» 

Blog

Posts Categorized Under "EVENT"

Preview of Gartner Security & Risk Management Summit 2017

Four days of security discussions, over seventy five speakers, and six program tracks; these are the numbers exciting cybersecurity professionals around the nation as they prepare to attend this year’s Gartner Security & Risk Management Summit. Taking place from June 12-15 in National Harbour, Maryland, this summit is one of the biggest and most important of the year.

Linoma Software, a HelpSystems company, will be attending this premier gathering of security, risk management, and business continuity management leaders, in order to take in this all too valuable informational experience.

Here are some must-see sessions that we’re looking forward to:

What Can We Expect from the EU’s General Data Protection Regulation?

June 12, 2017 | 10:00 AM – 11:00 AM | Carsten Casper

Are you ready for GDPR compliance? Do you have a timeline in place to implement the required security protocol? The latest cybersecurity compliance regulation out of Europe has companies around the world wondering – does this apply to us? This session will go into full detail about the regulation, as well as what actions IT departments in non-European countries must take to meet compliance regulations.

Forcepoint: Insider Threats: Understanding Intent and Creating Actionable Programs

June 12, 2017 | 11:30 AM – 12:15 PM | Dr. Richard Ford, Meerah Rajavel

In a time where large and harmful security breaches seem to occur as often as the sun rises and sets, companies often struggle to hard to pinpoint where these breaches are coming from and why. A recent study from Crowd Research Partners showed that cybersecurity professionals consider “internal threats” the biggest threat to IT security. This session, presented by Joint Forcepoint Chief Scientist Dr. Richard Ford and CIO Meerah Rajavel, will examine strategies for implementing people-centric protection systems that will prevent bad cyber practices and enable good behaviors to help stop breaches caused by internal threats.

Roundtable: Managing Cloud Service Provider Security

June 12, 2017 | 2:00 PM – 3:00 PM | Jay Heiser

When it comes to the many cloud services that enterprises are confronted with, well, the sky’s the limit (pun intended). The cloud and its many benefits are more relevant than ever, and in this session, speaker Jay Heiser poses the question: who is accountable for managing this risk and ensuring that these cloud providers can be trusted? With such promising discussion, we strongly urge you not to miss this one.

To the Point: How to Respond to PCI DSS v.3.2

June 15, 2017 | 12:00 PM – 12:30 PM | Rajpreet Kaur

The 2018 deadline for compliance to PCI DSS v.3.2 is rapidly approaching. This session will cover information surrounding the various enhancements to the latest PCI DSS version and how to deal with them. Our recent whitepaper breaks down everything new about v.3.2, but we’re certainly interested in hearing what additional details and considerations Rajpreet discusses in this session.

 

We can’t wait to see you at the Gartner Security & Risk Management Summit of 2017! Make sure to come find us in booth 100 or reserve time at the event to chat.


Exclusive Sneak Peak of COMMON 2017 Sessions

In just a few days, Power Systems professionals from around the world will gather for expert discussions on IBM i, open source and cybersecurity topics at the COMMON 2017 Annual Conference. Known as the largest Power Systems event of its kind, the conference offers over 300 sessions and presented by more than 100 experts in the field.

As the event quickly approaches, we sat down with some of this year’s speakers to uncover their passions, advice to attendees and exclusive peaks into next week’s presentations. Read on to see what each shared.

 

Greg Cannella

Director of MIS at Magid Glove & Safety Mfg

Greg will be presenting at two sessions titled Creating SQL Functions and How to Use the SQL Descriptor. You may view Greg’s biography and session schedule here.

Which one of your sessions are you most passionate about, and why?
“I am most passionate about Creating SQL Functions.  This topic has very broad applications and is most likely to appeal to the widest audience.  Once people learn how easy it is to create a function and how much they can do for you, the adoption rate should be very high.  My goal is to provide everything someone needs so they can go back to the office the next day and create a function.”

What are you most looking forward to at COMMON?

