Struggling to keep up with the latest and greatest in managed file transfer?

Subscribe to the GoAnywhere blog, and we’ll send essential IT topics and industry news right to your inbox.

Title is required.
Email address is required.
Company is required.
Filter by Category

FEATURED BLOG: Get the Guide: Meeting GDPR Requirements with GoAnywhere MFT

Learn how GoAnywhere MFT can help you meet and address several GDPR requirements in this in-depth data sheet.

Read More

10 Ways GoAnywhere MFT can Improve Your Efficiency on the IBM i

Are you using homegrown processes in your organization to send files on the IBM i? Learn how GoAnywhere MFT can improve your efficiency in this post.

Read More


5 Best Practices for IBM i File Transfers

Don’t let your data suffer! Use these 5 best practices for the IBM i to protect your file transfers from security vulnerabilities and user oversight.

Read More


What to Consider when Selecting Managed File Transfer Software

Forget custom scripts and programs for your data transfers; switch to managed file transfer! Here’s what to look for when finding an MFT solution.

Read More


30 Ways to Simplify Life with Advanced Workflows

Are you using GoAnywhere’s Advanced Workflows? If you aren’t, you’re missing out! Here are 30 ways they can simplify your life (and business processes).

Read More


How Does MFT Work?

You may know the “why” behind managed file transfers, but do you know the how? Follow a file’s journey from user to recipient to learn how MFT works.

Read More


MFT Agents: Definition, Differences and Use Cases

What are MFT agents? What’s the difference between traditional managed file transfer deployments and an MFT agent deployment? Find out here.

Read More


Top Takeaways from the 2017 Cybersecurity Trend Report

Learn where cybersecurity professionals are focusing their efforts in 2017, in this takeaways post overviewing the Cybersecurity Trends Report.

Read More


The State of File Transfer Security

The 2017 Cybersecurity Trends Report uncovered both shocking and actionable insights about the state of file transfer security.

Read More


Still using SHA-1 to secure file transfers? It’s time to say goodbye.

Organizations still using SHA-1 to authenticate file transfers should abandon the protocol after Google's public announcement of a SHA-1 collision.

Read More


No Such Thing as a Free File Transfer, Part 2: Cost-effective Security

A software solution to secure your file transfers can bring you a great return on investment. Learn how to mitigate risk and protect your bottom line by choosing the right data security solution without breaking the bank.

Read More