» 

Blog

Are Your Data Transfers PCI Compliant? Find Out with the Security Settings Audit Report from GoAnywhere.

Complying with the Payment Card Industry’s Data Security Standard (PCI DSS) is mandatory for every organization around the world that processes credit or debit card information. GoAnywhere Managed File Transfer has several features, like detailed event logs and role-based security, to help users eliminate the security vulnerabilities that PCI DSS was designed to combat. For more information on how GoAnywhere makes PCI compliance easy, instantly download the guide

But PCI DSS requirements are complicated, and making sure you have checked all the boxes is often a time-consuming process for IT teams. Failing a PCI audit comes with hefty fines, so you don’t want to leave anything to chance. One important aspect of achieving compliance is securing your data transfers. GoAnywhere users have a quick and easy way to ensurethat their GoAnywhere implementation is compliant with PCI requirements for protecting data transfers: the Security Settings Audit Report. Painlessly checking data transfers off the list makes achieving overall PCI compliance much simpler. 


GoAnywhere Advanced Reporting Module

GoAnywhere helps you manage and monitor your system information and file transfer activity with a variety of detailed PDF reports. The Security Settings Audit Report is one of several reports that can be generated on-demand through the browser-based console or scheduled and distributed automatically.

The Security Settings Audit Report

For each of over 60 security settings, the report will indicate the status of your GoAnywhere installation. There are five possible outcomes for each setting tested:

  • Pass: The setting meets the PCI DSS requirement.
  • Fail: The setting does not meet the PCI DSS requirement. In this case, you will also be given a recommendation for remedying the problem.
  • Warning: You will need to look into this issue further to determine if you are compliant. Recommended actions are provided.
  • Not Applicable: A check on this setting is not required, typically due to GoAnywhere features that you are not licensed to use.
  • Fatal: A configuration problem is preventing GoAnywhere from accessing the appropriate data.

In addition to the status check and recommended actions, the report lets you know which section of PCI DSS the setting applies to.

The enhanced Security Settings Audit Report released with GoAnywhere version 5.4 includes some new checks. The report now ensures that Gateway is being used for inbound connections, that Gateway's control channel is protected with SSL/TLS and a shared secret value, that Admin users are not allowed to view Resource passwords, and that Admin users follow password age and history restrictions.

To get started with easy PCI compliance using GoAnywhere MFT and the Security Settings Audit Report, download a free 30-day trial of GoAnywhere.

 


New Version of GoAnywhere Managed File Transfer Improves Application Integration and API Support

Linoma Software has extended GoAnywhere Managed File Transfer’s workflow automation and file transfer features to include SOAP and RESTful Web Services.  Combined with new JSON Read & Write tasks, GoAnywhere MFT 5.4 provides better integration with Web Services and other applications for securely transferring data and automating processes.

“Organizations are looking for ways to automate data transfers and integrate systems using cloud-based or internal API’s” says Steve Luebbe, Linoma’s Director of Engineering.  “They also want an easy way to process the XML and JSON formatted data that is returned from the server which are some of the new features we incorporated into GoAnywhere MFT 5.4.”

To provide a fully integrated SOAP and REST solution, a number of new tasks, resources, and workflow features were added including:

  • A REST resource and new tasks to interact with RESTful Web Services. These tasks support XML and JSON based services.
  • A SOAP resource and task to provide streamlined integration with SOAP web services. A wizard is provided to simplify creation of actions by building them based on the WSDL definition. Files can be sent inline or using MTOM. The files and XML payload returned from the web service can then be stored or processed.
  • Tasks to read and write JSON data.

In addition to Workflow enhancements, both Secure Forms and GoAnywhere Command have been updated to integrate with Web Services.  Secure Forms can now be submitted using SOAP requests, offering an ideal solution for users to build custom applications that submit data and files to GoAnywhere.  GoAnywhere’s API interface supports both REST and SOAP requests to automate GoAnywhere Workflows and User provisioning through existing applications.