“Since I am a first time speaker at Common, I am definitely looking forward to those sessions.  I am also looking forward to meeting up with all of the other people that I have worked with in the industry.”

 

Raymond Johnson COMMON speakerRaymond Johnson

Consultant / Owner at iSolutions Consulting, Inc

Ray will be presenting at three sessions titled No More Excuses, Save the Entire System Using the IBM i Default Job Scheduler, Are You Secure? Are You Monitoring the IBM i Audit Journal? and IBM ACS Overview. You may view Ray’s biography and session schedule here.

What’s one topic you’re hoping to learn about at this year’s conference?

“I plan to learn more about VIOS since I now have two VIOS partitions to manage and the AIX environment is NOT like the IBM i (it is not integrated). Everything has its own version and the PTF and upgrade processes are nowhere near as easy (or maybe familiar??) as the IBM i processes.”

What do you predict will be the hottest topic of discussion at this year’s conference?

“I predict system and network security will be a hot topic of discussion.”

 

Carol Woodbury COMMON speakerCarol Woodbury

VP Global Security Services at HelpSystems

Carol will be presenting three sessions, with titles including IBM i Security from the Ground Up and Best Practices for the IBM i Security Administrator.  You may view Carol’s biography and session schedule here.

Which one of your sessions are you most passionate about, and why?
I’m probably most passionate about the Best Practices for the IBM i Administrator.  Attendees sit through a lot of sessions about new and advanced technology, but sometimes, it’s not obvious how to apply it. In this session I provide actionable tasks that administrators can take back to their workplace and start making their systems more secure.  In other words, it’s full of practical advice that’s easily applied in their work environment.

What is one piece of advice you’d offer to first-time attendees?
Don’t be afraid to ask questions. You’re there to learn! If something’s not clear… ask!

 

Liam Allan COMMON speakerLiam Allan

Product Developer at Profound Logic

Liam will be presenting at three sessions titled Git Fun and Games, Open-Source ILE Concepts and Web Requests in Embedded SQL. You may view Liam’s biography and session schedule here.

Which one of your sessions are you most passionate about, and why?

“I am actually most excited for the workshop I am giving with Alan Seiden and Steph Rabbani. I am not only excited to talk about something I am passionate about, but having the opportunity to do it with two amazing people makes it even more exciting for me.”

What are you most looking forward to at COMMON?

“I am most looking forward to hanging out with people that I have worked with in the last year. My favourite part about COMMON is the social element to it.”

 

Bob Luebbe COMMON speaker IBM iBob Luebbe

Chief Architect at Linoma Software

Bob will be presenting at two sessions titled Simplify Encryption with DB2 Field Procedures and Securing Your File Transfers from the IBM i. You may view Bob’s biography and session schedule here.

Which one of your sessions are you most passionate about, and why?

“I am most excited to talk about encryption using DB2 field procedures since a lot of organizations are looking at how to encrypt data at rest.  With field procedures, encryption has greatly been simplified.  Oftentimes, companies do not have to make any changes to their applications to implement encryption.  So it is much easier to do encryption at the field level now.”

What do you predict will be the hottest topic of discussion at this year’s conference?

“I think security is going to be a hot topic since so many organizations are facing strict regulations regarding sensitive data.”

 

Randall Munson

President of Creatively Speaking

Randall will be presenting at three sessions titled WRITE RIGHT! Business Writing for Geeks, Magic of SELLING Technology! and Riding the Rapids of CHANGE! You may view Randall’s biography and session schedule here.

Which one of your sessions are you most passionate about, and why?

"The presentation I am most passionate about is, 'Magic of SELLING Technology!'. Since working in the IBM development lab in Rochester as the interface between the lab and IBM sales and marketing more than 20 years ago, I have been focused on how to sell IBM i technology around the world. I've helped companies make millions of dollars in increased sales. I enjoy sharing with others what I have learned so that they can improve their marketing and sales. But this presentation isn't just for people in sales and marketing roles. It is also valuable for showing technical people how to sell their own company's decision makers on products and services that would be valuable to them."

