Resources

Blog

How to Solve 4 Common Email Security Challenges

  Image Yes. Emailing someone is still one of the easiest ways to share data. However, there are some important caveats to sharing files this way that can put your organization’s file transfers at risk. Email File Transfer Challenges These are the four big challenges that organizations should be aware of when transmitting files via...
Blog

Comparison of web-based file transfer methodologies

Transferring large files over the internet has never been a simple task. Anyone that has ever tried to transfer a file larger than 100MB can vouch for the slow transfer speeds, multiple disconnects, data corruption, complexity of the task and security issues surrounding FTP. The same problem exists for web developers trying to implement web-based file transfer functionality....
Blog

FIPS 140-2 Plays Vital Government Business Role

  Image   What is FIPS 140-2? FIPS 140-2 is a standard with which cryptographic-based (encryption) security systems must comply when protecting sensitive data in U.S. government agencies and departments. This FIPS 140-2 standard also extends to other entities that may exchange sensitive data with the federal government, including...
Blog

REST – HTTP POST vs. HTTP PUT

There seems to always be some confusion as to when to use the HTTP POST versus the HTTP PUT method for REST services. Most developers will try to associate CRUD operations directly to HTTP methods. I will argue that this is not correct and one can not simply associate the CRUD concepts to the HTTP methods. That is: Create => HTTP PUT Retrieve => HTTP GET Update =>...
Press Release

Virtual Folder Highlight GoAnywhere Services 3.0

Omaha, Neb - September 26, 2012 Accessing files quickly across growing storage networks while ensuring data remains secure is crucial for any company in today's business environment. The latest release of GoAnywhere Services 3.0 with its new "Virtual Folders" feature and network shares option makes secure online access to information seamless for the end user and easy to...
Blog

FileCatalyst IBC 2012 Wrap-up

FileCatalyst exhibited at the IBC (International Broadcasting Convention) show in Amsterdam, the expo portion having run from September 7–11. It is one of the biggest shows of its type in the world, and I always find it interesting to be a part of the team in attendance. With IBC 2012 behind us, here are some parting thoughts: It was hectic, and I mean that in the best way....
Blog

Why hardware solutions can never truly replace software for file transfer acceleration

In the world of file transfer acceleration, there are multiple approaches using both WAN Optimization appliances or pure software solutions like FileCatalyst. Hardware sometimes give the impression of perceived value; there is a tangibility that you just don’t get with software. But can a hardware solution on its own really replace software for file transfer acceleration? The...
Blog

How to Build a Framework for HIPAA and HITECH Compliance

  Image HIPAA, established in 1996, was signed into law to outline the appropriate ways to use and disclose patient health information. Read on to learn how to develop a HIPAA- and HITECH-compliant IT framework for your organization.   Why Does HITECH Exist? HITECH laws were enacted to up the ante on healthcare organizations to...
Press Release

Outlook 2010 Plugin Now Available for GoAnywhere Secure Mail

Omaha, Neb - August 1, 2012 Download PDF Organizations whose employees have been using email to send confidential files have realized the dangers that unsecure email can pose. That's why Linoma Software added a Secure Mail module to its popular secure FTP server, GoAnywhere Services, part of the GoAnywhere Managed File Transfer (MFT) software suite. Released in February, 2012...
Press Release

Linoma Software [now HelpSystems] Adds Japanese Firm to Team of Global Partners

Omaha, Neb - July 17, 2012 As Linoma Software continues to expand its global sales initiatives, it has added yet another sales partner to its team. Linoma president Bob Luebbe is pleased to announce a partnership with SOLPAC, a leading software and consulting firm based in Tokyo, Japan. "The IBM Power Systems market is going strong in Japan," Luebbe said, "and when this...
Blog

Addressing HIPAA and HITECH Compliance Challenges

  Image HIPAA and HITECH regulations were designed and enacted to increase the security surrounding personal health information from those who should not have access to it. Next to finance, the healthcare industry is one of the most regulated industries around. While debates on the cost, structure, and delivery of healthcare...
Blog

Open Source Fast File Transfers

There exist a number of open source projects trying to tackle accelerated file transfer via UDP. Some solutions are more mature than others and also use different technologies to solve the same problem of large data transfer over WAN. This article should provide the reader enough information to compare the different solutions and gauge if an open source project could be used...
Blog

Analysis On Improving Throughput Part 2: Memory

The life cycle of a file transfer follows this basic pattern: Image                 The first and last step in the diagram, Disk IO, were covered in Part 1 of the series: Improving Throughput Part 1: Disk IO. Disk IO is always a good place to start when analysing a system to see why files are not transferring fast enough. In...
Press Release

GoAnywhere Adds FIPS 140-2 Validated Encryption Module

Omaha, Neb - May 22, 2012             Organizations can now secure their data transmissions using FIPS 140-2 validated encryption with the GoAnywhere managed file transfer solution from Linoma Software [now Fortra]. FIPS 140-2 is a critical compliance requirement for US federal government and state agencies, as well as for those companies that exchange sensitive data with the...
Blog

Are Insurance Companies Managing Their Risk of Data Breach?

  Image   Insurance companies are the experts at analyzing and managing risk. They identify, quantify, and set pricing based on the calculated costs of risk. Naturally, the higher the perceived risk, the higher the cost to mitigate the potential losses.   Yet, here is the irony. While those in the insurance industry excel at...
Blog

Is Your Company Letting Data Slip Through the Cracks?

  Image Many Americans have spent the last few days frantically searching for receipts and other documentation to finish their taxes before April 15th — only to realize they get a one-month reprieve this year. Despite that sigh of relief, there's no doubt that some of those people thought they knew exactly where to find what they...
Blog

How Important is Auditing Your File Transfers?

  Image When you send someone a file using FTP, how do you know (and later prove) that it was successfully sent? Consider the Complexities It might be possible to save a screenshot as long as the process was simple and you can see all the commands on a single screen. But what if your commands start getting complex? And if you start...
Blog

Analysis On Improving Throughput Part 1: Disk IO

This post is the first of a series and continues in Part 2: Memory In light of the release of FileCatalyst Direct v3.0, I thought I’d write a few articles about the road to achieving 10Gbps speeds. It seems to me the best place to start is with the endpoint of the transfer: the storage media. Why? Before we even think about the file transfer protocol, we have to be sure that...
Blog

SFTP vs. FTPS: What's the Best Protocol for Secure FTP?

Image What is Secure FTP? SFTP vs. FTPS: Secure FTP Authentication SFTP vs. FTPS: Secure FTP Implementation SFTP vs. FTPS: Speed SFTP vs. FTPS: Security Watch a Demo An increasing number of organizations are looking to move away from transferring data with FTP (a standard file transfer protocol). In the beginning stages of...