Blog

Blog

Why Choose AS2 for Secure File Transfers?

Securing all the data your organization exchanges is a need, not a want in today’s cybersecurity environment. To minimize the risk of a security breach – whether intentionally malicious, or accidental through user error – takes the proverbial village of proactive measures. One of these is employing strong protocols such as AS2 (Applicability...
Blog

Collaboration Tools Like Box.com vs. MFT: What Do You Really Need?

Collaboration tools like Box.com and managed file transfer (MFT) tools like GoAnywhere MFT, are not the same. Both, however, have unique advantages, depending on your organization’s requirements around data. Box is a cloud-based tool for organizational teams to collaborate, manage, and store content. GoAnywhere MFT is a secure managed file transfer...
Blog

How MFT Helps Collaboration in Hybrid Environments

Whether your organization’s employees are back in the office at their desks full time, or more commonly pop into your brick-and-mortar location two to three times a week in hybrid fashion, it’s important to consider how they can securely collaborate. The changing work landscape, with workers spread throughout the world, and schlepping their laptops...
Blog

FTP 101: What are the Basics?

There's no shortage of shortage when choosing just the right FTP for your organization. Learn the differences and which FTP may be right for you.
Blog

How Businesses Can Collaborate Securely with GoDrive

Collaborating or sharing information lies at the very heart of business. Securing these information exchanges, however, requires more than a firm handshake. The information your organization owns is priceless, so it’s vital to ensure that it is accessed, manipulated, and shared only by authorized individuals and with security measures that do not...
Blog

The Role Between Shadow IT and Content Collaboration

Shadow IT is Problematic for CollaborationContent collaboration platforms are more popular than ever as organizations produce and share a plethora of content every day. A centralized platform can simplify collaboration and promote productivity, but Shadow IT can put a hindrance on progress and optimal file sharing practices.What is Shadow IT?Shadow IT...
Blog

AS2 Drummond Certified: GoAnywhere MFT Delivers Security and Interoperability

If you’re looking for a secure managed file transfer solution, why not check one out that has been recognized by the Drummond Group as AS2-certified? The AS2 features in Fortra' GoAnywhere Managed File Transfer (MFT) solution, were reviewed and tested against the world's highest standards, as set by the Drummond Group.Drummond AS2 Certification...
Blog

The Surprising Relationship Between Data Privacy Laws and File Sharing

Location, location, location. Not just the mantra of realtors and would-be buyers – it’s also a concern for data security professionals world-wide. As cloud computing has ramped up across industries, the physical location of stored data has been called into question, alongside concerns stemming from data privacy laws.Read on to discover how data...
Blog

The Benefits of Secure Collaboration Tools

Content collaboration platforms have become critical to an organization’s growth, especially within the context of increased remote work. However, not all content collaboration platforms are created equal: some platforms will prove to be clunky and difficult to navigate, which defeats the purpose of utilizing them. What is Content Collaboration?...
Blog

Is On-Premises Enterprise File Sharing Right for Your Business?

Now that offices are re-opening and bringing employees back under one roof, do you need to revisit your on-premises file sharing solution?What is On-Premises File Sharing?Like other file sharing solutions, including Dropbox, Google Drive, and Box, on-premises file sharing solutions give employees flexibility in how and from where they access work...
Blog

What is Drummond Certification?

Drummond Certification: What is it? The Drummond Group is a third-party certification body that certifies software products and solutions to ensure a given solution does what it says it will. A security solution that goes through their extensive certification process earns the right to add the Drummond-certified distinction to its product...
Blog

AS2 vs. FTP

When it comes to B2B communications, AS2 and FTP rank among the most popular file transfer protocols. Each protocol can serve your business in a different way, which makes it important to examine your needs along the research journey. Today we’re going to examine AS2 vs. FTP by their key components to help you decide which file transfer protocol will...
Blog

How to Implement the Right Enterprise File Sharing Solution

Implementation 101An enterprise file sharing solution is an important tool for organizations to have. The benefits are practically endless – from ensuring compliance with data regulations, to streamlining transfers with automation, to the auditing and reporting capabilities – implementing the right tool is key.However, the act of implementing the...
Blog

Pair Your Enterprise File Sharing Solution with Data Loss Prevention

Is Your Enterprise File Sharing Solution Enough? Enterprise file sharing solutions are already a great way to encrypt sensitive data in motion, but encryption alone is not enough. Can you ensure that sensitive information is not accidentally transmitted? Are you able to audit who is sending what? And last, but not least, are you protecting your...
Blog

Signs Your Business is Ready for an Enterprise File Transfer Solution

Follow the Signs If you and your enterprise are needing to regularly transfer sensitive data between users, employees, and trading partners, it’s important to follow the signs. One wrong move, such as the lack of file encryption for transfers, can hit your organization with huge fines for non-compliance. It’s important to avoid these instances...
Blog

What are Data Silos?

Standing alone can be an uncomfortable feeling at any gathering. You may only hear part of a conversation; you might not mesh well with the others in the room; you could face a number of awkward silences, and even be rejected completely.Feeling like a lone wolf at a party is discomforting for sure. Having critical data siloed and inaccessible at your...
Blog

What is EFSS?

If you’ve ever had to MacGyver a way to send out a too-large file or work with a group of people on a single document, EFSS is probably what you were looking for to make the process painless: it’s a solution that makes sharing files (of any size) and collaborating in one place easy – and secure.EFSS stands for Enterprise File Syncing and Sharing, also...
Blog

How Does the DMZ Impact Security?

Your Secret Weapon for Data SecurityWhen weapons and military forces have been removed from active duty, this is referred to as “demilitarization.” On the internet, the demilitarized zone, or the DMZ, is a similar situation.What is the DMZ?The DMZ is the neutral network that resides between the Internet and your organization’s private network. It’s...
Blog

4 Benefits of On-premises Enterprise File Sync and Sharing

The value of mission-critical business documents can't be overstated — but lax or renegade employees or trading partners can put your sensitive data at risk with reckless storage or sharing practices. Luckily, knowing that your data hasn't been exposed is as easy as implementing a secure Enterprise File Sync and Share (EFSS) solution. There are...
Blog

What's the Difference Between AS2, AS3, and AS4?

If you think these three protocols are simply sequential updates from the 1990s’ AS1 protocol you’d be mistaken. Each protocol brings its own distinct features to the data transmission table. Here’s a few key differences between them.What is AS2?AS2 (Applicability Statement 2) is a protocol specification used to transmit sensitive data securely and...