What do you enjoy most about speaking at COMMON?

"I love teaching valuable information in a way that is fun and memorable. I'm deeply gratified when people tell me things like, 'I've been working on this for 6 years and now I finally understand it!' or, 'Ten years ago I saw you present and I'll never forget what you said!' or 'You've changed my life.' Most people don't have a chance to experience that but speaking at COMMON for 30 years has given me that opportunity and I am grateful."

 

Tom Huntington COMMON speaker IBM iTom Huntington

EVP of Technical Solutions at HelpSystems

Tom will be presenting a session titled High Availability Options for SMB IBM i Users on Tuesday, May 9th at 2:00pm. You may view Tom’s biography and session details here.

What is the largest takeaway that you’re hoping to leave the audience with?
“High availability can be hosted in the cloud and it can be affordable.”

What are you most looking forward to at COMMON?
“It’s great to unite with our customers and friends in the industry; I always learn so much from them. There’s a unique energy behind COMMON because it’s run by experts from all different industries using IBM Power Systems running IBM i.”


Vern Hamberg

Senior IT Developer at Ecolab, Pest Elimination

Vern will be presenting at nine sessions, with titles including Query Management: What is it? Why Should I Care?, Fast Modern Excel Workbook Creation Using RPG and Extend Your Reach to Remote Data with Open Access: RPG Edition. You may view Vern’s biography and session schedule here.

Which one of your sessions are you most passionate about, and why?
“Although I feel strongly about them all, probably I’m most passionate about the 2 on ‘Fast Modern Excel (XLSX) Workbook Creation Using RPG’. I hope they convey the idea that we should find ways to say ‘Yes!’ to almost any ‘Can you do this…?’ request. And to accomplish this goal in effective and interesting and well-pleasing ways.”

What’s one topic you’re hoping to learn about at this year’s conference?
“I want to learn more about the open source possibilities on our favorite system.”

 

Rich Diedrich COMMON speaker IBM iRich Diedrich

IBM i Wizard at Rich Diedrich Consulting, LLC

Rich will be presenting at three sessions titled Accessing Java from RPG IV, The RPG Programs Used by Madoff and Encryption on IBMi. You may view Rich’s biography and session schedule here.

Which one of your sessions are you most passionate about, and why?

“The RPG Programs Used by Madoff (33CN) is the most fun because it is very different from my other more technical presentations. I get to talk about the experience of being an expert witness in a federal trial, how I did the analysis of the programs, and show the actual code used. I particularly appreciate talking through the code with an audience that understands the code and some of the more humorous aspects of how it was done.”

What do you predict will be the hottest IBM i topic of the conference this year?

“I am not sure what it will be, but based on the presentations and presenters available, this conference will be an excellent opportunity for attendees to think and learn about how their IBM i data needs to be made available in current application environments and the serious security considerations that need to accompany that availability.”

 

Dawn May COMMON speaker IBM iDawn May

Senior Technical Staff Member at IBM

Dawn will be presenting at ten sessions, with titles including Predictive Performance Management, Introduction to the IBM i Performance Data Investigator and Hidden Gems of IBM i. You may view Dawn’s biography and session schedule here.

Which of your sessions are you most looking forward to presenting, and why?

“One of my favorite presentations to give is ‘Introduction to the IBM i Performance Data Investigator’. I find there are a lot of people that have never used this function even though it is included with the operating system and everyone has it. I've really enjoyed it when someone tells me they logged onto their own system to try it out during the presentation.

I also look forward to presenting the ‘Manage Work Better with Better Work Management’ session. IBM i work management is a significant differentiator for IBM i and IBM has delivered some important enhancements that make it even better.”

As a seasoned COMMON veteran, what do you enjoy most about the conference?

“Of course it's the people in the IBM i community! Over the years, I've met a lot of people while at COMMON and there are a set of folks that I only see when at the conference. Each year, I meet a few more people and my professional network gets a little bit bigger. The best part is that the people in the IBM i community are the friendliest!”

