Blog

Blog

7 Essential Resources on PCI DSS Security

  Image Note from the Editor: This article was originally published in February 2017. It has been updated with resources current to PCI DSS version 3.2.1. Did you know that 80% of organizations are not compliant with PCI DSS requirements? That means, if you’re reading this, there’s a pretty good chance your company needs to...
Blog

Need a Cloud-Based MFT Environment? Try a Hybrid Cloud Setup

  Image Cloud integration is growing in popularity, but committing 100% to the cloud isn’t always practical or secure for organizations. If you’re in the market for cloud-based solutions, read our quick overview below. For a more comprehensive exploration of when to choose a hybrid cloud and how keep your data encrypted through and...
Blog

What are SFTP Servers?

  Image   What are SFTP Servers? A typical file transfer server helps transfer files server-to-server or client-to-server, and SFTP servers are a more protected version: they encrypt data to keep sensitive information secure while moving files, and some have the added bonus of encrypting files at rest. SFTP servers use a single...
Blog

What Port Does SFTP Use?

  Image       Different Protocol, Different Port Ports, also known as channels, are an integral part of the successful delivery and communication process of secure files. Although the specific protocols that operate on these ports makes the most difference, are you aware of which actual port SFTP uses? What is SFTP? SFTP (SSH...
Blog

Open PGP and GoAnywhere MFT: What You Need to Know

  Image       Which Solution is Right for You? Open PGP vs. GoAnywhere MFT If you have sensitive files that need to get from point A to Point B securely, you may have considered utilizing Open PGP or a managed file transfer solution, like GoAnywhere MFT. Do you know which option is the best fit for your organization? What is...
Blog

Meeting IT Security and Compliance Requirements with GoAnywhere MFT

  Image Meet your IT and compliance requirements easily with GoAnywhere MFT. GoAnywhere helps organizations and IT professionals comply with an array of strict regulations, methods, and technologies. To open a larger, clickable image, choose the "Download" option below. DOWNLOAD   Image ...
Blog

Which is Better? - AS2 vs. AS4

  Image   AS2 vs. AS4   AS2 and AS4 are both popular file transfer protocols that allow businesses to exchange data securely with their business partners. However, what is the difference between them, and which of the two is better? What is AS2? AS2 (Applicability Statement 2) is a protocol specification that’s used to transmit...
Blog

GDPR: Understanding the 8 Rights of Data Subjects

Image Find out what these new rights mean for your organization and how you can prepare.   GDPR (General Data Protection Regulation) is the EU’s new legal framework that replaced the EU Data Protection Directive in May 2018. While the directive was merely a recommendation, GDPR carries the force of law. The purpose...
Blog

Think Your Customer Data was Exposed? Follow These Steps

  Image When a prospect or customer shares personal data with a business, they expect their information will be stored securely, kept safe from vulnerabilities, and used only for the purposes with which it was collected. Whether this data is an email address, a birthday, a personal identifier, or credit card numbers, the weight of...
Blog

New Zealand Healthcare Agencies Required to Eliminate Fax Machine Use and Secure Emails for Compliance by 2020

  Image   Here’s what you need to know in order to make the transition and achieve compliance with HISF Chapter 8 by 2020 Are you part of a health agency or healthcare organization in New Zealand that uses traditional fax machines or other insecure data transfer methods to share patient information and communications? If so, you’ll...
Blog

Are SFTP Files Encrypted?

    Image The definitive answer to "Are SFTP Files Encrypted," is yes! SFTP, short for Secure Shell (SSH) File Transfer Protocol is a network protocol that organizations use to secure and send file transfers. SFTP is firewall-friendly, supports key-based authentication, encrypts usernames and passwords, and implements strong...
Blog

I’ve Just Been Breached, Now What?

  Image So, you think (or perhaps you know) you’ve been breached. It’s every organization’s nightmare, and you’re living it, facing local and federal fines, upset customers, public panic, and a loss of intellectual property. A breach can be a harrowing ordeal; if you’re not sure what to do immediately after discovering the breach,...
Blog

7 Benefits of Using MFT for Encrypted File Transfers

  Image   7 Benefits of Using MFT for Encrypted File Transfers   At minimum, a managed file transfer (MFT) solution is a product that encompasses all aspects of inbound and outbound file transfers while using industry-standard network protocols and seamless encryption. It can automate and transfer data across your network, systems...
Blog

The Key Differences Between SFTP and FTP

Image Last Updated 05/03/2024 Are SFTP and FTP the same? While they both transfer files, the answer to this question is ultimately, NO. Secure File Transfer Protocol or SSH File Transfer Protocol (SFTP) and File Transfer Protocol (FTP) are NOT the same thing. SFTP, not to be confused with FTP Secure (FTPS), is a network SFTP is an...
Blog

Everything You Need to Know About Open PGP Encryption

Image What is Open PGP? PGP is the backbone of Open PGP. It is an open source standard that allows PGP to be used in software that is typically free to the public. The term "Open PGP" is often applied to tools, features, or solutions that support open source PGP Encryption technology. It is Internet Engineering Task Force (IETF)...
Blog

Automation Operations: 5 Benefits of Automation

  Image   Advantages of Automation Visions of a mechanized world flourished long before the term "automation" was coined. The star of Westinghouse’s exhibit at the 1939 World’s Fair was Electro, a robot that could walk, talk, and count on its fingers. Sadly, Electro and his kind were little more than demonstrations of remote...
Blog

5 Benefits of PGP Decryption Using Managed File Transfer

  Image If your trading partners or vendors require you to PGP encrypt or decrypt the files you exchange, you may be on the search for an affordable, trust-worthy PGP software to implement in your organization. The software you’re looking for may also need to support more than basic PGP decrypt and encrypt functionality. You may want...
Blog

How to Encrypt Files in Linux

  Image If your organization uses Linux operating systems to run key business processes, it’s important to implement tried-and-tested Linux security practices that support critical files as they transfer from one system to another. One requirement that pops up frequently for Linux users is file encryption. Linux files need to be...
Blog

Everything You Need to Know about FTP Automation Software

  Image So, you want to automate your FTP file transfers. Whether you send a dozen file transfers a week, hundreds a day, or even more, automation is a smart step for most businesses. The benefits are simple: automatic file transfers cut down on user errors, reduce or eliminate the need for scripts, free up manual time spent on...
Blog

How to Prevent Data Breaches with MFT | Checklist and Plan

  Image You know what a data breach looks like in the movies... A character’s computer is suddenly overtaken by lines of green code. Windows and browsers pop up at lightning speed, as if the PC is possessed and has its finger on the fast-forward button. The main characters give each other horrified looks. "We’re being hacked!" a...