Blog

Blog

5 Tips for Large File Transfers

  Image   It doesn't matter if you’re a small organization, a small-to-medium-sized (SMB) business, or an enterprise: at some point, you’ll likely need to exchange a large file transfer with a trading partner, third-party vendor, or client. If you don’t know how to support a large file transfer or lack the tools to execute it...
Blog

What is Operation Yellowhammer and How Does it Affect Data Transfers?

  Image   What is Operation Yellowhammer?   If you are located in the United Kingdom (UK), then you may already be familiar with Operation Yellowhammer and its relationship to Brexit and the European Union (EU). For those of you that haven’t been briefed on Operation Yellowhammer and how it relates to Brexit, now is the perfect...
Blog

Meeting IT Security and Compliance Requirements with GoAnywhere MFT

  Image Meet your IT and compliance requirements easily with GoAnywhere MFT. GoAnywhere helps organizations and IT professionals comply with an array of strict regulations, methods, and technologies. To open a larger, clickable image, choose the "Download" option below. DOWNLOAD   Image ...
Blog

Which is Better? - AS2 vs. AS4

  Image   AS2 vs. AS4   AS2 and AS4 are both popular file transfer protocols that allow businesses to exchange data securely with their business partners. However, what is the difference between them, and which of the two is better? What is AS2? AS2 (Applicability Statement 2) is a protocol specification that’s used to transmit...
Blog

Why You Should Migrate from Your Current MFT Software

  Image Is Your MFT Solution Keeping Up with Your File Transfer Requirements? With the increasing responsibilities IT professionals must juggle, including managing a myriad of daily tasks, addressing cybersecurity concerns, creating projects and business guidelines, meeting partner requests, and keeping abreast of compliance...
Blog

GDPR: Understanding the 8 Rights of Data Subjects

Image Find out what these new rights mean for your organization and how you can prepare.   GDPR (General Data Protection Regulation) is the EU’s new legal framework that replaced the EU Data Protection Directive in May 2018. While the directive was merely a recommendation, GDPR carries the force of law. The purpose...
Blog

Think Your Customer Data was Exposed? Follow These Steps

  Image When a prospect or customer shares personal data with a business, they expect their information will be stored securely, kept safe from vulnerabilities, and used only for the purposes with which it was collected. Whether this data is an email address, a birthday, a personal identifier, or credit card numbers, the weight of...
Blog

Is FTP Dead?

  Image Is FTP still a viable option for sending file transfers? While organizations across all industries have started shifting to secure FTP protocols like SFTP and FTPS, a surprising number of businesses still use FTP to transfer sensitive documents across internal and external networks. The search "how to use FTP" comes up with...
Blog

Why Choose Managed File Transfer Over Free File Sharing Methods?

  Image Why Choose Managed File Transfer? It’s no secret that many organizations struggle to fully protect the sensitive data their employees, customers, trading partners, and third-party vendors share. Free file sharing software and scripts are both common ways of transferring files, even though they’re not necessarily the most...
Blog

New Zealand Healthcare Agencies Required to Eliminate Fax Machine Use and Secure Emails for Compliance by 2020

  Image   Here’s what you need to know in order to make the transition and achieve compliance with HISF Chapter 8 by 2020 Are you part of a health agency or healthcare organization in New Zealand that uses traditional fax machines or other insecure data transfer methods to share patient information and communications? If so, you’ll...
Blog

Top 5 Reasons to Try GoAnywhere’s ROI Calculator

Image You know you need a managed file transfer (MFT) solution. While you see the benefit in allowing IT staff to secure and automate file transfer tasks, you also need to demonstrate the investment value to get internal buy-in. This ROI calculator can help! Not only will it show you the value of GoAnywhere MFT and how much you could...
Blog

I’ve Just Been Breached, Now What?

  Image So, you think (or perhaps you know) you’ve been breached. It’s every organization’s nightmare, and you’re living it, facing local and federal fines, upset customers, public panic, and a loss of intellectual property. A breach can be a harrowing ordeal; if you’re not sure what to do immediately after discovering the breach,...
Blog

40 Cybersecurity User Groups, Forums & Communities to Join

  Image What is the best cybersecurity resource? Answer: other people! Today more than ever, people are connecting with each other over shared problems and interests. Maybe there’s a particularly tricky problem that’s taunting you. Maybe you have exciting best practices to share with other professionals. Whether you’re a...
Blog

7 Benefits of Using MFT for Encrypted File Transfers

  Image   7 Benefits of Using MFT for Encrypted File Transfers   At minimum, a managed file transfer (MFT) solution is a product that encompasses all aspects of inbound and outbound file transfers while using industry-standard network protocols and seamless encryption. It can automate and transfer data across your network, systems...
Blog

Automation Operations: 5 Benefits of Automation

  Image   Advantages of Automation Visions of a mechanized world flourished long before the term "automation" was coined. The star of Westinghouse’s exhibit at the 1939 World’s Fair was Electro, a robot that could walk, talk, and count on its fingers. Sadly, Electro and his kind were little more than demonstrations of remote...
Blog

6 Ways to Get Internal Buy-In for Your MFT Solution

  Image There are a lot of moving pieces that go into a product evaluation. You need to navigate through the myriad of options in today's marketplace, attend vendor demonstrations, try the software in a test environment to ensure it works as expected, request pricing and consider if the quote provided fits in your budget, and finally...
Blog

What is a DMZ and Why Do You Need a DMZ Secure Gateway?

  Image If you’ve watched a science-fiction movie about space travel, then you’ve likely seen some version of a scene in which an astronaut reenters their ship from the outside abyss. Because the ship exists as a haven from the dangerous environment of empty space, the astronaut cannot simply open the door and stroll directly into...
Blog

5 Benefits of PGP Decryption Using Managed File Transfer

  Image If your trading partners or vendors require you to PGP encrypt or decrypt the files you exchange, you may be on the search for an affordable, trust-worthy PGP software to implement in your organization. The software you’re looking for may also need to support more than basic PGP decrypt and encrypt functionality. You may want...
Blog

What’s the Difference Between GoAnywhere 6.0 and 6.1?

  Image We’re excited to share that GoAnywhere 6.1 is now available for download! The newest version of our managed file transfer solution includes over 30 new features, such as X12 data translation and a built-in data mapping tool for centralized encryption and EDI, along with many additional enhancements that our customers have...
Blog

How to Encrypt Files in Linux

  Image If your organization uses Linux operating systems to run key business processes, it’s important to implement tried-and-tested Linux security practices that support critical files as they transfer from one system to another. One requirement that pops up frequently for Linux users is file encryption. Linux files need to be...