Significant Time Savings

The new Web Services integration delivers significant time savings for GoAnywhere users. In just a few steps, users can take advantage of Web Services standardization to quickly connect applications and share data across a diverse range of systems and platforms. The entire process can be completed with just a few clicks and requires no programming knowledge.                                        

Continuing Advancements with GoAnywhere Automation & Security

Current GoAnywhere MFT customers who upgrade to the new release also gain functionality for workflow automation and user authentication. New feature highlights include:

  • An updated Workflow Designer that streamlines the configuration and creation process. New Component and Variable panels simplify adding tasks and variables to a project.
  • Several new Reports, including a Custom Report task allows creation of PDF reports based on data from a database, Excel file, XML, JSON, or fixed-width files.
  • Administrative Users can now be synchronized against an LDAP or Active Directory system to automatically create user accounts and simplify administration.
  • Kerberos single sign-on was added to the Secure Mail Outlook Plugin and to GoDrive for Windows.
  • Secure Forms has 6 additional components: text area, multi-checkbox, number, bulleted list, checkbox, and radio buttons.

For a complete list of enhancements for GoAnywhere MFT 5.4, visit the release notes page.

 


Get the Guide: Achieving PCI Compliance with GoAnywhere MFT


Instantly Download the GoAnywhere MFT PCI DSS guideThe Payment Card Industry’s Data Security Standard (PCI DSS) was created to increase controls over cardholder data and reduce fraud. It applies to every organization around the world that processes credit or debit card information. Unfortunately, it’s not always clear to businesses which steps need to be implemented to ensure PCI compliance. Using the right software solutions can take a lot of the work out of your hands.

It’s essential to factor protection for your file transfers into your security and compliance plan. If you possess customer cardholder data, an unsecure transfer method leaves that data especially vulnerable to interception and theft. The most common file transfer pitfall is relying on inadequate methods such as free FTP tools, file sharing apps, and email attachments. Ideally, your file transfer solution will go beyond protecting your data with encryption and secure protocols and also help you to provide the information that an auditor needs through detailed reports and role-based access.

The penalties for failing a PCI audit are severe and will likely negate the savings of your “inexpensive” transfer method. Of course, complying with PCI DSS is not just about avoiding fines. PCI compliance should be seen as a set of core principles that will help you avoid a costly breach of your data—and having to tell your customers that you’ve allowed their credit card data to be stolen.

PCI DSS compliance is based on twelve main requirements. We’ve put together a guide that demonstrates how GoAnywhere Managed File Transfer addresses several of them. For example, GoAnywhere protects your files at rest (PCI Requirement 2) using strong encryption methods like AES and OpenPGP. Its role-based accounts allow you to restrict access to cardholder data by business need-to-know (PCI Requirement 7).

Instantly download the guide to see how GoAnywhere helps to make PCI compliance easy.

 

 

 


GoAnywhere MFT Earns Drummond Recertification for AS2

GoAnywhere MFT Drummond CertifiedLinoma Software is pleased to announce that GoAnywhere Managed File Transfer (MFT) has again earned Drummond Recertification for Applicability Statement 2 (AS2) interoperability.

AS2 is a popular security standard that defines how to transfer digital data securely and reliably over the internet using encryption and digital certificates. Some advantages of using the AS2 include end-to-end encryption, non-repudiation verification of senders, recipient authenticity through the use of digital signatures, and validation of original file integrity with successful transfer confirmation.

In order to become Drummond CertifiedTM, companies must submit to rigorous product testing and meet strict requirements to verify compatibility between certified products. The Drummond Group provides a controlled, vendor-neutral environment where routine tests are conducted to ensure that certified products meet strict testing protocols and are kept current.

Drummond Recertification for AS2-3Q16

For the third quarter AS2-3Q16 tests, 13 Global companies participated and 18 products were certified or recertified. “Not all companies are willing to undergo the certification process, since it’s not easy,” said Bob Luebbe, President and Chief Architect at Linoma Software. “We count certification as part of our unwavering commitment to providing one of the highest quality and proven manage file transfer solutions on the market. Being Drummond certified makes it easy for our customers to verify at-a-glance that our MFT solution has been real world tested and is guaranteed to work with their AS2 partners.”

