Blog

Blog

Guide to MFT Stress Testing

What is Stress Testing?Stress testing (or load testing) in software design is a type of performance testing that evaluates how a system behaves under extreme or unfavorable conditions. The goal is to determine the system’s stability, reliability, and robustness when pushed beyond normal operational limits.What Stress Testing InvolvesThis process goes beyond normal performance checks. Instead,...
Blog

Evaluating a Hosted or SaaS MFT Solution  

If you’re exploring Managed File Transfer (MFT) solutions to move on from legacy programs, or even if you already have MFT in place and are curious if a hosted, or SaaS MFT solution is in your future, here’s how to get started with evaluating a leading provider — GoAnywhere MFT’s MFTaaS deployment option.Whether your business is entirely cloud-based or you’re in the process of making the migration...
Blog

Why CISOs Should Own MFT (Managed File Transfer)

Let’s face it. File transfer solutions don’t feel flashy. They move payroll, claims, statements, and more—quietly, every day. They operate “under the radar” until something breaks or gets exploited. Then you’re staring at exfiltration, notifications, downtime, and an ugly board of director's update. That’s why MFT (Managed File Transfer) can’t live as “just plumbing.” The CISO, or Chief...
Blog

Top 5 Trends Shaping Managed File Transfer (MFT) in 2026

AI, Automation, and Advanced Reporting: Redefining How Data MovesTechnology as we know it today, is ever-changing, and the software solutions designed to move the most sensitive data for organizations, and their trading partners, are also rapidly evolving.“The need for compliant, automated, and secure file transfers continues to grow as more information is exchanged than ever before,” notes Chris...
Blog

MFT’s Role in Business Today

MFT’s Role in Business Today: It’s Bigger Than You May ThinkIn our fast-moving digital economy, how data moves efficiently and safely isn’t just a pressing concern for IT staff to determine and manage. File movement is also a business necessity, and the processes and technology used to accomplish it should be carefully considered when securing a new solution or migrating from a legacy data...
Blog

Summary of the Investigation Related to CVE-2025-10035

We have completed our investigation of suspicious activity related to our Fortra GoAnywhere MFT solution that resulted in CVE-2025-10035. This post summarizes our findings. What Happened: On Sept. 11, 2025, we began investigating a potential vulnerability reported by a customer. After identifying the issue, Fortra developed and released hotfixes for supported versions and updated the product to...
Blog

9 Data Retention Recommendations

Professional organizer, Marie Kondo might say, "The best way to choose what to keep and what to throw away is to ask yourself, "'Does this spark joy?'" She goes on to recommend people keep items that do and dispose of those that don't. While this approach may be suitable for tidying up the storage room, managing organizational data retention requires a more comprehensive set of recommendations...
Blog

ViDA Compliance: MFT Supports Data Sovereignty and Security

What is the ViDA Initiative and When is it Effective?The European Commission is driving digital transformation through its ViDA (VAT in the Digital Age) initiative. Organizations worldwide must prepare now or risk compliance penalties. The ViDA requirement was adopted in March 2025 and is currently in a rollout stage that is to occur over the next several years, with certain parliaments enforcing...
Blog

How Managed File Transfer (MFT) Can Strengthen the Supply Chain

Moving essential goods or services across the country or around the world is an industry many people don’t give much thought to, unless of course a shipment is late or misdirected, or when geopolitical shifts alter the course of “normal” supplies. This critical function of modern life, with a market projected to near $31 billion by 2026, is not without risk or disruptions. And these risks can come...
Blog

8 Ways Credit Unions Gain Security, Compliance & Efficiency with MFT

When it comes to cybercrime, credit unions are no less targeted than large, multi-national banking institutions. After all, if money talks, cybercrime targeting financial institutions screams. According to Security Magazine, 64% of surveyed financial institutions experienced a cyberattack in 2024. And according to an American Banking Journal article, the average cost of a financial sector data...
Blog

Secure File Transfers from Unsecured Locations: What to Know

Whether you're working from a coffee shop or reviewing sensitive files from a hotel room while traveling, today’s workforce thrives and often demands flexibility. But this work-from-anywhere convenience comes with risk—especially when accessing or transferring sensitive data over unsecured networks. Public Wi-Fi or mobile hotspots can get you connected when away, but they can also open the door to...
Blog

Ransomware and Disaster Recovery: Create a Plan for Your Data

Disasters come in many forms —floods, earthquakes, hurricanes and tornadoes — all with the power to destroy or seriously impact your organization’s data. And cybercrime disasters, such as ransomware can create disastrous results of their own. In today’s cybersecurity landscape, ransomware probably has a higher chance of hitting your organization than those unfortunate weather-related crises. And...
Blog

Key MFT Protocols and Their Security Implications

Deciding how to securely send files doesn’t have to be difficult. There are plenty of file transfer protocols that can do the job efficiently and securely (as well as a few that should be out of consideration).File Transfer Protocols and Their Security ConsiderationsFTP (File Transfer ProtocolSecurity considerations: Transmission of files is unencrypted, and data is sent in plaintext (including...
Blog

Stop Bad IPs Continually with GoAnywhere’s Threat Brain

In today’s cybersecurity environment, every bit of proactive defense helps to deter bad actors from entering and hanging around with potentially malicious intent. As a countermeasure, GoAnywhere MFT recently integrated Threat Brain – unique built-in threat intelligence feature which aggregates indicators from Fortra’s deep portfolio of cybersecurity solutions to continuously identify and block IPs...
Blog

GoAnywhere v7.8 Brings More Performance to File Transfers

What’s New in GoAnywhere? Version 7.8 Moves Closer to File Acceleration IntegrationGoAnywhere MFT has released v7.8, the latest version of the software Info-Tech rated #1 in the MFT sector for four years running. This latest release, along with new releases of Gateway and Agents, enhances security, performance, efficiency, and reliability.“Many customers are hitting network and performance...
Blog

MFT in the Cloud: Key Considerations

If your organization wants to add the ability to transfer files via the cloud or even completely convert from an on-premises solution to a cloud solution for convenience or cost-effectiveness, there are a few considerations to help ensure the data entrusted to you is protected and managed.Primarily, you’ll want to confirm that moving all or some of your file exchanges to the cloud:Maintains robust...
Blog

How MFT Supports Data Governance

Managed File Transfer (MFT) solutions are designed to ensure that data is secure, controlled, and compliant as it moves between and within organizations. As such, they play a critical role in broader data governance policies and guidelines. What is Meant by Data Governance? Data governance can be described as the comprehensive process used to control the security, integrity, availability, use,...
Blog

What Is an SFTP Port and Why Does It Matter?

If you need to establish a secure connection between a client and server to transfer business-critical or sensitive files, an SFTP (Secure File Transfer Protocol) port is a strong choice for securing data in transit. The SFTP port is a network port used to establish a secure connection or communication channel between the client and the server. It ensures that during transit, data is encrypted...
Blog

Sharing Files with Mobile Devices: What to Know

The debate on whether an organization should allow employees to bring their own devices (BYOD) to work has both its champions and its naysayers. Regardless of which side your organization falls on letting employees use their personal phones or tablets, it is still vital to ensure that activities, including exchanging and collaborating on files, are done securely.Benefits of a BYOD PositionThere...
Blog

Streamlining Government File Sharing with MFT

Efficiency: It’s a goal that’s permeating conversations in government circles at all levels lately (and other industries as well). Whether that aim is eliminating cumbersome processes or error-prone legacy systems, nearly every department and entity (including contractors working with government entities) are aiming for a more streamlined way of doing more with less – less effort, fewer personnel,...