 

Conrad Feldt COMMON speaker IBM iConrad Feldt

Owner / IT Consultant at Itasca Computer Resources

Conrad will be presenting two sessions titled Windows 7 & 10 Tips, Tricks & Techniques and Improving Your Memory. You may view Conrad’s biography and session schedule here.

Which one of your sessions are you most passionate about, and why?

“My session Tuesday afternoon Improving Your Memory.  It is non-Technical session and it gives a break from the other sessions.  We all know that we do not remember as well as we would like to.  This is an interactive session and has proven to be a lot of fun.  Come to relax and at the same time come away with some useful tips on Improving Your Memory.”

What are you most looking forward to at COMMON?

“I enjoy meeting up with past acquaintances from 18 years ago to last year, and meeting new people, sharing ideas, thoughts, and knowledge.  Simply put the networking.”

 

Robin Tatum COMMON speaker IBM iRobin Tatam

Director of Security Technologies at HelpSystems

Robin will be presenting five sessions, with titles including IBM i Security: The Good, the Bad and the Downright Ugly, Data Breaches: Is IBM i Really at Risk? and IBM i Security for Programmers. You may view Robin’s biography and session schedule here.

Which one of your sessions are you most passionate about, and why?

“The session I am most passionate about is definitely the enthusiastic discussion surrounding our annual "State of IBM i Security" study.  This is an award-winning session for a reason. Each year, we pour a wealth of resources into compiling what is the only study of its kind, and it always amazes me the provocative things we uncover.  It's a good education for the uninitiated as well as those that mistakenly think that security on a Power Server is correctly and fully preconfigured at the factory.”

As a seasoned COMMON veteran, what do you enjoy most about the conference?

“I thoroughly enjoy COMMON's encouragement of knowledge expansion. While we all gravitate towards sessions that are 100% pertinent to our daily grind, I also encourage attendees to sign up for one session whose abstract is completely outside of the box; just to get some exposure to something new.  It's also an unparalleled opportunity for our team to share what we work on behind the scenes and the expansive suite business solutions (software and services) we bring to the corporate table. From the human side, let's not forget meeting up with old friends as well as introductions to numerous new ones via a networking opportunity like no other!”

 

Gordon Leary COMMON speaker IBM iGordon Leary

IT Manager at AMPORTS, Inc.

Gordon will be presenting at two sessions, the Reception for First-time Attendees and the First Timers Social. You may view Gordon’s biography and session schedule here.

You’ve been attending COMMON conferences for quite some time. What keeps you coming back?

“I have been attending COMMON conferences since 1987 for several reasons. The first is education. The IT business is in a constant state of change, and COMMON has always kept me up to date on this change. Every time I come to a conference, I learn something that I can take back to my organization to use. It may be a new skill, a new relationship, or a new application that can be used to save my corporation time and resources. I can also use this information to take advantage of the year-round learning that COMMON offers.

The second reason I keep coming to a COMMON conference is relationships. The COMMON community is a helpful group of IT professionals. I do not know how many times I did not know how to pursue a problem, but I knew someone else that I met at the annual conference that does know the answer. A short email or phone call always brings help! The COMMON community wants to help and see every member grow in their profession.”

What is one piece of advice you’d offer to first-time attendees?

“Don’t be shy! The speakers are there to help you become a better IT professional. Ask questions, participate in sessions, talk to people outside of sessions.  Talk to the vendors in the Expo. You may not have a need for their product now, but things change. I keep a drawer full of vendor products. It is great to be able to pull out the answer for that new challenging project. If someone give out an email, it is because they truly want you to ask questions at any time. This is a great community, and COMMON is here to help grow that community.”

 

Steven Wolk COMMON speaker IBM iSteven Wolk

CTO at PC Richard & Son

Steven will be presenting at six sessions, with titles including Let’s Learn Linux, Words to Live By: A Blueprint for Success and Command Jeopardy. You may view Steven’s biography and session schedule here.