GoAnywhere MFT also successfully met requirements for AS2 optional tests including multiple attachments (MA), file name preservation (FN), file name preservation for multiple attachments (FN-MA), chucked transfer encoding (CTE), and secure hashing algorithm 2 (SHA-2). To learn more about Applicability Statement 2 or AS2, please visit these links:

Learn more about AS2 Transfers with GoAnywhere MFT.

 

 

 

 


SFTP vs. FTPS: The Key Differences

SFTP vs FTPSFTP, SFTP, FTPS, HTTPS, AS2… the many options for transferring files can make it confusing to answer the question that matters—what is the best way to secure your company’s data during transfer? This blog post is an introduction to the differences between the two mainstream secure FTP protocols, SFTP and FTPS, and which is the best choice to protect your file transfers.

Can’t I Just Use FTP?

FTP is a popular file transfer method that has been around longer than the world wide web—and it hasn’t changed much since it’s invention. Back then, it was usually assumed that internet activity was not malicious, so FTP wasn’t created with features to deal with the kind of cybersecurity threats we now see in the news every day.

FTP exchanges data using two separate channels known as the command channel and data channel.  With FTP, both channels are unencrypted, leaving any data sent over these channels vulnerable to being intercepted and read.

Even if a man-in-the-middle attack is a risk that you are personally willing to take, industry regulations such as PCI DSS, HIPAA, and others, require data transfers to be encrypted. Unfortunately, despite escalating security risks and the high cost of non-compliance, FTP is actually growing in popularity.

We highly recommend you avoid the basic FTP protocol and choose a secure option.

What is FTPS?

In the 1990’s concern about internet security was growing, and in response Netscape created the Secure Sockets Layer (SSL, now known as TLS) protocol to protect communications over a network. SSL was applied to FTP to create FTPS. Like FTP, FTPS uses two connections, a command channel and a data channel. You can choose to encrypt both connections or only the data channel.

FTPS authenticates your connection using either a user ID and password, a certificate, or both. When connecting to a trading partner's FTPS server, your FTPS client will first check if the server's certificate is trusted. The certificate is considered trusted if either the certificate was signed by a known certificate authority (CA), or if the certificate was self-signed by your partner and you have a copy of their public certificate in your trusted key store. Your partner may also require that you supply a certificate when you connect to them. If your certificate isn’t signed by a third-party CA, your partner may allow you to self-sign your certificate, sending them the public portion beforehand to load into their trusted key store.

User ID authentication can be used with any combination of certificate and/or password authentication.

What is SFTP?

While FTPS adds a layer to the FTP protocol, SFTP is an entirely different protocol based on the network protocol SSH (Secure Shell) rather than FTP. Unlike both FTP and FTPS, SFTP uses only one connection and encrypts both authentication information and data files being transferred.

SFTP provides two methods for authenticating connections. Like FTP, you can simply use a user ID and password. However, with SFTP these credentials are encrypted, which gives it a major security advantage over FTP. The other authentication method you can use with SFTP is SSH keys. This involves first generating a SSH private key and public key. You then send your SSH public key to your trading partner and they load it onto their server and associate it with your account. When they connect to your SFTP server, their client software will transmit your public key to the server for authentication. If the public key matches your private key, along with any user or password supplied, then the authentication will succeed.

User ID authentication can be used with any combination of key and/or password authentication.

What is the difference between FTPS and SFTP?

We’ve established that both FTPS and SFTP offer strong protection through authentication options that FTP can’t provide. So why should you choose one over the other?

One major difference between FTPS and SFTP is that FTPS uses multiple port numbers. The first port, for the command channel, is used for authentication and passing commands. However, every time a file transfer request or directory listing request is made, another port number needs to be opened for the data channel. You and your trading partners will therefore have to open a range of ports in your firewalls to allow for FTPS connections, which can be a security risk for your network. SFTP needs only a single port number for all SFTP communications, making it easy to secure.

While both protocols have their benefits, we recommend SFTP thanks to its better usability with firewalls. For an enterprise, it is ideal to have a managed file transfer (MFT) solution that can manage, monitor, and automate file transfers using a variety of protocols, including FTPS and SFTP. MFT is extremely valuable if you have trading partners with different requirements, and it has additional features like detailed audit logs to help you comply with industry regulations.

