Blog

Blog

Automate IBM i PGP Encryption and Secure File Transfers with Robust MFT

Streamlining and automating the PGP encryption process for organizations on the IBM i platform can help ease time pressures on IT staff and in turn, reduce risks that lurk around the corner when teams rely on error-prone manual tasks and cumbersome scripts and programming to encrypt and monitor file transfers. There’s a better, a more secure option using a Managed File Transfer (MFT) solution. PGP...
Blog

How Reviews Fit into the MFT Buying Process

Short of direct conversations with IT peers, reviews on third-party review sites can serve as one of the most valuable resources for IT teams when it comes to choosing what software would best suit an organization’s needs.IT pros would be wise to give a nod to the genuine feedback that can be gleaned from reputable sites such as PeerSpot, SoftwareReviews, G2, and Capterra when sourcing solutions...
Blog

Meet Essential Eight Maturity Requirements with MFT

The purpose of Australia’s Essential Eight is to provide a clear, easy-to-follow set of guidelines that can be applied to protect Australian organizations and their information technology systems against cyberattacks.The Essential Eight Maturity Model helps support the implementation of Essential Eight principles and provides a transparent assessment of how easy an organization’s systems are to...
Blog

The Risks of Outdated File Transfer Protocols

In today's data-driven business landscape, marked by highly interconnected ecosystems, transferring files securely is crucial to operational integrity and confidentiality. With the proliferation of cyber threats and stringent regulatory requirements, safeguarding data during transit cannot be overstated. Secure file transfer solutions protect against unauthorized access and interception, foster...
Blog

How MFT Supports the NIS2 Directive and Oct. 2024 update

If you are not yet up to speed on the latest developments around the European Union’s (EU) NIS2 Directive, get ready, as they go into effect Oct. 17, 2024. That’s when Member States are required to have transposed the directive into national law. EU countries must have their national legislation on par with the NIS2 requirements and comply with the new, broader requirements. This update aims to...
Blog

Protecting PII with Threat Protection Strategies

The task of protecting PII (Personally Identifiable Information) is one faced by many industries, but primarily is top-of-mind for those in healthcare, financial services, retail, education, and government. These business sectors not only are responsible for protecting PII such as Social Security numbers, health records, credit card details, student addresses, and more for the sake of their...
Blog

New MFT eBook Asks 9 Industry Experts What They Think

Want to see the value of a Managed File Transfer (MFT) solution? Ask those who know, use, and love it.In our latest eBook, MFT's Role in Business: IT Leaders Weigh In, Fortra canvasses the opinions of nine industry experts across the realms of IT and lets them speak for themselves. These IT and security professionals share their experiences working with Fortra’s GoAnywhere MFT and candidly share...
Blog

Report Reveals Highest Cost of Data Breach Spike Since Pandemic

The game is changing. Data is still being breached but with AI and digitization running at full gallop, organizations may be facing breaches at a scope previously unimagined. IBM recently released their 2024 Cost of a Data Breach Report, highlighting some of these changes. This year’s findings may have the gravity to impact the way people think about protecting their data. General Trends This...
Blog

OAuth Adds Extra Security Layer to MFT

We’ve all received these messages, “Allow this application to access your account,” or “Sign in with Facebook,” when navigating online. That’s OAuth, or Open Authorization, and this step is often encountered when using Google, X, or Facebook among other services. OAuth blends security and convenience when needing to share authorization data between two different applications.Instead of the more...
Blog

Folder Encryption Supports Financial Compliance

Encrypted Folders in MFT Can Help Meet Financial Industry Compliance RequirementsOrganizations in the financial sector that need to meet compliance requirements for PCI DSS, GLBA, or SOX can benefit from folder encryption functionality in their Managed File Transfer (MFT) solution. Utilizing folder encryption can help meet the mandate to encrypt sensitive data both in transit and at rest (or not ...
Blog

How Managed File Transfer (MFT) Meets the Evolving Needs of Businesses

Businesses are under increasing pressure to securely exchange sensitive data with partners, customers, and suppliers. This exchange is crucial for collaboration, decision-making, and operational efficiency. However, traditional file transfer methods, such as email attachments and FTP servers, often lack the necessary security, reliability, and automation to address modern organizations' demands...
Blog

PeSIT Protocol: Advantages and Considerations

The PeSIT file transfer protocol, used primarily by financial organizations in Europe, enables files to be written and read from one machine to another on a point-to-point or point-to-multipoint basis. And, while it can certainly be used beyond banking, it remains one of the lesser known, but still secure and reliable file transfer protocols for the financial industry.
Blog

Securing Data in SharePoint and Other Cloud Applications with MFT

Organizations adopting cloud-based storage platforms as their go-to for the mountains of data they want retain and work with do so for a number of reasons, including flexibility, scalability, and potential cost savings. However, security and control over sensitive data may be sacrificed if key security gaps aren’t closed.Even popular, user-friendly platforms such as SharePoint, Dropbox, and...
Blog

Optimized UI and Built-in Security Can Boost MFT Usage; Minimize Risk

Human behavior can be the driving force behind whether a software solution, such as Managed File Transfer (MFT), is successfully adopted by employees or is discarded in favor of familiar, or even clunky, legacy script solutions. Organizations weighing their file transfer software options should consider the solution’s user interface (UI), as well as its built-in security features and controls to...
Blog

Best Practices for Data Retention

Incorporating data retention best practices as part of an organization’s overall data management processes is a key strategy to wrapping sensitive data with layers of protection and intent throughout its entire lifecycle. Applying best practices around retention and purging data can increase an organization’s overall security posture and strengthen defense against cybercrime or inadvertent...
Blog

How Are You Doing with PCI DSS v4.0 Compliance?

As of March 31, 2024, organizations in the payments industry will need to comply with all new PCI DSS v.4.0 requirements. Find out what the new obligations will be, how to tie them into your enterprise, and how Fortra can help.For many organizations, 2024 will be a big year. Aside from focusing on increasing revenues, market share, and demand, there...
Blog

Load Balancing Keeps Files Moving, Processes Running

Dreaded network bottlenecks and the ensuing risk of downtime are anxiety-producing situations for many IT teams. Afterall, uptime is how business gets done and when that fails, the domino effect can have serious repercussions. Load balancing, however, can act as a preventative, to keep network traffic flowing.What is Load Balancing?Load balancing is...
Blog

How MFT Helps the Insurance Industry Secure Files

Insurance industry insiders know an insurance policy is one of the few products purchased that most people hope to never have to put to use. Afterall, “using” your insurance means that an adverse event has occurred – an auto accident, medical crisis, storm damage, or any number of situations where not having a policy in place could have huge financial...
Blog

Hardening Your MFT Environment: A File Security Essential

Congratulate yourself if you already have a secure, managed file transfer (MFT) solution in your organization. You’ve taken a proactive step towards addressing growing cybersecurity concerns around the exchange of your sensitive, often business-critical files.While robust file transfer solutions can offer security, automation, and a streamlined way to...