Deliver at high speed with low risk
Simplify your IT transformation
Secure what matters most
Implement the comprehensive cybersecurity framework
Protect your company's critical data
Implement a policy-based data governance framework
Deliver secure software fast
Compliance management solutions for the modern enterprise
Analyze in time to act
Analytics for business insights in a data driven world
The fastest, open, infrastructure-independent, advanced analytics SQL database
Quickly attain key information with best-in-class cognitive search and discovery
Securely access and analyze enterprise (and public) text, audio & video data
Search and analysis to reduce the time to identify security threats
An intuitive hunt and investigation solution that decreases security incidents
User and entity behavioral analytics that augments existing security tools and empowers security operations teams to identify and respond to the threats that matter before data is stolen
Leverage big data to optimize and make your IT processes more efficient
Autonomous operations through a business lens
Intelligent automation for service desk, configuration, and asset management
Open, secure, high-performance platforms to build Big Data analytics stacks
SQL analytics solution handling large amounts of data for big data analytics
High-scale protection of sensitive data at rest, in motion, and in use across systems
Increase velocity, remove bottlenecks and continuously improve software delivery
Scale Enterprise Agile transformations from planning to a progression supporting full DevOps demands while creating a “quality everywhere” culture
Agile/DevOps management for continuous quality and delivery
Manage and track requirements from idea to deployment
Plan, track, orchestrate, and release complex applications across any environment
Enable all aspects of SCCM with enterprise grade scalability, security, and compliance
Automate deployments for continuous delivery with drag-and-drop simplicity
Improve application quality and gain real-time insights into the health and risks associated with every release
Govern application lifecycle activities to achieve higher quality
Unify test management to drive efficiency and reuse
Integrated, component-based test framework that accelerates functional test automation
Multi-platform functional test automation, combining extensive technology support with AI-driven capabilities
Accelerate functional test automation across web, mobile, API, and enterprise apps
Discover, design, and simulate services and APIs to remove dependencies and bottlenecks
Shift-left functional testing using the IDE, language, and testing frameworks of choice
Reliable and efficient test automation for functional and regression testing
Centralized, omnipresent lab to develop, debug, test, monitor, and optimize mobile apps
Engineer performance early in the lifecycle through the end-user experience
Learn more about the LoadRunner Family of solutions
Cloud-based solution to easily plan, run and scale performance tests
Project-based performance testing to identify performance issues
Easy-to-use performance testing solution for optimizing application performance
Collaborative performance testing platform for globally distributed teams
Keep your applications secure with powerful security testing
Identifies security vulnerabilities in software throughout development
Gain valuable insight with a centralized management repository for scan results
Manage your entire application security program from one interface
Provides comprehensive dynamic analysis of complex web applications and services
DevOps tools provide more efficiency and flexibility needed to meet business needs
Builds packages of change artifacts to speed up mainframe application development
Enable faster, efficient parallel development at scale
A development environment that streamlines mainframe COBOL and PL/I activities
Intelligence and analysis technology that provides insight into core processes
Fuel mobile apps, cloud initiatives, process automation, and more
Modernize Core Business Systems to Drive Business Transformation
Build and modernize business applications using contemporary technology
Modernize COBOL and PL/I business applications using state-of-the-art tools
Future-proof core COBOL business applications
Maintain and enhance ACUCOBOL-based applications
Deliver application access—anywhere
Maintain and enhance COBOL systems
Maintain and enhance RM/COBOL applications
Unlock the value of business application data
Connect COBOL applications to relational database management systems
Derive incremental value with real-time, relational access to COBOL data
Unlock business value with real-time, relational access to ACUCOBOL data
Connect ACUCOBOL applications to relational database management systems
Automatically understand and analyze Micro Focus COBOL applications
Build COBOL applications using Agile and DevOps practices
Deploy COBOL applications across distributed, containerized or cloud platforms
Modernize core business system infrastructure to support future innovation
Modernize IBM mainframe applications, delivery processes, access and infrastructure
Plan, manage and deliver Enterprise software with compliance and certainty
Manage agile projects using a collaborative, flexible, requirements and delivery platform
Manage requirements with full end-to-end traceability of processes
Understand, analyze, and extract critical mainframe COBOL application value
Automatically understand and analyze IBM mainframe applications
Capture, analyze, and measure the value, cost and risk of application portfolios
Build packages of change artifacts to speed up mainframe application development
Manage all aspects of change for robust, automated mainframe application delivery