GoAnywhere is a managed file transfer solution that supports both SFTP and FTPS. Learn more about GoAnywhere MFT.  


Linoma Software named Cybersecurity Leader of 2016 for Excellence-in-class in Secure File Transfer and Data Encryption

Linoma Cybersecurity Top 20 Leader 2016Linoma Software has been named by Cyber Defense Magazine as one of the Top 20 Cybersecurity Leaders of 2016 for innovations in the field of information security. The list was released last month during National Cybersecurity Awareness Month.

Bob Luebbe, CISSP, and President at Linoma, said he was honored that Linoma was included on the selective list of industry leaders. “We are continually working to deliver best-in-class security software and it’s a great honor for the quality of our solutions to be recognized alongside some of the top names in Cybersecurity.”

Linoma Software, a division of HelpSystems, is known for providing secure managed file transfer and encryption solutions to over 3,000 customers worldwide, including Fortune 500 companies, mid-sized enterprises and government entities. Linoma has also been named one of the nation’s Fastest-growing Private Companies four years in a row by Inc. Magazine and was chosen for a Cybersecurity Excellence Award in 2016.

This is Cyber Defense Magazine’s fourth year of honoring innovators. “The competition was fierce, after many months of review and judging by leading independent information security experts, Cyber Defense Magazine is pleased to have selected those on this list as the Top 20 most innovative and interesting to watch this year and into 2017,” said Stevin Miliefsky, president of the magazine.

 


No Such Thing as a Free File Transfer, Part III: Are Your File Transfers Holding Back Business Growth?

One of the most common reasons businesses have for not optimizing processes or implementing modern software solutions is simply that “we’ve always done it this way.” We get it—sure, your file transfer process is a little time-consuming and your FTP tool doesn’t have the most up-to-date security features, but your business is doing fine. Why spend the time and money to implement a new solution?

GoAnywhere MFT ROIHere’s why: scalability. A robust managed file transfer solution implemented now is key to business growth—and increased profits—down the road. The third installment of this series on the ROI of managed file transfer solutions focuses on how investing in MFT can help you scale your business. 

Automate Processes

Martin Zwilling writes in Forbes that one of the keys to a scalable startup is to “automate to the max,” as the business will not be able to grow if it is both labor-intensive and staff-intensive. File transfers are often critical to a wide variety of processes in businesses of all sizes, so companies can find themselves adding staff to cover the hours of manual work. This is especially true when you add in tasks like checking for file arrivals or compressing and encrypting files before the transfer. A managed file transfer solution can handle these multi-step workflows automatically, so increasing your volume of file transfers won’t require hours of additional labor or more employees. 

Adoption of managed file transfer is increasing every year. That means that others in your industry have chosen to move beyond basic FTP tools. Given the pace of modern business, it will become increasingly difficult to maintain a competitive edge without automating your file transfer processes.

Anticipate Changes

A growing company often not only faces more hours of work, but new requirements. As you add trading partners, you may need to use a variety of transfer methods. It’s worth the investment to implement an MFT solution that can handle multiple protocols and encryption methods rather than trying to juggle several tools.

Do you have industry regulations to comply with? The work involved in staying compliant and keeping adequate records for an auditor will only grow as your business grows. Get a managed file transfer tool that automatically keeps a detailed audit log to simplify compliance. This will also help if you face new regulations in the future. 

IT environments tend to become more complex over time as disparate applications are added to critical processes. In the case of acquisitions or mergers, you may find yourself with multiple applications for the same purpose. Your managed file transfer software should provide commands and APIs for interfacing with your applications.

When confronted with new business requirements, too many organizations turn to custom scripting. If you have talented programmers at your disposal, scripts may seem like the obvious solution, but they are risky for your business, especially as you grow. Maintaining and updating the scripts whenever your requirements change is time-consuming, risky and expensive. If the programmer writing the scripts leaves your organization, you may not have anyone who understands how all of your sprawling scripts work. And if something fails, there’s no helpline to save your business from costly downtime.

