Struggling to keep up with the latest and greatest in managed file transfer?

Subscribe to the GoAnywhere blog, and we’ll send essential IT topics and industry news right to your inbox.

Title is required.
Email address is required.
Company is required.
Filter by Category

FEATURED BLOG: 2018 Cybersecurity Concerns in Healthcare and How to Address Them

Industry experts anticipate several new cybersecurity risks for healthcare in 2018. Read this blog to school yourself on five of the biggest concerns in the industry, then use the resources we’ve included to help address them.

Read More

Is Your Data REALLY Safe on the IBM i (AS/400)?

Industry professionals often claim the AS/400 is invincible. But is it? What if your data is actually at risk? Explore the details in this post.

Read More


10 Ways GoAnywhere MFT can Improve Your Efficiency on the IBM i

Are you using homegrown processes in your organization to send files on the IBM i? Learn how GoAnywhere MFT can improve your efficiency in this post.

Read More


5 Best Practices for IBM i File Transfers

Don’t let your data suffer! Use these 5 best practices for the IBM i to protect your file transfers from security vulnerabilities and user oversight.

Read More


What to Consider when Selecting Managed File Transfer Software

Forget custom scripts and programs for your data transfers; switch to managed file transfer! Here’s what to look for when finding an MFT solution.

Read More


30 Ways to Simplify Life with Advanced Workflows

Are you using GoAnywhere’s Advanced Workflows? If you aren’t, you’re missing out! Here are 30 ways they can simplify your life (and business processes).

Read More


How Does MFT Work?

You may know the “why” behind managed file transfers, but do you know the how? Follow a file’s journey from user to recipient to learn how MFT works.

Read More


MFT Agents: Definition, Differences and Use Cases

What are MFT agents? What’s the difference between traditional managed file transfer deployments and an MFT agent deployment? Find out here.

Read More


Top Takeaways from the 2017 Cybersecurity Trend Report

Learn where cybersecurity professionals are focusing their efforts in 2017, in this takeaways post overviewing the Cybersecurity Trends Report.

Read More


The State of File Transfer Security

The 2017 Cybersecurity Trends Report uncovered both shocking and actionable insights about the state of file transfer security.

Read More


Still using SHA-1 to secure file transfers? It’s time to say goodbye.

Organizations still using SHA-1 to authenticate file transfers should abandon the protocol after Google's public announcement of a SHA-1 collision.

Read More