Blog

Blog

End-to-End Rights Management Made Simple with SFT

  Image Digital files are the crown jewels of any organization, and end-to-end rights management is increasingly the goal of businesses who need to transfer files securely. How can organizations ensure data is secure from inception to publication, especially when third parties enter the picture? Enter secure file transfer plus...
Blog

Is Your Disaster Recovery Site Ready?

  Image The old adage, "It's not a matter of if, but when" can strike fear in the heart of every IT professional, especially when talking about recovering form the unexpected impact of outages. Whether the result of a natural disaster, cybercrime impact, or large-scale network outages that dreaded downtime and the security measures...
Blog

How GoAnywhere MFT Works with SharePoint

  Image Data and documents are the lifeblood of the business and sharing that data to both external trading partners and internal stakeholders is essential. Discover how GoAnywhere works with one of today’s favorite intranet sites for teams and file sharing: SharePoint. What is SharePoint? SharePoint helps teams meet various...
Blog

How to Streamline Secure Data Exchanges

  Image Secure Data Exchanges Don't Have to Sacrifice Efficiency Hitting “send” is as routine and frequent as sipping on coffee for many employees. And uploading a file to a third-party, vendor, or another colleague happens with that same automatic mind-set. Outside of the IT team, many employees don’t actually give a lot of thought...
Blog

Comparing the Top File Transfer Protocols

  Image With dozens of file transfer protocols to choose from, how do you know which is the best for your business? Some file transfer protocol specifications are set by trading partners – method, format, and security requirements – while others are set by internal requirements. Discover the top secure file transfer methods, and how...
Blog

Choosing MFT Software Based on User Reviews

  Image Humans use reviews for pretty much everything – hiring a company, making a purchase, even applying for a job. Reviews give us insight into what someone – presumably someone like us, if they’re currently using the same thing we’re shopping for – thinks of a product: how they liked it, what their experience is, and what could...
Blog

5 Ways Government Can Improve Cybersecurity Resilience

  Image Cybersecurity for Government is Crucial In these trying times government agencies everywhere must be resilient when it comes to cybersecurity. Cyber resilience is an organization’s ability to prepare for, respond to, and recover from cyber threats. A cyber-resilient organization can adequately adapt to known and unknown...
Blog

ModernCTO Podcast with Chris Spargen - Seamless Managed File Transfer

Chris Spargen, Senior Solutions Engineering Manager for HelpSystems (now Fortra), was recently featured on the ModernCTO Podcast. In the interview, Spargen discusses how MFT technology has rapidly evolved to be more user friendly and how the company’s MFT solutions can secure, automate, and encrypt file transfers in an ever-increasing threat environment. Listen below: ...
Blog

Shadow IT and Work From Home: The Risks and Solutions

  Image Working 9 to 5 is no longer the only way to make a living, and for the foreseeable future, organizations parking most of their employees at a particular desk Monday through Friday is looking less and less likely. Working from home, at least as part of a hybrid organizational structure, is here to stay. Whether working from...
Blog

Tainted Love, Ransomware, and More: This Month in Cybersecurity

  Image February, while a short month, was long on cybersecurity threats. Read on for a few of the high- (well, low-lights) as well as for some resources from GoAnywhere MFT on how you can help secure your sensitive data files while they are in motion and in transit. Love Hurts The search for love turned up more than potential...
Blog

What is a PGP File?

  Image What is PGP and What is It Used For? PGP is short for Pretty Good Privacy and it’s one of the most widely used technologies for encrypting and authenticating files. It can help encrypt, decrypt, authenticate, and verity various file types including emails, files, directories, disk partitions, and more. PGP, along with its...
Blog

How Businesses Can Collaborate Securely with GoDrive

  Image Collaborating or sharing information lies at the very heart of business. Securing these information exchanges, however, requires more than a firm handshake. The information your organization owns is priceless, so it’s vital to ensure that it is accessed, manipulated, and shared only by authorized individuals and with security...
Blog

13 Essential MFT Blog Posts You Might Have Missed

  Image There’s a lot out there (and just on this website) about what MFT (managed file transfer) software is, why it’s a good FTP alternative, and how to choose the best file transfer software for your business. That’s why we’ve selected 13 of our top blogs that answer those exactly those questions – and more. And because questions...
Blog

How to Send Big Files Quickly

  Image Big and fast. Speedy and large. It’s a combination that’s sometimes tricky to execute, especially when it comes to sending large data files rapidly. Do you sacrifice speed? Do you risk having files interrupted mid-stream? Or do you roll the dice and hope your file won’t be rejected from the starting gate? You don’t have to...
Blog

The Role Between Shadow IT and Content Collaboration

  Image   Shadow IT is Problematic for Collaboration   Content collaboration platforms are more popular than ever as organizations produce and share a plethora of content every day. A centralized platform can simplify collaboration and promote productivity, but Shadow IT can put a hindrance on progress and optimal file sharing...
Blog

This Month in Cybersecurity: A Bit of Deja Vu

  Image   When it comes to the new year, 2022 has a familiar ring to it in more ways than one. Just like the year before, cybersecurity risks continue, with ongoing threats to sensitive data, major logging frameworks vulnerable, and payouts to some impacted customers again being made. While you might have recommitted to your...
Blog

What is the Best MFT Software?

  Image   And the Award Goes To...   Over the years, GoAnywhere Managed File Transfer (MFT) has been recognized time and time again by users, industry peers, and more as one of the best robust secure file transfer solutions on the market. Why GoAnywhere is the Best MFT Software First and foremost, aside from being both flexible...
Blog

AS2 Drummond Certified: GoAnywhere MFT Delivers Security and Interoperability

  Image If you’re looking for a secure managed file transfer solution, why not check one out that has been recognized by the Drummond Group as AS2-certified? The AS2 features in Fortra' GoAnywhere Managed File Transfer (MFT) solution, were reviewed and tested against the world's highest standards, as set by the Drummond Group. ...
Blog

What is Shadow IT and Why is it a Problem?

  Image   Shadow IT Doesn’t Lurk in the Shadows – it's Prevalent   Although it may seem foreign now, there was once a time when an organization’s IT department had complete and total control over the technology being used by the organization. Before software could be purchased, or before anyone clicked download, the IT Director’s...
Blog

Thinking about Managed File Transfer? MFT Trials are Invaluable.

  Image Test-driving MFT Technology is Invaluable Taking a car out for a test drive provides a ton of insight. That sleek magazine ad or dazzling showroom floor may tempt you, but sometimes flashy looks and skilled salespeople can deliver a ride that doesn’t quite live up to your expectations. Getting behind the wheel to put that...