Skip to main content

Overview

Fortra, formerly known as HelpSystems, is a global leader in cybersecurity and automation, dedicated to helping organizations build a simpler, stronger future for their security posture. Headquartered in Eden Prairie, Minnesota, the company has undergone a significant transformation over the last decade, evolving from a specialist in systems management into one of the world's largest pure-play cybersecurity software providers.

Fortra serves over 30,000 customers globally, including a significant portion of the Fortune 500, across highly regulated industries such as financial services, healthcare, manufacturing, and government. The company’s portfolio is organized into several strategic pillars:

  • Data Security: Including secure file transfer (MFT), data classification, and digital rights management.
  • Infrastructure Protection: Featuring vulnerability management, penetration testing tools, and antivirus solutions.
  • Managed Services: Providing Managed Detection and Response (MDR) and Digital Risk Protection (DRP).
  • Email Security: Focused on stopping advanced threats and identity deception.

Through an aggressive but calculated acquisition strategy, Fortra has integrated industry-leading brands—such as Titus, Digital Guardian, Agari, and Tripwire—into a unified platform. This allows them to offer a comprehensive defense-in-depth strategy that addresses the modern threat landscape, from internal data leaks to external cyberattacks. Their focus remains on reducing the complexity of cybersecurity by providing a streamlined, automated, and expert-supported environment.

Positioning

Fortra positions itself as the "Security Ally" for modern enterprises. Their market strategy is built on the realization that the cybersecurity industry has become too fragmented and complex for most organizations to manage effectively. Consequently, their messaging centers on "simplifying the complex" and providing a "unified front" against cyber threats.

In the competitive landscape, Fortra positions itself between niche point-solution vendors and massive, generic "platform" conglomerates. They differentiate by offering the depth of a specialist with the breadth of a platform provider. While competitors might focus on a single vector like endpoint or network, Fortra’s brand positioning emphasizes the protection of the data itself, regardless of where it resides.

Their competitive messaging often highlights:

  • Portfolio Synergy: The ability to solve multiple security problems through a single vendor relationship, reducing procurement and integration headaches.
  • Elite Intelligence: Leveraging the research from their specialized labs (like the Fortra VM and Email research teams) to inform all products in the portfolio.
  • Resilience over Reactivity: Positioning their offensive security tools as a way for companies to be proactive rather than just waiting to respond to alerts.

By rebranding from HelpSystems to Fortra in 2022, the company signaled its definitive pivot to a security-first organization, reinforcing its commitment to being a steadfast protector in an increasingly volatile digital world.

Differentiation

The primary differentiator of Fortra’s product portfolio is its breadth and the strategic integration of best-of-breed technologies. Their offerings span across Data Security, Infrastructure Protection, and Managed Services, creating a "security fabric" that allows data to be protected throughout its entire lifecycle.

Key technical advantages include:

  • Integrated Data Security: By combining data classification (Boldon James, Titus) with Digital Rights Management (Vera) and Secure File Transfer (GoAnywhere, Globalscape), Fortra allows organizations to automate the protection of sensitive information from the moment it is created until it is shared externally.
  • Offensive Security Leadership: With industry-standard tools like Cobalt Strike and Core Impact, Fortra holds a dominant position in the red-teaming and penetration testing market, providing organizations with the same tools used by elite security professionals to find vulnerabilities before attackers do.
  • Advanced Email Protection: Their Agari and PhishLabs solutions utilize unique identity-based telemetry to stop sophisticated BEC (Business Email Compromise) and spear-phishing attacks that bypass traditional secure email gateways.
  • Automation and Interoperability: Fortra's focus on automation reduces the manual burden on SOC teams, using cross-platform intelligence to trigger defensive actions across the network, endpoint, and cloud environments simultaneously.

Ideal Customer Profile

  • Company Size: Mid-market to large Global 2000 enterprises.
  • Industry Focus: Finance, Healthcare, Government, Manufacturing, and Retail.
  • Technical Maturity: Moderate to High. The customer should have an established IT/Security team, though Fortra’s Managed Services can assist those with lower maturity.
  • Budget Range: $50k - $1M+ ARR depending on the breadth of the suite adopted.
  • Team Composition: Typically involves a CISO, Security Operations Manager, Compliance Officer, and IT Infrastructure Lead.
  • Primary Pain Point: Managing too many disparate security tools and struggling to maintain a cohesive defensive posture across a distributed environment.