Balance Your Workload and Avoid Disaster

Clustering multiple installations of your managed file transfer solution provides a distributed environment for handling file transfer services for the enterprise. This provides two advantages essential to your growing organization. The first is high availability. If one system suffers a network or hardware failure, the remaining systems in the cluster will continue to process file transfers and run workflows—especially important as you have to meet an increasing number of SLAs.

Secondly, clustering allows you to scale the solution horizontally by adding additional systems to the cluster. The workload can be distributed across all systems in order to increase performance.

Implementing MFT software gives you an immediate ROI thanks to time savings, increased reliability, and protection against security risks, but don’t forget to also take into consideration the payoff as your business scales. Ready to give managed file transfer a try? Get the free trial of GoAnywhere.

 

If you missed the first 2 installments in our series on the ROI of Managed File Transfer, please click the links to read Part 1 or Part 2


No Such Thing as a Free File Transfer, Part 2: Cost-effective Security

With new corporate data breaches in the news seemingly every day, it’s no surprise that security is a top concern for IT professionals. However, file transfers are an area where many companies are still vulnerable. Most file transfers still use FTP, a protocol that comes with inherent risks. It’s especially worrisome that, as TechRepublic points out, FTP is actually becoming more popular again. Other common file transfer solutions, like file sharing apps, come with their own security concerns.

GoAnywhere MFT ROIThis is the second in a series of articles about the ROI of managed file transfer (MFT), the first of which covered time savings. There’s no doubt that data breaches are costly. The 2016 Ponemon Cost of Data Breach Study puts the current cost at $4 million—$158 per record breached. So it’s a no-brainer that a solution to secure your file transfers would bring you a great return on investment.

And yet, when you try to get internal approval for products to help with security, proving the ROI can be difficult. A good security tool is by nature preventative. If you haven’t suffered a breach (or you have and don’t know about it yet), you probably don’t have a way to precisely calculate cost-savings.

Still, your data certainly has value, and you know you have to keep it secure. So how do you know you are protecting your file transfers with the solution that gives you the most bang for your buck? By making sure the software you choose addresses all of the top file transfer security concerns within one solution—no additional purchases or custom scripting required.

A Variety of Secure Protocols

FTP has been proven vulnerable to hacking. For example, 7,000 FTP sites, including an FTP server run by The New York Times, had their credentials circulated in underground forums in 2014. In some cases, hackers used the credentials to upload malicious files.

It’s essential for modern enterprises to turn to more modern and secure file transfer methods, such as:

  • AS2: AS2 generates an "envelope" for the data, allowing it to be sent using digital certifications and encryption.
  • SFTP and FTPS: These secure FTP protocols bring down the risk during data exchange by using a secure channel between computer systems
  • HTTPS: The secure version of HTTP, HTTPS encrypts communications between browser and website.

Which of these methods your company implements may depend on several factors, like your industry compliance requirements or what your trading partners use. Your requirements may also change over time. That’s why the best investment is a versatile managed file transfer solution that can handle any of these protocols and more.   

GoAnywhere MFT ROIProtection against People

When you imagine the security threat to your company, you might conjure up images of hackers working tirelessly to access your systems and use your data for nefarious purposes. The truth is, one of your biggest threats is probably in the office down the hall.

A 2015 study found that internal actors were responsible for 43% of data loss. Half of this is intentional—disgruntled or opportunistic employees, contractors, or suppliers performing deliberate acts of data theft. But half of it is accidental. People like to cut corners, and probably most employees in your company aren’t as concerned about security as you are.

Any file transfer solution with a good ROI has to address the threat coming from within the business.  You want to have role-based security options that limit each user to the servers and the functions of managed file transfer that they absolutely need to use. Detailed audit logs mean you always know who is doing what with the solution.

Ensure Compliance

In many industries, inadequate security practices don’t just put your own corporate data at risk, they can endanger highly sensitive information like credit card numbers and health records. For this reason, a number of regulations exist to protect personal data. A few of the most common are PCI DSS, Sarbanes-Oxley, and HIPAA, but your industry may have others.