Which one of your sessions are you most passionate about, and why?

“Of the six sessions I’m presenting at this year’s Annual Meeting, I’d have to say I’m most passionate about ‘Words to Live By: A Blueprint for Success’. While I enjoy speaking about a variety of technical topics that are near and dear to my heart, my true passion in teaching is helping people succeed. Personal success is a topic I’ve studied for many years, and I’ve identified what I believe are 12 key principles we can all follow that will lead to greater success in our own lives. We’ll discuss these principles through the context of meaningful motivational quotes, combined with some very personal stories demonstrating how these lessons can be applied. Many of the stories are funny, while others are poignant, but it’s my hope that they will be remembered – and help attendees be more successful - long after the conference has ended.”

What do you predict will be the hottest topic of discussion at this year’s conference?

“I think open source will be the hottest topic of discussion at this year’s Annual Meeting. While the IBM i has always been a very open operating system, the interest I’m seeing in running open source software on the i seems to just be exploding. That’s why I decided to present a brand new session at this year’s conference, ‘Let's Learn Linux’. It’s a great way for attendees to get their feet wet with open source software, without assuming any previous knowledge. And the skills learned will be applicable across a wide variety of platforms, ranging from Linux servers, to desktops, to our favorite server, the IBM i!”


Debbie Saugen COMMON speaker IBM iDebbie Saugen

Director of Business Continuity Services at HelpSystems

Debbie will be presenting four sessions, with titles including Essentials of Backup Recovery for Disaster Recovery on IBM i and Getting the Most Out of BRMS Recoveries. You may view Debbie’s biography and session schedule here.

Which one of your sessions are you most passionate about, and why?

“Everyone who knows me, understands the passion I have about IBM i disaster recovery. My session on Essentials of Backup/Recovery for Disaster Recovery on IBM i will help you prepare for being recovery ready should  a system failure or disaster occur.  During this session, I will share true stories from my decades of experience helping companies recover their systems after a disaster.”

What are you most looking forward to at COMMON?
“I’m looking forward to seeing all my friends, making new friends and sharing my knowledge about the latest for IBM i Backup/Recovery and Disaster Recovery. Not only do I get to share my knowledge and experiences, but I will also be learning from others!”

 

Ron Byrd COMMON speaker IBM iRon Byrd

Director of Professional Services at Linoma Software

Ron will be presenting alongside Bob Luebbe of Linoma Software at two sessions titled Simplify Encryption with DB2 Field Procedures and Securing Your File Transfers from the IBM i. You may view Ron’s biography and session schedule here.

What are you most looking forward to at COMMON?

“I am looking forward to seeing all our customers that go to COMMON to learn more about the IBM i.”

What is one piece of advice you’d offer to first-time attendees?

"COMMON can be overwhelming for a first-time attendee. Spend time before you arrive to check out online the classes you want to attend. Learning can also happen in the Exposition. There are a lot of talented people working in the Exposition. Stop by and ask the vendors questions that you have about different processes and products. You will find that the vendors are always willing to help people learn."

 

 

From the teams at Linoma Software and HelpSystems, we wish this year’s COMMON speakers the best of luck!

Linoma Software, together with HelpSystems, will be participating in the Expo at booths 413 and 417. Be sure to stop by! For more information on the COMMON 2017 Annual Meeting and Exposition, visit www.common.org/events/annual-meeting/.


RSA 2017 Recap: Influential Sessions (videos included)


On Feb 13th, 2017, over 40,000 people descended on San Francisco for one of the largest security conferences in the world: RSA Conference 2017. The Linoma Software team was among those attendees, speaking with IT professionals interested in finding a top-rated managed file transfer solution at our expo booth, and sitting in on world-class educational sessions throughout the week. Below you’ll find an overview of some of our favorite sessions, as well as social highlights from the conference.


