Blog

Blog

How Advanced Workflows Goes Beyond the Surface

Imagine taking one of your monstrous, days-long tasks and condensing it into just a few clicks. With Advanced Workflows, you can do just that: set up a task once and let GoAnywhere MFT do the rest. The full scope of Advanced Workflows is vast; dive deep into this popular Project-builder that helps you automate and manipulate data movement throughout...
Blog

What's the Difference Between AS2, AS3, and AS4?

If you think these three protocols are simply sequential updates from the 1990s’ AS1 protocol you’d be mistaken. Each protocol brings its own distinct features to the data transmission table. Here’s a few key differences between them.What is AS2?AS2 (Applicability Statement 2) is a protocol specification used to transmit sensitive data securely and...
Blog

Need a Cloud-Based MFT Environment? Try a Hybrid Cloud Setup

Cloud integration is growing in popularity, but committing 100% to the cloud isn’t always practical or secure for organizations. If you’re in the market for cloud-based solutions, read our quick overview below. For a more comprehensive exploration of when to choose a hybrid cloud and how keep your data encrypted through and after the transition to a...
Blog

Which is Better? - AS2 vs. AS4

AS2 vs. AS4AS2 and AS4 are both popular file transfer protocols that allow businesses to exchange data securely with their business partners. However, what is the difference between them, and which of the two is better?What is AS2?AS2 (Applicability Statement 2) is a protocol specification that’s used to transmit sensitive data securely and reliably...
Blog

New Zealand Healthcare Agencies Required to Eliminate Fax Machine Use and Secure Emails for Compliance by 2020

Here’s what you need to know in order to make the transition and achieve compliance with HISF Chapter 8 by 2020Are you part of a health agency or healthcare organization in New Zealand that uses traditional fax machines or other insecure data transfer methods to share patient information and communications? If so, you’ll want to pay close attention...
Blog

Which is Better: AS2 vs. SFTP?

Over the last several months, we’ve compared many different file transfer protocols, including SFTP vs. FTPS and SFTP vs. MFT, and MFT vs. Dropbox for secure file sharing.Today, we’re going to look at AS2 vs. SFTP. How do these popular file transfer protocols work? How do they differ? And most importantly, which one is better for your organization’s file exchange requirements?Let’s dive in.What is...
Blog

FTP vs Cloud | Why You Should Never Use FTP to Transfer Cloud Files

What is FTP?File Transfer Protocol, or FTP, is a basic protocol used to transfer files between a client, (which initiates the connection), and a server on a network. FTP operates as a client-server model protocol and is considered an application layer protocol.With FTP, the end user’s computer is the local host; the second computer is called the...
Blog

9 Ways to Use GoAnywhere’s Cloud Connector Integrations

There are many benefits to having a managed file transfer solution that supports built-in cloud integrations. From trading important files with business partners in Dropbox to automatically updating billing information in Salesforce from a central location, web app integrations in an MFT solution can simplify your critical file transfer and business...
Blog

Introducing GoAnywhere MFT for AWS and Azure Cloud File Transfers

Are you looking for a solution that automates the movement of files between your on-premises and cloud environments? As cloud computing platforms become more commonplace, organizations are starting to shift their file transfer processes from in-house tools and scripts to secure solutions that promote strong cybersecurity practices, user management,...
Blog

SFTP: The Smart Way to Transfer Your Cloud Data

With the growing buzz about everything "cloud computing," most organizations are either starting to consider the cloud or have already moved some of their business processes to a cloud platform.No matter where you stand, technology is no stranger to the cloud. Consumers use cloud applications, services, and storage daily, while many organizations...
Blog

IT Pros in Healthcare: How to Choose a Secure File Transfer Solution

Every healthcare provider wants to avoid being the next data breach headline—and unfortunately, we have seen many incidents and their consequences in 2018 so far. The causes of these data breaches range from wrongly configured databases to successful malware attacks and unauthorized user access.For those looking to avoid the pain, embarrassment, and...
Blog

On-Premises and the Cloud: A Comparison of Two Unique Environments

On-premises. The cloud. Hybrid environments.As technology evolves and business needs grow, organizations are rapidly trying to make sense of their options. What are the benefits of running their software and data on-premises? What concerns should IT and security teams be aware of when implementing their processes in the cloud? Can they do a bit of both and go hybrid?There is no right or wrong...
Blog

2018 Cybersecurity Concerns in Healthcare and How to Address Them

The first few weeks of January always seem to be accompanied by an influx of new cybersecurity trends, forecasts, and concerns. As expected, 2018 has followed this pattern—and with the need for secure patient information growing ever more critical and the arrival of GDPR in May, it’s no surprise that healthcare experts are deep in conversation about...
Blog

5 Cloud Security Best Practices for Microsoft Azure

Migrating company data to the cloud is often a primary goal for modern organizations. In fact, by 2018, 60% of organizations’ IT infrastructure will be cloud-based, according to IDG’s Enterprise Cloud Computing Survey. Cloud infrastructure comes with many benefits, including—but not limited to—reducing IT budgets, improved data security, endless...
Blog

Are Your Electronic Health Records (EHRs) Secure?

Since moving to Electronic Health Records and modern EHR technology, the healthcare industry has taken great strides to enhance patient care, internal workflows, and business-to-business communication. These improvements bring organizations closer and closer to full integration with others in the industry; a goal that will, once fully achieved,...
Blog

7 Cloud Security Best Practices for Amazon Web Services

Temporary and permanent storage of data in the cloud has grown in popularity over the years. Companies like Land O’Lakes and Boeing moved their information to the cloud last year to simplify the technology they used. Video-streaming behemoth Netflix finished their journey to the cloud in early 2016 after seven years of moving systems and customer...
Blog

8 Ways to Protect Your Healthcare Organization from a Data Breach

In 2020, there were 642 data breaches of healthcare organizations. That’s a new record, up 25 percent from the previous year. In these breaches, the records of millions of Americans were exposed. These incidents occurred at all types of organizations in the industry, including clinics, insurance providers and their health system business associates.If you’re in the healthcare industry, here are...
Blog

HIPAA Compliance: Guide Details How MFT Helps

Are your file transfers HIPAA compliant? Is your healthcare organization at risk for fines, or worse - a data breach of sensitive patient information? Many healthcare IT teams meet these broad questions with unease. After all, the ramifications of a healthcare data breach can impact organizations and individuals for years to come as well as have...
Blog

Why Healthcare Organizations Need a Secure Data Transfer Solution

The last few years were scary in terms of healthcare cybersecurity. A hack of Banner Health breached up to 3.7 million records. Another data breach at 21st Century Oncology resulted in multiple lawsuits being filed against the organization. When a third party gained unauthorized access to computer systems at Valley Anesthesiology and Pain Consultants, almost 900 thousand patients, employees, and...
Blog

SHA-2 and TLS Security for AS2 Transfers

SHA-2 and TLS Security for AS2 Transfers It’s crucial for organizations to take the time to upgrade the security used to protect their AS2 data transfers. In order to be compliant with the latest security standards, you need to be using a modern AS2 solution. Related Reading: AS2 Protocol Software for Client & Server Transfers The Story...