A 2011 study found that while the cost of compliance averaged more than $3.5 million, the estimated cost of failing to comply was $9.4 million, showing that a solution that can help you comply with regulations has a clear ROI. In the case of file transfers, your MFT platform should have a number of encryption methods available to protect sensitive data including SSL, SSH, AES, and Open PGP encryption. Audit trails should also be in place to track file transfer activity so you can easily determine what files are being sent, what time they are sent, and who the sender and receiver are.

Modernization and Scalability

Once you go to the effort of choosing a file transfer solution that will protect your company, convince management of its necessity, and implement the software, the last thing you want to have to do is  change it two years down the road because your company is bigger, has more compliance requirements, or new trading partners.

A managed file transfer platform from an established, reliable software provider will make sure you stay updated with the features necessary to combat current security threats. Furthermore, if your volume of file transfers increases, you won’t need to invest in a new tool to handle the workload.

Bonus: Increased Productivity

If your managed file transfer solution can prevent a data breach, that alone makes it worth the investment. But what if it could increase productivity and reduce errors at the same time? The automation capabilities of managed file transfer software allow you to make a high-volume of file transfers without the need for tedious manual work. Streamlining this process—and eliminating the risk of human error—add to your organization’s bottom line.

Read more about safeguarding company data and limiting risk, or get started with a free trial of managed file transfer.


No Such Thing as a Free File Transfer, Part I: How MFT Saves Time

How MFT Saves Time - GoAnywhere MFTEvery business engages in some kind of information exchange, whether it’s a small retailer attaching an invoice to an email or a hospital sending hundreds of patient records between departments. Some methods of exchanging files, like a basic FTP server or a file sharing app, seem like an inexpensive way to deal with your transfers. In the long run, however, the shortfalls of these tools will likely cost your company significantly more than the investment in a sophisticated managed file transfer (MFT) solution.

A study by the Aberdeen Group found that every file sent “for free” actually has an 80% chance of costing your organization money. In a new series of articles, we’ll break down the reasons why MFT gives your company a better ROI than any other file transfer solution. The first reason we’ll discuss is the time you’ll save with managed file transfer.

We’ve all heard that time is money, and if you’ve ever been the unlucky person manually transferring files by FTP, it’s no stretch of the imagination to think that automated file transfer software would save a bit of time on each exchange. But you probably haven’t even thought of all the ways a rudimentary file transfer tool can waste costly hours. Here are a few:

  1. Dealing with Exceptions

As with any process, your file transfers aren’t always going to go smoothly. While even a basic tool will work most of the time, you’ll inevitably run into the occasional problem which will require you to divert members of your staff away from more important projects to help get the files moving. Aberdeen’s analysis found that those who don’t use MFT have more than twice as many of these errors and exceptions as MFT users. With a single-function file transfer tool, the operator is solely responsible for checking if the transfer succeeded and trying it again if it failed. A good managed file transfer solution has ways of dealing with issues that arise—for example, the software could automatically reconnect and resume the file transfer after a problem occurs with the network.

Moreover, the MFT solution will provide visibility into the status of automated file transfers and let you know if something goes wrong. This allows you to attack the problem immediately and get back to your more strategic initiatives as soon as possible. A basic tool or script may cause you to waste hours just trying to determine what happened to your files.

  1. Upgrades and Modifications

A common solution for moving files is with custom scripts. This seems like an easy option at first. Your company has talented programmers and it’s not too hard to create a homegrown FTP script that gets the job done. The first few times you need a modification or a new feature, that’s not difficult either. But pretty soon your company is transferring thousands of files every day, your homegrown solution is severely lacking in the error-handling, security, and logging capabilities it needs, and updating your mess of sprawling scripts will cost you dearly in expensive programmer hours. Or maybe the original creator of the scripts has left the company and those hours will be spent just trying to figure out how it all works.

Managed file transfer has the features you require as your business needs grow more complex. You can trust that it will continue to be updated when necessary and upgrades won’t require the same technical expertise as creating a homegrown tool does. 

