Blog

Blog

Automate IBM i PGP Encryption and Secure File Transfers with Robust MFT

Streamlining and automating the PGP encryption process for organizations on the IBM i platform can help ease time pressures on IT staff and in turn, reduce risks that lurk around the corner when teams rely on error-prone manual tasks and cumbersome scripts and programming to encrypt and monitor file transfers. There’s a better, a more secure option using a Managed File Transfer (MFT) solution. PGP...
Blog

Protecting PII with Threat Protection Strategies

The task of protecting PII (Personally Identifiable Information) is one faced by many industries, but primarily is top-of-mind for those in healthcare, financial services, retail, education, and government. These business sectors not only are responsible for protecting PII such as Social Security numbers, health records, credit card details, student addresses, and more for the sake of their...
Blog

What We Learned in Our Inaugural State of Cybersecurity Survey

No one knows the challenges of securing an organization like the professionals who carry that responsibility daily. We set out to better understand the things they deal with and what they plan to focus on in our inaugural 2024 Fortra State of Cybersecurity Survey. Here are five key takeaways from the survey. 81% Call Phishing and Smishing Top Security...
Blog

Sharing Financial Files: Benefits of MFT

Financial file matters matter. Not only are these files a top priority to the banks and financial institutions that handle millions of transactions daily, they also matter to the industry’s compliance regulators, and to the public trusting that their financial information is secured. How organizational and personal financial data is handled and...
Blog

Why is it Smart to Bundle Cybersecurity Solutions?

When it comes to cybersecurity, joining the individual strengths of separate solutions to defend against cybersecurity threats is just smart business.What are Some Recommended File Security Pairings?There’s no question that cybersecurity worries are at the top of the list for many organizations and their IT teams. As this Canalys Newsroom article...
Blog

A Perfect Match: GoAnywhere MFT and Open PGP

As companies face increasing pressure to keep data safe, encryption protocols like Open PGP provide an increased level of security to do so. An open-source version of PGP (Pretty Good Protection), Open PGP delivers the same level of protection in a publicly available format. Because of its high availability, it enjoys widespread use. However, an...
Blog

Security Risks of File Transfers and How to Reduce Them

Transferring files between customers and trading partners, especially files containing sensitive data without appropriate data security protection solutions applied, involves at least some level of risk. You might accidentally send files to the wrong recipient. Or your latest email attachment was sent with an unsecure File Transfer Protocol (FTP)...
Blog

How to Secure Your Data Exchanges

Exchanging Data Securely Requires Stepped Up Data Transfer MethodsExchanging data is easy, right? Just grab a file, attach it, and hit “send.” Then sit back and relax. Not so fast! If you want to securely exchange data and protect any sensitive data your files may contain, you need to send them with a secure file transfer solution that protects data...
Blog

What is PGP Encryption and How to Use It

Encryption is key to securing organizational data in the short term and long. However, there are a few different types of encryption that organizations can use to achieve the optimal level of security. GnuPG is one of the most notable. However, today we’ll break down how PGP encryption works and how to use it to maintain the safety of your files....
Blog

What is PGP and How Does It Work?

When someone in your organization wants to transfer a file – internally or outside of the organization – a few concerns may come up:Is the file complete?Is it being sent to the right place?Will it arrive intact?Is sensitive data protected and encrypted from unauthorized recipients?All are valid concerns, and each can be addressed with the help of...
Blog

Pair Your Enterprise File Sharing Solution with Data Loss Prevention

Is Your Enterprise File Sharing Solution Enough? Enterprise file sharing solutions are already a great way to encrypt sensitive data in motion, but encryption alone is not enough. Can you ensure that sensitive information is not accidentally transmitted? Are you able to audit who is sending what? And last, but not least, are you protecting your...
Blog

3 Powerful Examples of MFT and DLP Paired in Action

On paper, combining two robust software products to form a more complete solution is a no-brainer. But how does it actually work in “real life?” First, let’s take a look at what the two solutions – adaptive data loss protection (A-DLP) and managed file transfer (MFT) – each offer to users. Then, we’ll highlight a few specific use cases where the...
Blog

Open PGP and GoAnywhere MFT: What You Need to Know

Which Solution is Right for You? Open PGP vs. GoAnywhere MFT If you have sensitive files that need to get from point A to Point B securely, you may have considered utilizing Open PGP or a managed file transfer solution, like GoAnywhere MFT. Do you know which option is the best fit for your organization? What is Open PGP? Open PGP is...
Blog

5 Benefits of PGP Decryption Using Managed File Transfer

If your trading partners or vendors require you to PGP encrypt or decrypt the files you exchange, you may be on the search for an affordable, trust-worthy PGP software to implement in your organization. The software you’re looking for may also need to support more than basic PGP decrypt and encrypt functionality. You may want it to include a key...
Blog

OpenPGP, PGP, and GPG: What is the Difference?

The privacy capabilities of encryption methods such as Pretty Good Privacy (PGP) allow organizations to achieve a hightened amount of data security and protection. There are various approaches and elements of comparison for these encryption methods, however, and each one comes with their own histories, features, and capabilities. These are: PGP,...
Blog

Is Your Company Letting Data Slip Through the Cracks?

Many Americans have spent the last few days frantically searching for receipts and other documentation to finish their taxes before April 15th — only to realize they get a one-month reprieve this year.Despite that sigh of relief, there's no doubt that some of those people thought they knew exactly where to find what they needed, and were dismayed to...