Build and manage packages of change artifacts to speed up mainframe application development
Provide multiple change management interfaces to maintain mainframe apps
Build, modernize, and extend critical IBM mainframe systems
Build and modernize IBM mainframe COBOL and PL/I applications
Manage mainframe files for fast problem resolution
Accelerate IBM mainframe application testing cycles with a scalable, low-cost solution
Easily test mainframe application changes using flexible infrastructure
Compare and manage mainframe data, text, and directory files
Automate deployments and orchestrate the application release process to join teams
Connect Dev and Ops by automating the deployment pipeline and reduce feedback time
Centralize planning and control for the entire software release lifecycle
Orchestrate and integrate processes for faster software development and delivery
Detect changes, synchronizes multiple environments, and restores failed systems
Leverage modern Hybrid IT infrastructure to execute application workload in a fit-for-purpose model
Execute IBM mainframe COBOL and PL/I workload on Windows, Linux and the Cloud
Execute modernized IBM mainframe workloads under Microsoft .NET and Azure
Modernize host application access: easier to use, easier to integrate, easier to manage, more secure
Modernize application access across desktop, web, and mobile devices
Modernize IBM, HP, and Unix application access across desktop and mobile devices
Web-enable IBM and VT application desktop access, Java free
Modernize Unisys mainframe application desktop access
Modernize IBM, HP, and Unix application desktop access
Automate IBM, HP, and Unix application desktop access
Bring the value of host applications to new digital platforms with no-code/low-code modernization
Create new applications and workflows with Web services and APIs for IBM, HP, and UNIX applications
Fuel analytics platforms and BI applications with Unisys MCP DMSII data in real time
Respond to new regulatory requirements for host application access and data protection
Centralize host access management with identity-powered access control and data security
Modernize file transfer with security, encryption and automation, within and across the firewall
Learn how Advanced Authentication Connector for z/OS is a multi-factor authentication for all your IBM z/OS end points
Improve governance for host access software and infrastructure
Measure and manage terminal-based software deployment and usage
Attain interoperability of systems across the enterprise
Develop and deploy applications with a comprehensive suite of CORBA products
Build distributed applications at enterprise scale
Develop, deploy, and support CORBA 2.6 compliant middleware in C++ or Java
Connect applications on diverse operating environments
Always protected, always available—without the complexity and cost.
Enterprise data protection software for files, applications, and VMs
Advanced analytics and reporting application for Data Protector environments
PC backup solution for data stored on end-user computers
Cloud based endpoint backup solution with file sync and share,and analytics
Backup and disaster recovery for diverse, dynamic, and distributed enterprises
VM backup and replication for VMware vSphere and Microsoft Hyper-V environments
Keep your business running—no matter what.
Simplifies resource management on a Storage Area Network and increases availability
Protects your key business systems against downtime and disaster
Provides cost-effective, all-in-one disaster recovery through a hardware appliance
Disaster Recovery that uses virtual infrastructure capacity to protect servers
Backup and disaster recovery solution that ensures critical data is always available
Build a productive, mobile workforce.
Helping teams work together via email, instant messaging, and secure file sharing
Email, IM, chat-based teamwork, anti-virus, anti-spam, disaster recovery, and more
Provides secure email, calendaring, and task management for today's mobile world
Backup and disaster recovery solution that ensures critical email is always available
Protect your network and messaging system from malware, viruses, and harmful content
Provides secure team collaboration with document management and workflow features
Provides secure file access and sharing from any device
Seven essential tools to build IT infrastructures, including secure file sharing
True BYOD across your entire enterprise—from mobile to mainframe
Print across the enterprise and platforms from any device
Secure and manage mobile devices your users want to work on—even personal devices
Provides single sign-on for enterprises and federation for cloud applications
Run terminal emulation apps on your mobile device
A zero-footprint terminal emulator that provides HTML5 access to applications
Protect your sensitive information more securely with multi-factor authentication
Delivering critical file, storage and print services to enterprises of all sizes
File, print, and storage services perfect for mixed IT environments
Provides automated management of file storage for users and work groups
File Reporter and Storage Manager solution suite bundle
Trusted, proven legal, compliance and privacy solutions
Consolidate and govern information for legal, compliance, and mailbox management
Cloud-based, scalable archiving for regulatory, legal, and investigative needs
Archive all business communication for case assessment, search, and eDiscovery
Automate employee data and communication monitoring to meet regulatory compliance and internal initiatives
Mitigate risk across social media channels to meet regulatory compliance obligations
Securely meet regulatory, privacy, and jurisdictional retention requirements
Helping organizations meet data privacy regulatory guidelines through the management & disposition of data.
