Blog

Blog

What is a DMZ and Why Do You Need a DMZ Secure Gateway?

If you’ve watched a science-fiction movie about space travel, then you’ve likely seen some version of a scene in which an astronaut reenters their ship from the outside abyss. Because the ship exists as a haven from the dangerous environment of empty space, the astronaut cannot simply open the door and stroll directly into the cockpit. To do so would...
Blog

5 Benefits of PGP Decryption Using Managed File Transfer

If your trading partners or vendors require you to PGP encrypt or decrypt the files you exchange, you may be on the search for an affordable, trust-worthy PGP software to implement in your organization. The software you’re looking for may also need to support more than basic PGP decrypt and encrypt functionality. You may want it to include a key...
Blog

How to Encrypt Files in Linux

If your organization uses Linux operating systems to run key business processes, it’s important to implement tried-and-tested Linux security practices that support critical files as they transfer from one system to another. One requirement that pops up frequently for Linux users is file encryption. Linux files need to be encrypted seamlessly and...
Blog

Which is Better: Dropbox vs. MFT?

So you’re looking for a way to securely share files with your team. Great! There are plenty of tools you can use today to collaborate and share documents as projects arise. Some are on-premises and other in the cloud, meaning you’ll likely find a solution that meets your organization’s unique needs. But are these commercial file sharing tools right...
Blog

GoAnywhere MFT Not Affected by EFAIL Vulnerabilities

Ashland, NE, May 16, 2018 In light of the recent Open PGP & S/MIME warning (EFAIL), GoAnywhere has performed a software security review of its managed file transfer solution to ensure customers and their encrypted emails are not affected by this vulnerability. The review was positive and demonstrates that GoAnywhere MFT is already protected...
Blog

5 Best Practices for IBM i File Transfers

Using IBM’s built-in FTP and Open SSH servers to transfer files to and from your IBM i systems can be time-consuming, if not simply riddled with fine details. From scripting knowledge to running specific (and sometimes obscure) commands, there’s a lot to consider—and the safety and integrity of your files is probably at the top of the list. ...
Blog

SFTP Server in the DMZ or Private Network

Many organizations have an SFTP server installed where their trading partners can connect to securely upload and download sensitive files. SFTP Server in the DMZ Traditionally SFTP Servers have been installed in the DMZ (or public facing) segment of the network since organizations were fearful of opening inbound ports into the Private (internal) network. ...
Blog

How to Solve 4 Common Email Security Challenges

Yes. Emailing someone is still one of the easiest ways to share data. However, there are some important caveats to sharing files this way that can put your organization’s file transfers at risk.Email File Transfer ChallengesThese are the four big challenges that organizations should be aware of when transmitting files via email.Email is sent "in the...
Blog

Reverse Proxy DMZ Secure Gateways Might Be the Missing Link in Your MFT Strategy

By now, most companies have gotten the message that their data—as well as the sensitive data belonging to customers and partners—needs reliable protection from unauthorized access. The ever growing regulatory environment is making it more and more painful for any company who does not take their data security seriously.The challenges of data...
Blog

Meeting Compliance Regulations and Privacy Laws for Sensitive Data Transfers

Comply with Data Security Requirements Highly sensitive data is exchanged between organizations on a constant basis making data security compliance more vital than ever to keep communication flowing. For instance, if a business routinely transmits financial information to their bank including payroll direct deposits and ACH payments, these...