Best Fit

  • Consolidated Security Operations: Organizations looking to reduce vendor fatigue by sourcing multiple security disciplines (Email, Data, Infrastructure) from a single strategic partner.
  • Highly Regulated Industries: Finance, healthcare, and government entities that require rigorous data protection (DLP) and secure file transfer (MFT) to meet compliance mandates like HIPAA, GDPR, or PCI-DSS.
  • Proactive Threat Defense: Companies that want to move beyond reactive security by implementing offensive security measures like penetration testing and vulnerability management.
  • Complex Data Environments: Organizations managing large volumes of sensitive data across hybrid cloud and on-premises environments that require automated classification and protection.

Offerings

  • Data Security Suite: Includes Digital Guardian (DLP), GoAnywhere/Globalscape (MFT), and Vera (Encryption/Rights Management). Best for data-centric protection.
  • Infrastructure Protection: Includes Alert Logic (MDR), Tripwire (File Integrity Monitoring), and Digital Defense (Vulnerability Management). Best for perimeter and workload defense.
  • Offensive Security: Includes Core Impact, Cobalt Strike, and Outflank. Best for red teaming and advanced security validation.
  • Email Security & Protection: Includes Agari, PhishLabs, and Clearswift. Best for stopping BEC (Business Email Compromise) and phishing.
  • Automation: Includes JAMS and Automate. Best for IT process and workload orchestration.

Get our evaluation of Fortra

Our advisory team has deep experience with Fortra. We'll give you an honest, independent assessment — including how they compare to alternatives and what to watch out for.

Request Evaluation

Buying Guide: Fortra

Everything you need to evaluate Fortra— from features and pricing to implementation and security.

Introduction

Welcome to the comprehensive buying guide for Fortra. In an era of escalating cyber threats and increasing regulatory pressure, Fortra (formerly HelpSystems) has evolved into a global leader in cybersecurity and automation. This guide is designed to help IT leaders and security professionals navigate Fortra’s expansive portfolio, which spans data security, infrastructure protection, and managed services.

By the end of this guide, you will understand Fortra's core value proposition: providing a simplified, integrated approach to security that replaces fragmented point solutions. Whether you are looking to secure sensitive data transfers, automate vulnerability management, or defend against sophisticated phishing attacks, this guide provides the technical and strategic insights necessary to determine if Fortra is the right partner for your organization's security maturity journey.

Key Features

  • Data Security & Protection: Comprehensive suite including Data Loss Prevention (DLP), secure file transfer (MFT), and data classification. These tools work in tandem to identify, categorize, and protect sensitive information throughout its lifecycle.
  • Offensive Security: Industry-leading penetration testing and vulnerability management tools (formerly Core Security, Alert Logic, and Digital Defense) that simulate real-world attacks to identify weaknesses before hackers do.
  • Infrastructure Protection: Advanced solutions for threat intelligence, email security (Agari, PhishLabs), and anti-malware that protect the perimeter and internal network from evolving exploits.
  • Security Automation: Robotic Process Automation (RPA) and workload automation capabilities that reduce manual intervention in security workflows, speeding up incident response and reducing human error.
  • Managed Services: 24/7 SOC-as-a-Service and Managed Detection and Response (MDR) for organizations that need to augment their internal teams with expert monitoring and threat hunting.

Use Cases

  • Secure Multi-Party Collaboration: A healthcare provider uses Fortra’s GoAnywhere MFT to securely exchange patient records with insurance companies while maintaining a full HIPAA-compliant audit trail.
  • Brand Protection & Anti-Phishing: A global retail brand utilizes Agari and PhishLabs to monitor for domain spoofing and automatically take down malicious sites impersonating their brand.
  • Continuous Security Validation: A financial institution runs automated penetration tests using Core Impact and Cobalt Strike to validate their defenses against the latest TTPs (Tactics, Techniques, and Procedures).
  • Automated Data Classification: An engineering firm uses Fortra's Data Classification tools to automatically tag intellectual property, ensuring that sensitive blueprints cannot be uploaded to unauthorized cloud storage.
  • Hybrid Cloud Monitoring: A mid-market enterprise uses Alert Logic (by Fortra) for MDR to gain visibility into threats across their legacy on-prem servers and their new AWS environment.