The Seven Most Dangerous New Attack Techniques,
and What's Coming Next

This was one of the most interesting sessions we attended of the conference. Three security experts (Ed Skoudis, Michael Assante and Dr. Johannes Ullrich) discussed the types of cyber attacks that are increasing in popularity among the cyber “bad guys”. Among their discussions, two important points stood out to us.

1. Attackers are broadening their targets

Attackers are not just looking for PII now. They are interested in other information that could be used for exploitation. Embarrassing information, extortion malware, power grid attacks and background check data are a few examples. “It’s not all about PII. If your organization does not store personally identifiable information, that doesn’t mean you’re not a target. In fact, you’re a target more than ever,” explained panelist Ed Skoudis in the presentation.

2. IOS attacks are projected to increase

Over the past few years, attackers have pivoted their strategy to focus more on mobile devices, specifically Android and IOS. Both Google and Apple are frequently deploying software updates that patch newly discovered vulnerabilities, but sometimes implementation of these patches can take weeks or even months. The best course of action for users is to ensure they’re updating their mobile operating system often, to take advantage of newly released security measures.

I encourage you to watch the full session below.

Planning for Chaos

There are complex cybersecurity challenges on the horizon, and the best step any organization can take is to learn how to plan for that chaos. Dr. Zulfikar Ramzan, Chief Technology Officer at RSA, walked the audience through the required steps for planning for this unknown future, and mitigating risk along the way.

In his session, he discussed the importance of a tangible and realistic incident response plan.

“An incident response plan isn’t a wishlist,” explained Ramzan. “Only leverage available resources.” He stressed the message that for an incident response plan to be successful, it requires the availability of resources, budget and collaboration between IT, finance, sales, marketing and others.

To watch the full session, play the video below:

What’s Next in Cybersecurity

An important aspect of security software development is addressing current and upcoming policies and compliance requirements. In this session, cybersecurity officials discussed the findings of a year-long effort in Washington and Silicon Valley to identify new cybersecurity policies for the administration. Below are just a few of the discussions taking place in the cyber-policy realm:

  • Cloud implementation and shared services: Implemented services in the cloud, in a secure way
  • More focus on NIST framework: Aimed at helping organizations align security, IT and business needs
  • Better reporting of cyber attacks and cyber breaches: Developing a safe way of reporting incidents that protect anonymity while helping us understand the details and learn from the incidents
  • Accelerating the security workforce: Discussing both short and long term solutions to build our US workforce of security professionals

You can listen to the full session in the video below.

Top Tweets of the Conference

The hashtag used on Twitter during the 2017 RSA conference was #RSAC2017. This hashtag was used to share motivational speaker quotes, shocking statistics, cybersecurity resources and conference happenings. Of these tweets, several rose above the rest, receiving hundreds of retweets and favorites. Here are a few tweets that your fellow security professionals found to be most intriguing.

 

 

 

Did you miss a session you were hoping to catch?

Have no fear, RSA has collected a wide range of presentations from the 2017 RSA Conference. They can be found here.

 

We’re curious to hear from you! What was your favorite session or experience at this year’s RSA conference? Comment below.


Preview of RSA Conference 2017 #RSAC

RSA conference

 

For those that are new to the annual RSA Conference U.S., this is one of the greatest info security conferences all year. The 2017 conference is said to be better than ever: more space, expanded food options, the new “Reserve a Seat” option and three full days of info security discussion led by global security experts.

Linoma Software will be attending this year’s conference, exhibiting in the North Expo. Our team is looking forward to learning which security topics are most prevalent among peers and engaging in meaningful discussions on today’s challenges and innovation. From an educational standpoint, there are several sessions we are most looking forward to:

 

CSA summit at RSACloud Security Alliance Summit 2017

February 13, 2017 | 9:00 AM - 4:00 PM | Marriott Marquis | Yerba Buena 5

Ah, “the cloud.” Over the past decade, businesses worldwide have been making the transition towards cloud computing and storage, and concern for security within the cloud has never been higher. In this special summit taking place during RSA 2017, world-leading security experts and cloud providers will join to discuss the threat landscape, data security innovations and global governance.