Address the ever-changing needs of network data management
File analysis to discover, classify and automate policy on unstructured data
Discover what is being stored and who has access
Structured data archiving to retire outdated applications and reduce data footprint
Identity-driven governance of data & access
SaaS-based file analysis on all of your unstructured data
Identify, lock down, analyze, and prepare data for litigation and investigations
Respond to litigation and investigations quickly, accurately, & cost-effectively
Find, protect and secure your sensitive and high-value data
Saas-based data discovery, data access, data governance and data preservation
Automate data discovery, classification, and management of unstructured and structured data
Deliver information faster organization-wide with cognitive search and analytics
Accelerate your IT Operations to the speed of DevOps
Automate provisioning, patching, and compliance across the data center
Backup and disaster recovery for diverse, dynamic, and distributed enterprise
Discover and manage configuration items (CIs) in Hybrid IT environments.
Simplify fulfillment automation and enforce governance
Automate and manage traditional, virtual, and software-defined networks
The first containerized, autonomous monitoring solution for hybrid IT
Automate IT processes end-to-end
Build, secure, and scale automated business processes across the enterprise
Engaging end-user experience and efficient service desk based on machine learning
Security at the core to everything you do; Operations, Applications, Identity and Data
Detect known and unknown threats through correlation, data ingestion and analytics
A comprehensive threat detection, analysis, and compliance management SIEM solution
An intelligent log management solution that eases compliance burdens and accelerates forensic investigation for security professionals
A comprehensive log management solution for easier compliance, efficient log search, and secure cost-effective storage.
Download and deploy pre-packaged content to dramatically save time and management
A future-ready data platform that transforms data chaos into security insight.
A fully-featured, adaptable solution that simplifies the day-to-day use of SIEM
A comprehensive Security Orchestration Automation Response platform with cognitive automation, investigation service desk, process orchestration and SOC analytics.
Encryption, tokenization and key management for data de-identification and privacy
Persistent file encryption, complete control, and visibility to simplify unstructured data security
Format-preserving encryption, tokenization, data masking, and key management
Omni-channel PCI compliance and data protection for end-to-end payments security
Email, file, and Office 365 protection for PII, PHI, and Intellectual Property
Saas cloud email encryption to protect information on Office 365
The full solution for secure automated file transfer management inside and across perimeters
Secure development, security testing, and continuous monitoring and protection
Identifies security vulnerabilities in source code early in software development
Gain visibility into application abuse while protecting software from exploits
An integrated approach to Identity and Access Management
A comprehensive identity management and governance solution that spans across the infrastructure
Provisions and governs access to unstructured data
Provides an LDAP directory with incredible scalability and an agile platform
Provides automated user access review and recertification to remain compliant
Delivers an intelligent identity management framework to service your enterprise
Consistently enforce access rights across your business environment
Move beyond username and passwords and securely protect data and applications
Multi-factor Authentication for all your IBM z/OS end points
Integrate the host with your modern security framework
Adapt the authentication and access experience to the risk at hand.
Enables users to reset their passwords without the help of IT
Streamlines authentication for enterprise apps with a single login experience
Protect and manage access to your APIs.
