Global Partner – Fortra
- Home
- Global Partner – Fortra
Connecting Global Expertise for Shared Success



Fortra Cybersecurity Solutions Now Available in Saudi Arabia via WWITCO
In a strategic partnership, WWITCO proudly introduces Fortra’s world-class cybersecurity solutions to the Saudi market. With a mission to protect organizations at every stage of the attack chain, Fortra offers robust, intelligent, and highly adaptable security tools. Now, Saudi businesses of all sizes can strengthen their cyber defense, compliance, and resilience strategies using the most trusted solutions, exclusively offered through WWITCO’s platform.
Product Portfolio Overview
- Cobalt Strike
Adversary simulation software designed for red teams and penetration testers.
Key Features:- Post-exploitation and covert operations toolkit
- Threat emulation profiles mimicking real-world actors
- Beacon payloads for communication over multiple channels
- Aggressor Script for automation of advanced attack scenarios
- Core Impact
Automated penetration testing platform.
Key Features:- Multi-vector testing (network, web, endpoint)
- Built-in exploit library
- Phishing campaign simulations
- Integration with vulnerability scanners
- Outflank Security Tooling (OST)
Red teaming toolkit for advanced persistent threat simulation.
Key Features:- Tools to evade detection by EDRs and antivirus
- Capabilities to craft custom payloads
- Command and control techniques testing
- Focus on stealth and persistence
- GoAnywhere Managed File Transfer (MFT)
Secure file transfer solution.
Key Features:- Centralized file movement control
- Encryption (PGP, SFTP, FTPS)
- Workflow automation and auditing
- Cloud and on-premises deployment options
- Digital Guardian Data Loss Prevention (DLP)
Data-centric protection across endpoints, networks, and the cloud.
Key Features:- Policy-based data visibility and control
- Intellectual property protection
- Insider threat detection
- Compliance reporting (GDPR, HIPAA, etc.)
- Clearswift Secure Email Gateway
Comprehensive email protection.
Key Features:- Adaptive Redaction to remove sensitive content
- Anti-virus and anti-malware scanning
- Phishing and spam filtering
- Detailed policy enforcement
- Agari Phishing Defense and Response
Email fraud protection platform.
Key Features:- DMARC enforcement and monitoring
- Identity-based threat detection
- Automated incident response
- Advanced threat intelligence
- Alert Logic MDR
Managed detection and response solution.
Key Features:- 24/7 SOC monitoring
- Threat hunting and incident response
- Cloud, on-premises, and hybrid environment coverage
- Threat intelligence-backed analysis
- Tripwire Enterprise
File integrity monitoring and security configuration management.
Key Features:- Real-time change detection
- Policy compliance enforcement (PCI DSS, SOX, HIPAA)
- Detailed security configuration assessments
- Integration with SIEM solutions
- Terranova Security
Cybersecurity awareness training and phishing simulations.
Key Features:- Multilingual training modules
- Customizable phishing simulations
- Gamified learning paths
- Measurable reporting on employee risk levels
- Frontline Vulnerability Manager
Automated vulnerability assessment and management solution.
Key Features:- Continuous vulnerability scanning
- Risk-based prioritization
- Patch verification
- Detailed analytics and reporting
- Cloud Access Security Broker (CASB)
Secures SaaS, PaaS, and IaaS usage.
Key Features:- Visibility into shadow IT
- Policy enforcement for cloud usage
- Threat protection for cloud apps
- Real-time monitoring and alerts