Post Grid

Creating custom Responsive Post Grids with Fortuna is a breeze! Fully customize the looks of your grids, add them to any page, filter the items you want to display, manage the output and sub-items displayed like date, image, excerpt, Read More link etc. Check out some of the modification options below as well as a few examples further down the page.

Features

What elements to show (Pic, Title, Excerpt, Date, Link etc.)
Regular/Boxed style presets
Image Hover Effect (4 Style Presets available)
Grid column count (4 Style Presets available)
Date Style Presets (2 Style Presets available)
Custom Query/Filter for the Items displayed
Total Items in Grid
Spacing between items (None, Small and Large)
CSS animation of the items
Category Query Filter
Order and Order By clauses
Overwrite image size

Post Grid Example #1

Superior User Experience, Greater Automation Capabilities and Enhanced Value for Partners with HALOCORE® 5.0

HALOCORE is a unique technology that protects intellectual property and other sensitive information ...

Read more

SECUDE’s HALOCORE® 5.1 Achieves SAP-Certified Integration with SAP S/4HANA®

HALOCORE 5.1 is based on new, powerful rules and configuration templates (available for SAP solutions ...

Read more

SECUDE implements HALOCORE® in Microsoft

HALOCORE® extends the SAP access control shield for IP, PII and even Toxic Data and other sensitive ...

Read more

Now its Google. Are You Next?

British Airways, Apple Inc., Tesla… the list just keeps growing. The latest in this infamous line is ...

Read more

10 Data Leaks that have cost even Fortune 500 companies a fortune (2020 Update)

Data is undoubtedly the most important element in an organization. Securing data during these testing ...

Read more

Protecting IP of a Manufacturing Company – A Case Study

IP is the crown jewel of any organization. Protecting it goes beyond traditional security paradigms. ...

Read more

Data breach in Germany: Who will pay the GDPR fine this time?

Germany seems to be in the news for wrong reasons. The country paid its first GDPR fine recently. Now a ...

Read more

Is data collaboration the key to improving cybersecurity?

In today’s collaborative world, data is constantly on the move, traveling outside firewalls and ...

Read more

Webinar Recording: How to protect your critical data leaving the SAP environment?

Recently, SECUDE in collaboration with Wipro conducted a joint webinar on the topic - How to protect ...

Read more

Post Grid Example #2

How SECUDE HALOCORE helps Infosys extend data protection outside the organization – A Case Study

Infosys wanted to ensure that data especially sensitive information is available only to its employees and is ...

Read more

CISA Releases New Tool to Help Organizations Prevent Insider Threats

The Cybersecurity and Infrastructure Security Agency (CISA) has released a new tool that can help organizations ...

Read more

Why you need a layered security approach for protecting your data in today’s threat landscape

Learn how SECUDE’s HALOCORE provides contextual-driven data protection to SAP exported out of the system by ...

Read more

SECUDE and Turnkey Announce Strategic Technology Partnership

SECUDE, an established global security solutions provider offering innovative data protection for users of SAP and ...

Read more

October 2021 Roundup – Latest News, Trends & Updates in Data Centric Security

October 2021 Roundup - Latest News, Trends & Updates around the world in Data Centric Security. ...

Read more

5 Ways to Defend Against Supply Chain Cyberattacks

Supply chains make ideal targets for cybercriminals since they hold sensitive data, often have large attack surfaces ...

Read more

Post Grid Example #3

Beyond Blockchain: An Introduction to HALOCHAIN

This is part of two-part blog series about HALOCHAIN technology. In this introductory blog, ...

Do you have Microsoft Azure Information Protection? What stops you from using it?

Does your organization use Microsoft Azure Information Protection to protect critical ...

The Achilles heel of IT Security Defensive Measures: Log File Manipulation by authorized personnel. “Trust is good but Verification is better”

Log file manipulation is a critical problem that many organizations face. Administrators ...

SECUDE @ NASSCOM-DSCI AISS2017 Event

SECUDE participated in the NASSCOM-DSCI Annual Information Security Summit 2017 that was held ...