The keynote speakers are General Keith Alexander, CEO and President of IronNet Cybersecurity, and Robert Herjavec, CEO and Founder of Herjavec Group, and frequent investor on Shark Tank. Together with top officials from Symantec, Cryptozone, Duo Security and Oracle, these speakers are sure to bring decades of experience, lively discussion and actionable advice.

 

Peer2Peer at RSAMobile Devices: What Could Go Wrong? Discussion from the Frontlines

February 14, 2017 | 2:30 PM - 3:15 PM | Marriott Marquis | Nob Hill B

How many of your employees use their personal phones to access email, calendars or internal web resources? As of 2016, 77% of U.S. adults owned a smartphone, according to the Pew Research Center. In a world of BYOD (bring your own device), this session offers the opportunity to learn how your peers are dealing with security risks associated with mobile devices, apps and wi-fi networks that employees use.

This discussion will take place as part of the “Peer2Peers” breakout sessions, which is one of our favorite aspects of this conference. Facilitated by David Jevans, VP of Mobile Security at Proofpoint, it’s sure to spur meaningful conversations and peer-to-peer discussion.

 

Secure File Transfer for Enhanced Data Security

February 13-16, 2017 | Linoma Software Booth 4407, North Expo | San Francisco Moscone Center

Bring your most pressing file transfer questions to the North Expo, where secure file transfer experts from Linoma Software will be available to answer questions. This is a great opportunity to learn how a managed file transfer solution like GoAnywhere MFT can help to secure and automate transfers using a centralized approach.

We’re looking forward to connecting with you during the RSA 2017 conference! Be sure to stop by booth 4407 (map below).

RSA expo map to Linoma booth

 

Ready to get into the information security mindset? Watch the RSA 2016 opening theme video below for a glimpse into the discussions sure to occur during the 2017 conference.


Sign Up for the FREE Secure File Transfer Webinar Series

Linoma Software is hosting a FREE October Webinar Series on the advantages of securing your system-to-system and person-to-person file transfer processes.  Please take a moment to register for one, or both, of these informative live presentations.

Webinar: Get Your FTP Server in Compliance

Get Your FTP Server in Compliance

Are you still running an outdated FTP server in your DMZ? Does your FTP server have the security controls and audit reporting needed to meet the latest PCI DSS and HIPAA compliance requirements?

GoAnywhere goes beyond a typical FTP server by providing the enterprise-level features and security you need to get compliant.

FREE WEBINAR: Now Available On-Demand

We demonstrate GoAnywhere and how to:

  • Use SFTP, FTPS and HTTPS for file transfers
  • Protect files at rest and in motion with AES 256 encryption
  • Set triggers to automatically process files
  • Control access to private and shared folders with granular permissions
  • Generate detailed audit logs and reports

Register Now


3 Advantages of an On-premise Solution for File Sharing

Are you looking for a better solution than cloud-based file sharing services like Dropbox to transmit sensitive company data?

Put an end to employees using unsecure cloud-based file sharing services. Improve compliance and cut the risk of sensitive company data falling into the wrong hands.

FREE WEBINAR: Now Available On-Demand

We cover the three advantages of an on-premise product for Enteprise File Sync and Sharing (EFSS):

  • Local management of user accounts and files
  • End-to-end encryption of files at rest and in motion
  • No monthly user subscription fees or storage limits

Register Now


Join us for these complimentary webinars to get a valuable tour of GoAnywhere MFT. Linoma's engineers will be on hand during the webinars to answer your technical questions.


RSA Conference 2015 Recap

RSA Conference 2015 Moscone Center South HallAfter an influx of high-profile data breaches, it was no surprise that the RSA Conference saw a record crowd this year of 33,000 attendees. The Moscone Center in San Francisco is a great venue and packed with attendees, over 500 vendors, 290 sessions and 700 speakers, there was no disputing the fact that if you were interested in anything related to information security, this was the place to be.

