Icon Close country selection

Fortra

Infrastructure Protection & Data Security Solutions

Fortra is a leader in infrastructure protection and data security software, providing organisations with comprehensive, automated security solutions. Fortra's solution suites help create a more secure and automated organisation, providing the tools and flexibility needed to keep operations running smoothly in an ever-changing threat environment, with security at the forefront.

TECHNOLOGY

 

With Fortra, you can lock down privileges, secure valuable data, and minimize threats, all while remaining productive. Fortra's solutions focus on two key areas to streamline every step of building security within an organization.

Data security solutions allow you to understand sensitive data and ensure its security throughout its lifecycle, regardless of where it resides (on-premises or in the cloud) and how it is accessed, while infrastructure protection solutions enable you to identify and prioritize vulnerabilities in your systems and determine how best to respond to them.

 

SOLUTIONS

 

Vulnerability management is an ongoing process. In addition to regular updates, as an organization evolves, new users, applications, and other changes can create new vulnerabilities that threat actors can exploit. With new vulnerabilities frequently being discovered, following the following steps can be the difference between staying protected and suffering a devastating breach. Vulnerability management solutions help locate, analyze, prioritize, and track security weaknesses to maximize IT resources, effectively mitigate risks, and avoid costly breaches. 

Products:

Application security testing scans customer-facing web applications, network applications, and product applications for security weaknesses and helps prioritize remediation efforts.

Products:

  • Fortra Web Application Scanning™ (Frontline WAS) 

Threat scanning and monitoring detects security misconfigurations and active endpoint threats, like malware, trojans, and viruses, within a network, for timely protection and faster remediation.

Products:

  • Fortra Active Threat Sweep™ (Frontline ATS)

 

Offensive Security solutions from Fortra pinpoint the risks that present the greatest threat to your infrastructure. These solutions work both independently and in tandem. Services can be complemented by tools to maintain constant visibility on potential new attack vectors and tools can be bundled together to create a multi-layered portfolio that advances security maturity and provides full coverage.  Use vulnerability management solutions to identify, evaluate, prioritize, track, and report on security weaknesses that may be putting your organization at risk.

Products:

  • Fortra VM (Frontline)
  • Fortra Web Application Scanning™ (Frontline WAS) 
  • Fortra Active Threat Sweep™ (Frontline ATS)

Run advanced pen tests with a centralized solution that offers guided automation, certified exploits, and multi-vector testing capabilities.

Products:

Run Red Team engagements and adversary simulations with a threat emulation tool that mimics the tactics and techniques of a long-term embedded actor using a post-exploitation agent and covert channels.

Products:

 

 

Email Security & Anti-Phishing,  Keep emails, brands, and data safe from sophisticated phishing attacks, insider threats, and accidental data loss with minimal business disruption Learn how solutions from Fortra for Email Security and Anti-Phishing can protect your business better. A robust DMARC authentication & monitoring solution stops phishing by automating the process of DMARC email authentication and enforcement to protect customers from cyberattacks. In doing so, it can help preserve brand identity and improve digital engagement, even post-deployment.

Products:

  • Agari Cloud Email Protection
  • PhishLabs

Business Email Compromise (BEC) scams deceive people into believing they're interacting with a trusted sender. The right solution must detect and prevent these BEC tactics by learning sender-receiver behavior to identify suspicious emails by continuously scanning for indicators of compromise.

Products:

  • Agari Cloud Email Protection
  • PhishLabs 

A Secure Email Gateway is an email security solution that monitors emails coming into and out of an organization before they reach an email inbox to protect from malicious content including spam, viruses, phishing, and malware.

Products:

 

Data Protection,  Organizations rely on sensitive data to serve their customers, fuel innovation and grow. Security leaders need a way to find and understand that data, then protect it from loss or theft while within their extended enterprise, and securely share it outside of their extended enterprise. Fortra's leading data protection offering combines data classification, with data loss prevention, and digital rights management, to deliver data protection throughout the entire data lifecycle. Digital Guardian, Titus, and Boldon James data classification solutions apply visual and metadata labels to ensure data is protected and controlled wherever it travels. From user-driven, to fully automated, our solutions are fully flexible and customizable to meet your data protection requirements.

Products:

Digital Guardian’s Data Protection Platform, powered by AWS, performs on traditional endpoints, across the corporate network, and cloud applications, making it easier to see and block threats to sensitive information.

Products:

 

Security awareness training is a key component of an effective cybersecurity strategy. By implementing targeted courses, quizzes, phishing simulations, and other tools, you can identify high-risk users or roles, change unsafe online habits that could expose data to cyberattacks, and promote a “security-first” approach across the organization. Terranova Security by Fortra enables the easy creation of risk-based campaigns that offer top-quality training materials and realistic phishing simulations.

Products:

 

Digital Risk Protection,  through established Centers of Excellence, Fortra provides a critical mass of threat-specific technology and operations. Our Centers of Excellence drive collection efforts to source intelligence that delivers better visibility into threats early in the attack process. Collected intelligence is curated by specialists using threat-specific processes and context. Mitigation is enhanced with handling procedures and workflows purposefully designed to mitigate specific threat types as quickly and thoroughly as possible. As a result, clients get unparalleled threat detection and mitigation. Detect and mitigate digital brand abuse by continuously monitoring the web, social media, mobile app stores, and email to identify threats and remove damaging content. Ongoing domain monitoring detects resurfaced content for protection against all types of relevant brand abuse.