Manage and control privileged account activities for all credential-based systems
Enables IT administrators to work on systems without exposing credentials
Limits administrative privileges and restricts directory views to specific users
Edit, test and review Group Policy Object changes before implementation
Protect critical data, reduce risk and manage change with Change Guardian
Extend the power of Active Directory to Linux resources
Deliver actionable and timely security intelligence
Finds and repairs configuration errors that lead to security breaches or downtime
Provides easy compliance auditing and real-time protection for IBM iSeries systems
Antivirus, anti-spam, anti-malware, and network protection
Scalable, end-to-end encrypted email solution for desktop, cloud, and mobile
Ensure all devices follow standards and compliance to secure your network
Cloud-based endpoint backup solution with file sync and share, and analytics
Package, test, and deploy containerized Windows apps quickly and easily
Provides reports that integrate licensing, installation and usage data
Provides automated endpoint management, software distribution, support, and more
Delivers identity-based protection for devices and features total protection
Proactive laptop and desktop data protection to automatically lock out threats
Automates patch assessment and monitors patch compliance for security vulnerabilities
Streamlines and automates the way you provide IT services to your business
Seven integrated products to help track, manage and protect endpoint devices
Shape your strategy and transform your hybrid IT.
Help you embed security throughout the IT value chain and drive collaboration between IT operations, applications, and security teams.
Help you to react faster and gain a competitive advantage with enterprise agility.
Accelerate your hybrid cloud outcomes with advisory, transformation and implementation services.
Application management services that let you out-task solution management to experts who understand your environment.
Strategic consulting services to guide your digital transformation agenda.
Fully functional use-case modeling, with pre-built integrations across the Micro Focus Software portfolio, showcasing real-life use-case
Expert security intelligence services to help you quickly architect, deploy, and validate your Micro Focus security technology implementation.
A service integration and management service that optimizes delivery, assurance, and governance in multi-supplier settings.
Get insights from big data with real-time analytics, and search unstructured data.
Mobile services that ensure performance and expedite time-to-market without compromising quality.
Comprehensive Big Data services to propel your enterprise forward.
Give your team the power to make your business perform to its fullest
All Micro Focus learning in one place
Build the skills to succeed
Find what you’re looking for by entering a keyword into the search bar or adjusting the filters below to narrow down your search before browsing.
Didn't find it? Search again:
Included in search:
Protecting The Digital Enterprise
Micro Focus Security supports a new approach that focuses on protecting the interactions between users, applications, and data, no...
Doctors on Demand
Micro Focus Fortify on Demand part of security roadmap to position Doctors on Demand’s cyber security beyond any other telehealth provider
Fortify Audit Assistant
Triaging and validating raw static analysis results is the most time intensive process within application security testing. Fortif...
Fortify on Demand
Technical Datasheet for Micro Focus Fortify's Application Security as a Service offering, Fortify on Demand.
Fortify SCA Health Check Services
Micro Focus Fortify SCA Health Check Services are designed to maintain optimal performance.
Fortify SSA Assessment
Micro Focus Fortify SSA Assessment - Building a scalable, flexible software security program.
Security Fortify Application Defender
See threats to your application’s security. Micro Focus® Security Fortify Application Defender is a runtime application self-pr...
Information Insight for Data Privacy Act Readiness
Information management and governance software
Strengthen Application Security: Application Security Consulting
If your business is adopting software security assurance best practices, Micro Focus Fortify can help.
Fortify Application Security Handout
This document showcases the complete Fortify product suite capabilities, including what's new.
2018 Application Security Research Update:
Micro Focus Fortify Software Security Research: 2018 Application Security Research Update
Cloud-based managed security testing improves security and efficiency and reduces cost.
SAP AG is the revenue leader in enterprise software and software-related services. To maintain this position, SAP is committed to ...
10 Foundational Elements of DevSecOps in Government
Government institutions hold higher standards for security operations and governance than mostindustry and commercial organization...
Enable Developers to Code With Security in Mind
Secure your code from the start, with Micro Focus Fortify and Secure Code Warrior.
Seamless Application Security: Security at the Speed of DevOps
Application development at DevOps speed doesn’t mean sacrificing security and putting your business at risk. Learn how Fortify h...
Fortify Software Security Center, Ecosystem and Tools
Fortify offers the most comprehensive static, dynamic and mobile application and security testing technologies, along with runtime...
2017 Application Security Research Update
A single weak point in a line of code can create an open door for attackers. Our researchers have identified the top 5 AppSec risk...
A Developers Guide to OWASP Top 10 2017
This guide provides an overview of each 2017 OWASP Top 10 application security risk and practical tips for writing secure code. It...
The translated version of this page is coming soon. In the meantime, content will appear in standard North American English.