Walking amidst the sea of vendors in the North and South Halls it was easy to be simply overwhelmed by the sheer volume of displays, gimmicks and swag tactics. As this was my first RSA Conference, I was very excited to see and experience the myriad of phenomenon that comes standard with any conference of this size. Some of the booth displays are seriously impressive, huge LED screens, Oculus Rift interactive displays, flashy lights and celebrity look-alikes were everywhere. The great thing about it is that every single person or vendor at the conference was working toward the same goal in some form or fashion...securing information. If you were on a mission to find a product or person to help you achieve a higher level of security for your company's specific needs, chances are you would find it here once you took the time to look. With so much going on, after a while everything starts to look the same, so you really have to pay attention or engage in conversations to figure out what most of the vendors at RSA Conference are representing.

RSA Conference 2015

Sharing Files, Sharing Conversations

The GoAnywhere Booth at RSA 2015In the slightly quieter South Hall, our booth saw significant and steady traffic throughout the conference. It was great talking to people and getting firsthand feedback on the challenges they face and the concerns they had about security for their organizations. One thing I found to be a recurring theme in these conversations was the desire for file sharing solutions that were not cloud-based. I thought that was interesting as it seemed there were 10 cloud vendors for every non-cloud vendor with a display at RSA 2015.

With the sheer volume of cloud products represented, it was nice seeing the looks on people's faces when they learned that GoAnywhere is an on-premise Managed File Transfer (MFT) product. I wish I had a dollar for every time someone said, "Not in the cloud? Oh good, better security." I think as more people come to realize that they are responsible for the security of their data no matter where it is stored, being able to encrypt, control and monitor that data in your own local environment becomes paramount for many.

RSA Conference 2015I like analogies and when it comes to cloud vs on-premise, I personally tend to think of it in terms of storage. I can store my belongings in my home or I can pay for a space at a public storage facility. If my belongings were in a public storage facility, all it takes is someone with a lock cutter to gain access and chances are with all the traffic going in and out, it wouldn't be noticed until it's too late. Personally, I prefer storing things in my basement or attic simply because I am diligent (perhaps overly so) about my home security. Sure, there are risks in any situation, but I prefer having my belongings and risk in an environment I can completely control. If I want to add Fort Knox level security measures to make it difficult for an intruder to get in, there's nothing stopping me from doing that, it's my home after all. RSA Conference 2015Given the many conversations had and overheard at this year's RSA Conference, I'm not alone in my thinking. It's astonishing how many people seemed more comfortable with the idea of their digital data staying on premise, not in the cloud. When they learn that GoAnywhere can give them the ability to send, collaborate, secure and automate data transfers on premise, it's like watching kids at a candy store. Those conversations are what makes attending these conferences so worthwhile, there is so much you can learn.

My RSA 2015 #SecSelfieOverall, the conference was a great experience, especially for a first timer. I chatted with several people who had wonderful things to say about the sessions, networking and things that they learned and the various speakers who presented. While it might be information overload to some extent with such a big crowd and so many sessions, speakers and vendors, I thought it was a friendly,energetic and informative atmosphere. I met a ton of great people, got to chat with some customers and really learned a lot about how people can/do use our software and which features truly make their work easier. One thing is for sure, we are definitely looking forward to returning next year to the RSA Conference.


SC Congress - Chicago

On November 18th we'll be attending SC Congress in Chicago, IL. Make a point to stop by our booth to talk with Brian Pick and Donnie Laughlin about the GoAnywhere Suite of Secure and Managed File Transfer products.  Also, be sure and register to win an iGrill mini.  See you there!


VMUG - Paris

On December 9th we'll be attending the VMUG User Conference in Paris, France. Make a point to stop by our booth to talk with Terry Heath about the GoAnywhere Suite of Secure and Managed File Transfer products.  See you there!


VMUG - Germany

On November 25th we'll be attending the VMUG User Conference in Darmstadt, Germany. Make a point to stop by our booth to talk with Terry Heath about the GoAnywhere Suite of Secure and Managed File Transfer products.  See you there!