organizations rely on sensitive data to serve their customers, fuel innovation and grow. Security leaders need a way to find and understand that data, then protect it from loss or theft while within their extended enterprise, and securely share it outside of their extended enterprise. Fortra's leading data protection offering combines data classification, with data loss prevention, and digital rights management, to deliver data protection throughout the entire data lifecycle. Digital Guardian, Titus, and Boldon James data classification solutions apply visual and metadata labels to ensure data is protected and controlled wherever it travels. From user-driven, to fully automated, our solutions are fully flexible and customizable to meet your data protection requirements.

Products:

  • Titus
  • Boldon James
  • Digital Guardian

Digital Guardian’s Data Protection Platform, powered by AWS, performs on traditional endpoints, across the corporate network, and cloud applications, making it easier to see and block threats to sensitive information.

Products:

  • Digital Guardian

Vera makes it easy to securely share files externally with third parties, providing you control over file access and protection outside of your organization.

Products:

  • Vera

 

Digital Risk Protection,  through established Centers of Excellence, Fortra provides a critical mass of threat-specific technology and operations. Our Centers of Excellence drive collection efforts to source intelligence that delivers better visibility into threats early in the attack process. Collected intelligence is curated by specialists using threat-specific processes and context. Mitigation is enhanced with handling procedures and workflows purposefully designed to mitigate specific threat types as quickly and thoroughly as possible. As a result, clients get unparalleled threat detection and mitigation. Detect and mitigate digital brand abuse by continuously monitoring the web, social media, mobile app stores, and email to identify threats and remove damaging content. Ongoing domain monitoring detects resurfaced content for protection against all types of relevant brand abuse.

Products:

  • PhishLabs DRP for Domains​
  • PhishLabs DRP for Open Web​
  • PhishLabs DRP for Mobile​
  • PhishLabs DRP for Social Media
  • Agari Brand Protection (Email)

Quickly identify phishing campaigns before they lead to account takeover fraud. Our extensive network of relationships provides access to automated killswitches and preferred escalation integrations for unrivaled threat takedown at the enterprise scale.

Products:

  • PhishLabs DRP for Domains​
  • PhishLabs DRP for Credential Theft​
  • PhishLabs DRP for Crimeware

Monitor the world’s most highly trafficked social platforms, repositories, forums, blogs, paste sites, and gripe sites. Once threats are identified, social media experts immediately take action through strong business relationships and procedural knowledge to mitigate risks.

Products:

  • PhishLabs DRP for Social Media​
  • PhishLabs DRP for Executives

Monitor and detect sensitive data leaks by gathering customer-relevant data through automated and expert collection methods, delivering visibility across the open web, dark web, and social media for personalized data leak protection.

Products:

  • PhishLabs DRP for Dark Web​
  • PhishLabs DRP for Source Code

 

Secure File Transfer with Fortra's Managed File Transfer, Secure Email and Collaboration, and File Transfer Acceleration solutions, data transfers can be securely managed end-to-end, no matter where the data resides or where it is deployed. Plus, our comprehensive, enterprise-level solutions provide support for multiple file transfer protocols, audit reporting to help meet compliance requirements, and automation capabilities, so you’ll save time and reduce risks of human error. Simplify, secure, and automate file transfers enterprise-wide through a centralized, user-friendly interface designed to help employees, partners, and customers safely move data of any type or size easily and without the need for special programming skills.

Products:

  • GoAnywhere Managed File Transfer
  • GoAnywhere Managed File Transfer as a Service (MFTaaS)
  • GoAnywhere Gateway
  • Globalscape Enhanced File Transfer
  • Globalscape Enhanced File Transfer Arcus (MFTaS)
  • Globalscape Secure ICAP Gateway
  • CuteFTP

Emailing and collaborating is how business gets done and organizations can do so more confidently enterprise-wide with secure mail and collaboration tools for file syncing and sharing from Fortra.

Products:

  • GoAnywhere Secure Mail
  • GoAnywhere GoDrive

When the speed of file transfers matters as much as the security of the data in motion, a file transfer acceleration solution satisfies both needs seamlessly.

Products:

  • GoFast, powered by FileCatalyst
bg

Test a product

On local martkets Bakotech Group operates through a well-established partner network, including over 1,000 active dealers. Key IT-integrators and are involved in the realization of large-scale projects concerning implementing solutions for end-customers from various segments of business. Bakotech's business strategy is True Value Added Distribution or in other words - project oriented distribution.

We are providing our partners with a wide range of services such as PR, co-marketing activities, pre post-sales support, trainings for partners and end-customers, PoC, PoV, solution consulting, implementation support and technical support.

Contact Us

Bakotech Sp. z o.o.

ul. Drukarska 18/5

30-348 Kraków

Poland

Dane firmy

VAT ID 6762466740

REGON 122894922

KRS 0000467615

Kontakt

ph. +48 12 340 90 30

office-cee@bakotech.com

Privacy policy

Subscribe to stay updated

Would you like to stay updated on the current IT and InfoSec news? About BAKOTECH events like webinars, trainings and conferences? Please, leave your e-mail:
Error occured. Please check the form fields and try again.
This address is already in our database.
The subscription has been added. Thank you!
© Bakotech - 2022. All rights reserved

The website uses cookies to deliver services in accordance with the Cookies Policy. You can define the conditions for storing or accessing the cookie mechanism in your browser.

I accept