Pricing Models

  • Modular Subscription: Most Fortra products are sold as individual subscriptions, allowing customers to pay only for the specific capabilities they need.
  • User/Node Based: Pricing often scales based on the number of protected users (for Email/DLP) or the number of IP addresses/assets (for Vulnerability Management).
  • Volume-Based (MFT): Secure file transfer pricing is typically driven by the number of managed file transfer nodes or transaction volumes.
  • Tiered Bundling: Fortra offers 'better together' pricing incentives for customers who adopt multiple solutions across their "Security Bundles."
  • Managed Service Fees: MDR and SOC services are priced based on data ingestion rates (GB/day) or the number of monitored endpoints.
  • Additional Costs: Consider professional services for initial complex deployments and annual maintenance fees for any legacy on-premises perpetual licenses.

Technical Requirements

  • Deployment Options: Flexible delivery models including SaaS (preferred), on-premises (Windows/Linux), and hybrid cloud.
  • Browser Support: Management consoles are optimized for modern browsers (Chrome, Edge, Firefox, Safari).
  • Agent Requirements: Certain DLP and MDR features require lightweight agents installed on Windows, macOS, or Linux endpoints.
  • Database Dependencies: On-premises installations may require SQL Server or PostgreSQL for backend logging and configuration storage.
  • Network Requirements: Specific firewall rules and port configurations (e.g., 443, 22) are required for cloud-phone-home capabilities and secure transfers.

Business Requirements

  • Executive Sponsorship: Given the breadth of Fortra’s portfolio, cross-departmental buy-in (IT, Security, Legal, and Compliance) is essential for full-platform adoption.
  • In-house Security Expertise: While many tools offer automation, having a dedicated security team or SOC to interpret findings from offensive security tools (Core Impact, Cobalt Strike) is recommended.
  • Data Governance Policy: Organizations must have a clear understanding of their data classification schema before implementing Fortra's Data Security suite to ensure effective policy enforcement.
  • Change Management: Implementation of automated remediation or strict DLP policies requires a structured change management process to avoid disrupting legitimate business workflows.

Implementation Timeline

  • Discovery & Planning (2-4 Weeks): Identifying specific security gaps, auditing current data workflows, and defining success criteria.
  • Initial Setup & Configuration (2-6 Weeks): Deploying core modules (e.g., GoAnywhere MFT or Digital Guardian DLP) in a sandbox environment.
  • Migration & Integration (4-8 Weeks): Transitioning legacy data to secure platforms and connecting Fortra tools to existing SIEM/SOAR stacks via APIs.
  • User Training & UAT (2-4 Weeks): Training administrators and end-users; performing User Acceptance Testing to ensure policies don't hinder productivity.
  • Full Go-Live (Varies): Total timeline typically ranges from 3 to 6 months depending on the number of products being implemented.

Support Options

  • Standard Support: Business-hour access to technical support via phone, email, and web portal.
  • Premium/Enterprise Support: 24/7/365 availability for critical (P1) issues with designated account managers and faster response time SLAs.
  • Fortra Academy: An extensive online learning platform providing self-paced training, certification programs, and product documentation.
  • Professional Services: Expert consultants available for architectural design, migration services, and custom script development.
  • Active Community: User forums and regular webinars to share best practices and stay updated on the latest threat intelligence.

Integration Requirements

  • Extensive API Support: Most Fortra products offer RESTful APIs for custom integrations with third-party applications and internal workflows.
  • SIEM/SOAR Compatibility: Native connectors for major platforms like Splunk, IBM QRadar, and Microsoft Sentinel to centralize security logging and alerting.
  • Cloud Ecosystems: Deep integration with AWS, Azure, and Google Cloud Platform for securing cloud-native workloads and storage.
  • Identity Providers: Integration with Okta, Azure AD, and Ping Identity via SAML/OIDC for secure Single Sign-On (SSO) and lifecycle management.
  • Standard Protocols: Support for industry-standard protocols including SFTP, AS2, HTTPS, and ICAP for seamless data movement and inspection.

Security & Compliance

  • Certifications: Fortra maintains various certifications across its product lines, including SOC 2 Type II, ISO 27001, and PCI-DSS compliance.
  • Data Residency: Multiple global data center regions are available to ensure compliance with local data sovereignty laws (e.g., GDPR in the EU).
  • Encryption Standards: FIPS 140-2 validated encryption for data at rest and in transit across MFT and DLP solutions.
  • Access Control: Robust Role-Based Access Control (RBAC) and Multi-Factor Authentication (MFA) support across all management consoles.
  • Audit Logging: Detailed, tamper-evident logs for all administrative and user actions to satisfy internal and external auditors.

Considering Fortra?

Independent. Vendor-funded. Expert-backed.

We'll help you evaluate Fortraagainst alternatives, negotiate better terms, and ensure a successful implementation. Our advisory services are funded through the vendor ecosystem — at no cost to you.