Products:

  • PhishLabs
  • Agari Cloud Email Protection

Quickly identify phishing campaigns before they lead to account takeover fraud. Our extensive network of relationships provides access to automated killswitches and preferred escalation integrations for unrivaled threat takedown at the enterprise scale.

Products:

  • PhishLabs

Monitor the world’s most highly trafficked social platforms, repositories, forums, blogs, paste sites, and gripe sites. Once threats are identified, social media experts immediately take action through strong business relationships and procedural knowledge to mitigate risks.

Products:

  • PhishLabs

Monitor and detect sensitive data leaks by gathering customer-relevant data through automated and expert collection methods, delivering visibility across the open web, dark web, and social media for personalized data leak protection.

Products:

  • PhishLabs

 

Secure File Transfer with Fortra's Managed File Transfer, Secure Email and Collaboration, and File Transfer Acceleration solutions, data transfers can be securely managed end-to-end, no matter where the data resides or where it is deployed. Plus, our comprehensive, enterprise-level solutions provide support for multiple file transfer protocols, audit reporting to help meet compliance requirements, and automation capabilities, so you’ll save time and reduce risks of human error. Simplify, secure, and automate file transfers enterprise-wide through a centralized, user-friendly interface designed to help employees, partners, and customers safely move data of any type or size easily and without the need for special programming skills.

Products:

Emailing and collaborating is how business gets done and organizations can do so more confidently enterprise-wide with secure mail and collaboration tools for file syncing and sharing from Fortra.

Products:

When the speed of file transfers matters as much as the security of the data in motion, a file transfer acceleration solution satisfies both needs seamlessly.

Products:

  • FileCatalyst

 

ASK FOR DETAILS

 

Products

Core Impact
Penetration testing software to safely discover and exploit security weaknesses
GoAnywhere MFT
Secure and automate critical file transfers
GoAnywhere Gateway
Reverse and Forward Proxy Software. Implement an extra layer of cybersecurity when exchanging files with trading partners.
Cobalt Strike
Emulation software for simulating threats and Red Team operations
Fortra Frontline VM
Fortra Vulnerability Management
Classifier Suite Essentials (Boldon James)
The data classifier, formerly known as Boldon James, supports Microsoft Office applications (Outlook, Outlook Web App, Exchange, SharePoint, Word, Excel, PowerPoint, Visio, Project), Lotus Notes, AutoCAD, DraftSight and Windows File Store.
Data Classification Suite (Titus)
A security solution, formerly known as Titus, that allows users to easily and confidently identify, classify, protect, and share sensitive information during their workflow.
Agari – Cloud Email Protection
Advanced threat protection from an integrated cloud-based email security platform.
PhishLabs
Safeguards your organization’s critical digital assets from cyber threats through expert-curated threat intelligence and complete mitigation.
Terranova
Security awareness training that reduces risk and builds threat resilience.
ClearSwift ARgon E-mail Protection
ClearSwift ARgon for Email uses standard SMTP technology to ensure compatibility with any email gateway solution, located on premises or in the cloud. It supports Exchange, GroupWise, Lotus Notes, SMTP and POP servers.
Digital Guardian Data Discovery
Digital Guardian for Data Discovery provides visibility and control over potentially unsecured data. It uses detailed discovery control policies to ensure sensitive content is detected where it is.
Digital Guardian Endpoint Data Loss Prevention
Endpoint Data Loss Prevention
Digital Guardian Network Data Loss Prevention
Network Data Loss Prevention
ClearSwift Secure E-Mail Gateway
Working alone or alongside cloud-based email applications such as Office 365 and G Suite, Secure Email Gateway provides a vital layer of security that maximizes cybersecurity.
ClearSwift Secure Web Gateway
Clearswift Secure Gateway solutions provide critical information protection for sensitive data shared over the network with online collaboration and social media tools.
bg

Test a product

On local martkets Bakotech Group operates through a well-established partner network, including over 1,000 active dealers. Key IT-integrators and are involved in the realization of large-scale projects concerning implementing solutions for end-customers from various segments of business. Bakotech's business strategy is True Value Added Distribution or in other words - project oriented distribution.

We are providing our partners with a wide range of services such as PR, co-marketing activities, pre post-sales support, trainings for partners and end-customers, PoC, PoV, solution consulting, implementation support and technical support.

Contact Us

Bakotech Sp. z o.o.

ul. Drukarska 18/5

30-348 Kraków

Poland

Dane firmy

VAT ID 6762466740

REGON 122894922

KRS 0000467615

Kontakt

ph. +48 12 340 90 30

office-cee@bakotech.com

Privacy policy

Subscribe to stay updated

Would you like to stay updated on the current IT and InfoSec news? About BAKOTECH events like webinars, trainings and conferences? Please, leave your e-mail:
Error occured. Please check the form fields and try again.
This address is already in our database.
The subscription has been added. Thank you!
© Bakotech - 2022. All rights reserved

The website uses cookies to deliver services in accordance with the Cookies Policy. You can define the conditions for storing or accessing the cookie mechanism in your browser.

I accept