Resources

Blog

Implementing File Transfer Strategies for Cybersecurity

  Image So, you did your legwork and identified your cybersecurity needs around transferring files securely. You found your best secure file transfer solution by checking out a few top choices based on reviews, trials and maybe even a demo or two. And now that you’ve got the green light for your chosen secure file transfer solution,...
Blog

The Encryption Prescription For Healthcare

  Image “Trust me, I’m a doctor.” The saying is overused, but there’s a ring of truth to it. We do trust doctors – with our health, the delivery of our babies, the care of our parents, and the diagnosis of our illnesses. And a lot of information in between. It’s no wonder then that this information – private, sensitive, vulnerable,...
Blog

How to Find a File Transfer Solution for Your Cybersecurity Needs

Image   If your organization has already gone through an assessment or a reevaluation of your cybersecurity processes, policies, and tools, chances are you confirmed a need to ensure that the mission-critical and sensitive data you exchange every day must be secured both at rest and in transit. File transfer security is a...
Blog

Problems Secure File Transfer Solves in Financial Services

  Image   Nowhere is trust more important than in the financial services industry. People operate on trust when they invest their life savings in a bank account, build their 401K, take out a life insurance policy, transfer their stocks, or make an online payment. The transactions just work, and – we take for granted – the money is...
Blog

How to Identify Cybersecurity Needs for File Transfers

  Image   Cybersecurity. The word or concept seems to arise at some point in nearly every news feed lately. Its prominence has risen over the past few years as the impact of inadequate cybersecurity and very determined cybercriminals is so substantial – whether you’re a small business or a large, sprawling enterprise.   Before we...
Blog

This Month in Cybersecurity: GTA 6 and Uber Hit with Leaks

  Image   It seems that bad actors aren’t just related to Hollywood. As technology increases, and organizations invest more in cybersecurity strategies, hackers elevate their own tactics as well. Even major corporations aren’t immune, which only goes to show the importance of pushing for strong solutions to protect your data like...
Blog

What Your Organization Needs to Know About Secure File Transfer

  Image It’s safe to say that the last few years have significantly increased the demand for Secure File Transfer (SFT) solutions such as GoAnywhere MFT. When the pandemic made vast numbers of the working population work from home almost overnight, there was a sudden spike in the requirement for robust and effective SFT. People...
Blog

Secure Government Files with a Managed File Transfer Solution

  Image If government IT departments were to debate on key cybersecurity issues, one that likely keeps people up at night is how to help ensure their sensitive, often top-secret, data is secure when being sent in and out of their network. While there may be several candidates in the running to address this cybersecurity issue, a...
Blog

SOX Compliance: What You Need to Know

  Image   What is SOX or Sarbanes-Oxley Act?   SOX, or the Sarbanes-Oxley Act, was enacted by Congress in 2002 to help provide better security for the general public and consumers. It was structured to improve corporate governance and accountability and to better shield the public from malicious or unintentional misuse of...
Blog

Overcome the Limits of Email Attachments with FileCatalyst

“Email too large.” That dreaded bounceback message you get after sending an important email with a large attachment can be avoided.  Most email systems impose a strict 25 MB size limitation on attachments. That just doesn’t cut it today, with hundreds of data-rich large files, videos, and more needing to be exchanged throughout the day. There is a way to ensure that your large...
Blog

How MFT Can Offset the Rising Cost of Data Breaches in 2022 

  Image There’s plenty to be concerned about when it comes to data breaches. At top of mind, there’s always the information that’s stolen, be it customer data, personal emails, confidential files, or any other number of company secrets that are supposed to remain within the company. Then there’s the monetary cost of the data breach –...
Product Video

Web Client

The Web Client in GoAnywhere MFT is a modern browser-based interface allowing employees, customers, and trading partners the ability to easily exchange files on an ad hoc basis. The Web Client provides methods to safely and securely transfer files inside and outside of the network. With Secure Folders, users can access authorized files and folders on the network, and other...
Product Video

SFTP Server

The SFTP Server in GoAnywhere MFT allows your trading partners to securely exchange files with your organization. The SFTP Server uses the SSH file transfer protocol, secure copy protocol, the latest SSH 2.0 protocol, and offers robust two-factor authentication using passwords and SSH keys. The encrypted tunnel between the SFTP Server in GoAnywhere and your trading partners...
Product Video

Secure Email

Your employees need an easy and secure way to share sensitive files with customers, partners, and other users. With the GoAnywhere Secure Mail module, you can use the convenience of email along with the security of HTTPS to deliver your messages and files safely. When a Secure Mail package is sent, the contents of the package are automatically encrypted and then stored on your...
Blog

How to Evaluate File Transfer Solutions

  Image   How to Choose a File Transfer Solution When it comes to software or technical solutions you’ve got options, sometimes too many of them. Thankfully, there are plenty of strategies to help you narrow down your choices and make an informed decision. You can ask an industry peer, read user reviews on any number of review...
Product Video

Open PGP Encryption

Video Transcript: GoAnywhere supports Open PGP compliant encryption technology, allowing you to automate the encryption, signing, verification, and decryption of your files with PGP. Let's take a look at how GoAnywhere can encrypt and sign a file. Here is an example of a file containing information that needs to be encrypted before it is transmitted to a trading partner. On...
Product Video

MQ Integration

GoAnywhere MFT streamlines the integration with WebSphere MQ, Active MQ, Sonic MQ and other MQ systems by sending and receiving messages with queues and topics. GoAnywhere can load the contents of a file into a message and send it to an MQ server which allows other systems to pick up that file for processing. Here is a project where an EDI file that was received from a trading...
Blog

Security Solutions for Managed File Transfer

  Image By Christopher R. Wilder Research Director & Senior Analyst, TAG Cyber Forbes Contributor Businesses are sharing more sensitive information every day. CISOs and CIOs face the challenge of securing data shared between employees, customers, and third parties. Managed file transfer (MFT) is the solution most organizations use...
Product Video

GoFast File Transfer Acceleration

GoFast is a file transfer acceleration protocol in GoAnywhere that can transmit data considerably faster than traditional FTP. Before files are transferred, a secure SSL/TLS control channel is first established over TCP between the GoFast server and client. This control channel can be authenticated with user credentials as well as X.509 client and server certificates. After...