  1. Compliance Requirements and Auditing

Storing and tracking detailed audit information is crucial for staying compliant with PCI DSS, HIPAA, state privacy laws, and other regulations. A managed file transfer solution will store detailed audit records for all file transfer and administrator activity and provide that data in an easily accessible format to authorized users. If you are legally obligated to collect this information, there’s no better time-saver than implementing file transfer software that stores the data automatically.

Furthermore, compliance requirements can always change or new regulations can be put in place. While you may already have a process for complying with current regulations, MFT provides the flexibility to respond to new security requirements without creating too much additional time-consuming work.

  1. Avoiding Downtime.

Just one minute of unplanned system downtime costs a company an average of $5,600. Talk about expensive hours! Make sure your file transfers keep running even if a server goes down by implementing MFT software that integrates clustering. This means you have a group of linked servers running concurrently, with each installation of your MFT tool sharing the same set of configurations and trading partner accounts. The servers in the cluster are in constant communication with each other, so if one fails, the remaining systems in the cluster will continue to service the trading partners. With the fast pace of modern business, you can’t afford to let your transactions wait while you take the time to get your systems functioning again.

Every minute that your business isn’t paying employees to fight fires, write custom scripts, or compile audit reports is a minute that can be put towards the work that helps the bottom line.

Interested in learning more about the ROI of Managed File Transfer? Read the next installment in our series: No Such Thing as a Free File Transfer, Part 2: Cost-effective Security.

 

Learn more about the risks of inadequate FTP implementations or get started with a free trial of managed file transfer today. 


Linoma Software makes the Inc. 5000 list of Fastest-Growing Private Companies

Inc. 5000 - Fastest Growing Companies in AmericaFor the fourth consecutive year, Linoma Software, a leader in providing enterprise-class security and managed file transfer solutions, was included in Inc. Magazine’s prestigious annual list of the nation’s fastest-growing private companies. Honored as #16 for Top Nebraska Companies and ranked #3947 for the overall Inc. 5000 list, Linoma Software was one of only three Nebraska-based software companies to be featured in this year’s lineup.

“I’m thrilled that Linoma has made the Inc. 5000 list four years in a row,” said Bob Luebbe, President and Chief Architect of Linoma Software. “To be recognized with some of the most successful companies in the United States is a great honor and we are excited about our continued growth and positive economic impact.”

The Inc. 5000 list of Fastest-Growing Private Companies is ranked according to percentage revenue growth when comparing 2012 to 2015. For consideration, companies were qualified based on specific criteria which included being U.S.-based, privately held, founded and generating revenue by March 31, 2012. The Inc. 5000’s aggregate revenue is $200 billion, and the companies on the list collectively generated 640,000 jobs over the past three years, or about 8% of all jobs created in the entire economy during that period.

"The Inc. 5000 list stands out where it really counts,” says Inc. President and Editor-In-Chief Eric Schurenberg. “It honors real achievement by a founder or a team of them. No one makes the Inc. 5000 without building something great – usually from scratch. That’s one of the hardest things to do in business, as every company founder knows. But without it, free enterprise fails.”

To view Linoma Software’s full profile and ranking on the Inc. 5000 list, please visit http://www.inc.com/profile/linoma-software?cid=full500016-list-3947. Complete results of the Inc. 5000, including company profiles and an interactive database that can be sorted by industry, region, and other criteria, can be found at http://www.inc.com/inc5000.

About Inc. 5000 and Inc. Media:

Founded in 1979 and acquired in 2005 by Mansueto Ventures, Inc. is the only major brand dedicated exclusively to owners and managers of growing private companies, with the aim to deliver real solutions for today's innovative company builders. Winner of the National Magazine Award for General Excellence in both 2014 and 2012. Total monthly audience reach for the brand has grown significantly from 2,000,000 in 2010 to over 15,000,000 today.  For more information, visit www.inc.com.

The Inc. 5000 is a list of the fastest-growing private companies in the nation. Started in 1982, this prestigious list of the nation's most successful private companies has become the hallmark of entrepreneurial success. The Inc. 5000 Conference & Awards Ceremony is an annual event that celebrates their remarkable achievements. The event also offers informative workshops, celebrated keynote speakers, and evening functions.

For more information on Inc. and the Inc. 5000 Conference, visit http://conference.inc.com