Blog

Blog

Why Choose AS2 for Secure File Transfers?

Securing all the data your organization exchanges is a need, not a want in today’s cybersecurity environment. To minimize the risk of a security breach – whether intentionally malicious, or accidental through user error – takes the proverbial village of proactive measures. One of these is employing strong protocols such as AS2 (Applicability Statement 2...
Blog

FTP 101: What are the Basics?

There's no shortage of shortage when choosing just the right FTP for your organization. Learn the differences and which FTP may be right for you.
Blog

Education Industry: How MFT Can Help Stretch Resources

Educational institutions, from preschools to university systems, face increasing pressure on budgets as well as personnel lately. When every minute and every dollar counts, bolstering existing resources where possible can offer a bit of relief. One way to stretch those human resources is by automating some of the tasks that are repetitive, mundane, and...
Blog

PCI DSS 4.0 - What to Expect, What's Coming, How to Comply

  Get ready for more stringent PCI DSS compliance requirements. The PCI Security Standards Council (PCI SSC) updated its version 4.0 requirements in March 2022, in large part to address increasingly sophisticated cybercriminal threats. Rapidly growing contactless and cloud-based card usage also helped nudge an update to PCI DSS requirements, which were...
Blog

What Do Emerging Data Privacy Laws in the U.S. Mean for You?

  What is Data Privacy? One can think of data privacy as all the processes involved in how confidential or personal information or data is collected, used, and shared or governed. No singular policy governs data privacy, with requirements and penalties varying across states and countries. Data privacy laws are legal constructs that set clear lines...
Blog

Secure File Transfer Drives Compliance and Efficiency for Credit Unions

  The unwavering protection of personally identifiable information (PII) is the foundation upon which financial and banking organizations build their services and instill trust in customers. Achieving this requires credit unions and related companies to navigate a fine balance between stringent data security and business efficiency to meet customer...
Blog

AS2 Drummond Certified: GoAnywhere MFT Delivers Security and Interoperability

  If you’re looking for a secure managed file transfer solution, why not check one out that has been recognized by the Drummond Group as AS2-certified? The AS2 features in Fortra' GoAnywhere Managed File Transfer (MFT) solution, were reviewed and tested against the world's highest standards, as set by the Drummond Group. Drummond AS2 Certification...
Blog

What is Drummond Certification?

  Drummond Certification: What is it? The Drummond Group is a third-party certification body that certifies software products and solutions to ensure a given solution does what it says it will. A security solution that goes through their extensive certification process earns the right to add the Drummond-certified distinction to its product details. ...
Blog

Avoid a PCI Breach; Avoid Costly Consequences

  Trending and making news headlines can be great for business, but not if the reason you’re making news is because of a PCI breach. Any organization that processes credit or debit card information is vulnerable, but any organization can also take steps to minimize their risks and the costly mitigation efforts that follow a breach. The Payment Card...
Blog

AS2 vs. FTP

  When it comes to B2B communications, AS2 and FTP rank among the most popular file transfer protocols. Each protocol can serve your business in a different way, which makes it important to examine your needs along the research journey. Today we’re going to examine AS2 vs. FTP by their key components to help you decide which file transfer protocol will...
Blog

What is FISMA?

  What is FISMA and How Does it Work? The Federal Information Security Management Act (FISMA) is a 2002 United States law that outlines steps and guidelines to follow to reduce security risks to federal data. FISMA applies to all U.S. federal agencies, some state agencies, and any private sector organizations that have a contract with the U.S. government. Additionally, both the National...
Blog

The 5 Biggest PCI Compliance Breaches

  The Payment Card Industry Data Security Standard (PCI DSS) is the main information security standard for organizations that process credit or debit card information must abide by. The guidelines established in PCI DSS cover how to secure data handling processes. While most organizations work to avoid PCI compliance breaches through the requirement’s...
Blog

PCI Statistics That May Shock You

    If your organization processes credit or debit card information, you’re probably already familiar with the Payment Card Industry Data Security Standard (PCI DSS), the regulatory standard enacted to prevent large data breaches like the ones you hear about frequently – the ones that make headlines for all the wrong reasons.   Here are a few PCI...
Blog

8 Real Ways Financial Organizations Use GoAnywhere MFT

  GoAnywhere MFT is the Ultimate Asset for Banking and Finance For banking and financial organizations, protecting sensitive customer data and meeting compliance requirements for regulations is critical. From controlling the exchange of sensitive cardholder data, to tracking file movements for easy auditing, GoAnywhere Managed File Transfer (MFT) is...
Blog

How to Help Ensure Compliance with Data Privacy Laws

  How to Help Ensure Compliance with Data Privacy Laws If complying with data privacy laws like the GDPR, PDPA, CPA, HIPAA, PCI DSS, PIPEDA, and more sometimes feels like swimming in alphabet soup, there is a life preserver that can simplify, secure, and automate the processes involved. Managed file transfer can proactively help organizations meet...
Blog

What is NIST?

  NIST, the National Institute of Standards and Technology, is a lab and non-regulatory federal agency of the U.S. Department of Commerce. Founded in 1901 as a tool to boost the U.S.'s global competitiveness, NIST fosters efforts to create standards across technology systems. Today, NIST continues to push for innovation in a variety of industries and...
Blog

What's the Difference Between AS2, AS3, and AS4?

  If you think these three protocols are simply sequential updates from the 1990s’ AS1 protocol you’d be mistaken. Each protocol brings its own distinct features to the data transmission table. Here’s a few key differences between them. What is AS2? AS2 (Applicability Statement 2) is a protocol specification used to transmit sensitive data securely...
Blog

7 Essential Resources on PCI DSS Security

  Note from the Editor: This article was originally published in February 2017. It has been updated with resources current to PCI DSS version 3.2.1. Did you know that 80% of organizations are not compliant with PCI DSS requirements? That means, if you’re reading this, there’s a pretty good chance your company needs to make adjustments to...
Blog

Which is Better? - AS2 vs. AS4

    AS2 vs. AS4   AS2 and AS4 are both popular file transfer protocols that allow businesses to exchange data securely with their business partners. However, what is the difference between them, and which of the two is better? What is AS2? AS2 (Applicability Statement 2) is a protocol specification that’s used to transmit sensitive data securely...
Blog

Which is Better: AS2 vs. SFTP?

Over the last several months, we’ve compared many different file transfer protocols, including SFTP vs. FTPS and SFTP vs. MFT, and MFT vs. Dropbox for secure file sharing. Today, we’re going to look at AS2 vs. SFTP. How do these popular file transfer protocols work? How do they differ? And most importantly, which one is better for your organization’s file exchange requirements? Let’s dive in. ...