Blog

Blog

Replace Your FTP Scripts to Increase Security

  Image One too many things has gone wrong: a file didn’t arrive at its destination and you’re not sure why; your developer is out of office and you need to make a small change to your file transfer script; you logged into five different tools to schedule a simple transfer. And suddenly you realize: the time has come to move away...
Blog

Benefits of Single Sign-on (SSO)

  Image More than one is usually a good thing. More french fries, more vacation days, more friends. More usernames and passwords? Not so much. Organizations are increasingly turning to single sign-on (SSO) to lessen the burden of employees needing to remember endless usernames and passwords to access all the applications, websites...
Blog

What are Data Silos?

  Image   Standing alone can be an uncomfortable feeling at any gathering. You may only hear part of a conversation; you might not mesh well with the others in the room; you could face a number of awkward silences, and even be rejected completely.   Feeling like a lone wolf at a party is discomforting for sure. Having critical...
Blog

What is EFSS?

  Image If you’ve ever had to MacGyver a way to send out a too-large file or work with a group of people on a single document, EFSS is probably what you were looking for to make the process painless: it’s a solution that makes sharing files (of any size) and collaborating in one place easy – and secure. EFSS stands for Enterprise...
Blog

How Does the DMZ Impact Security?

  Image Your Secret Weapon for Data Security When weapons and military forces have been removed from active duty, this is referred to as “demilitarization.” On the internet, the demilitarized zone, or the DMZ, is a similar situation. What is the DMZ? The DMZ is the neutral network that resides between the Internet and your...
Blog

4 Benefits of On-premises Enterprise File Sync and Sharing

  Image The value of mission-critical business documents can't be overstated — but lax or renegade employees or trading partners can put your sensitive data at risk with reckless storage or sharing practices. Luckily, knowing that your data hasn't been exposed is as easy as implementing a secure Enterprise File Sync and Share (EFSS)...
Blog

What is Wrong With Free File Transfer?

  Image Free time! Free food! Free kittens! All great concepts, right? Free file transfers! Ummmm, not so much. The old adage, “If it sounds too good to be true, it probably is…” definitely holds when it comes to file transfers. After all, the data you send to third-parties, vendors, customers and even internal staff is priceless...
Blog

Top Data Breaches of 2019: How You Can Minimize Your Risks

  Image   Top Data Breaches of 2019: How You Can Minimize Your Risk   Your organization made the headlines! That’s great, right? Not if it’s because you had sensitive data breached. A data breach can wreak financial and logistical havoc for you, your customers, patients, employees, and others. More importantly, it can severely...
Blog

8 Surprising Ways to Use GoAnywhere's Secure Folders Module

  Image   What is Secure Folders? Secure Folders is a licensed module GoAnywhere MFT offers its users. It provides access to authorized files and folders on the server or network location through a HTTPS Web Client. However, it can do so much more with its array of features. Read on to learn 8 surprising ways to use GoAnywhere’s...
Blog

Should You Use a File Sharing App?

  Image Should You Use a File Sharing App? File sharing apps like Dropbox and Google Drive certainly have their appeal. They are user-friendly, often free, and do the job of getting information from one user to another. Until they don’t. Or, until your files are hacked, get into the wrong hands, live in infamy, have unrestricted...
Blog

What is Secure File Sharing?

  Image What is Secure File Sharing? Secure is the operative word here. Dozens of applications allow you to transfer files – small to large – between different users or organizations. A secure file transfer solution, at its most basic, secures the movement of files while at rest and in transit confidentially – all within a protected...
Blog

Need a Cloud-Based MFT Environment? Try a Hybrid Cloud Setup

  Image Cloud integration is growing in popularity, but committing 100% to the cloud isn’t always practical or secure for organizations. If you’re in the market for cloud-based solutions, read our quick overview below. For a more comprehensive exploration of when to choose a hybrid cloud and how keep your data encrypted through and...
Blog

What are SFTP Servers?

  Image   What are SFTP Servers? A typical file transfer server helps transfer files server-to-server or client-to-server, and SFTP servers are a more protected version: they encrypt data to keep sensitive information secure while moving files, and some have the added bonus of encrypting files at rest. SFTP servers use a single...
Blog

Open PGP and GoAnywhere MFT: What You Need to Know

  Image       Which Solution is Right for You? Open PGP vs. GoAnywhere MFT If you have sensitive files that need to get from point A to Point B securely, you may have considered utilizing Open PGP or a managed file transfer solution, like GoAnywhere MFT. Do you know which option is the best fit for your organization? What is...
Blog

Which is Better? - AS2 vs. AS4

  Image   AS2 vs. AS4   AS2 and AS4 are both popular file transfer protocols that allow businesses to exchange data securely with their business partners. However, what is the difference between them, and which of the two is better? What is AS2? AS2 (Applicability Statement 2) is a protocol specification that’s used to transmit...
Blog

Think Your Customer Data was Exposed? Follow These Steps

  Image When a prospect or customer shares personal data with a business, they expect their information will be stored securely, kept safe from vulnerabilities, and used only for the purposes with which it was collected. Whether this data is an email address, a birthday, a personal identifier, or credit card numbers, the weight of...
Blog

Why Choose Managed File Transfer Over Free File Sharing Methods?

  Image Why Choose Managed File Transfer? It’s no secret that many organizations struggle to fully protect the sensitive data their employees, customers, trading partners, and third-party vendors share. Free file sharing software and scripts are both common ways of transferring files, even though they’re not necessarily the most...
Blog

7 Benefits of Using MFT for Encrypted File Transfers

  Image   7 Benefits of Using MFT for Encrypted File Transfers   At minimum, a managed file transfer (MFT) solution is a product that encompasses all aspects of inbound and outbound file transfers while using industry-standard network protocols and seamless encryption. It can automate and transfer data across your network, systems...
Blog

What is a DMZ and Why Do You Need a DMZ Secure Gateway?

  Image If you’ve watched a science-fiction movie about space travel, then you’ve likely seen some version of a scene in which an astronaut reenters their ship from the outside abyss. Because the ship exists as a haven from the dangerous environment of empty space, the astronaut cannot simply open the door and stroll directly into...
Blog

5 Benefits of PGP Decryption Using Managed File Transfer

  Image If your trading partners or vendors require you to PGP encrypt or decrypt the files you exchange, you may be on the search for an affordable, trust-worthy PGP software to implement in your organization. The software you’re looking for may also need to support more than basic PGP decrypt and encrypt functionality. You may want...