Blog

Blog

Why a SaaS Solution Can Benefit Your Company

SaaS – or Software as a Service – is one of the most common uses of the cloud. Think your personal Gmail, where you can access your email but you don’t need to host the software on your personal machine or maintain the software – let alone the hardware hosting it. Simply connect to the cloud-based application over the internet, use it, and log back...
Blog

What are Data Silos?

Standing alone can be an uncomfortable feeling at any gathering. You may only hear part of a conversation; you might not mesh well with the others in the room; you could face a number of awkward silences, and even be rejected completely.Feeling like a lone wolf at a party is discomforting for sure. Having critical data siloed and inaccessible at your...
Blog

What is EFSS?

If you’ve ever had to MacGyver a way to send out a too-large file or work with a group of people on a single document, EFSS is probably what you were looking for to make the process painless: it’s a solution that makes sharing files (of any size) and collaborating in one place easy – and secure.EFSS stands for Enterprise File Syncing and Sharing, also...
Blog

Benefits of a Content Collaboration Platform

Once upon a time, an organization’s valuable content lived in file drawers with neat little tabbed folders. It also lived on top of desks and on desktops. It lived in saved emails, cloud storage services, and even was embedded in texts. When it was time to share that content however, finding it, working with it, and sending it along often...
Blog

How Does the DMZ Impact Security?

Your Secret Weapon for Data SecurityWhen weapons and military forces have been removed from active duty, this is referred to as “demilitarization.” On the internet, the demilitarized zone, or the DMZ, is a similar situation.What is the DMZ?The DMZ is the neutral network that resides between the Internet and your organization’s private network. It’s...
Blog

What is NIST?

NIST, the National Institute of Standards and Technology, is a lab and non-regulatory federal agency of the U.S. Department of Commerce. Founded in 1901 as a tool to boost the U.S.'s global competitiveness, NIST fosters efforts to create standards across technology systems. Today, NIST continues to push for innovation in a variety of industries and...
Blog

4 Benefits of On-premises Enterprise File Sync and Sharing

The value of mission-critical business documents can't be overstated — but lax or renegade employees or trading partners can put your sensitive data at risk with reckless storage or sharing practices. Luckily, knowing that your data hasn't been exposed is as easy as implementing a secure Enterprise File Sync and Share (EFSS) solution. There are...
Blog

User Sharing and Collaboration: Security Concerns, Risks, and How to Securely Collaborate

Collaboration in the WorkspaceSecure collaboration tools that permit the sharing of sensitive data between users are quickly gaining momentum in the world of technology and file transfer.Although there are many benefits to utilizing these tools in the workspace, with user sharing and secure collaboration comes security concerns and a variety of...
Blog

How GoAnywhere MFT Can Help You Transition to the Cloud

Doing business via the cloud is the new normal for many organizations, so it’s important to consider how you’ll manage the transition to the cloud when you’re ready to make the move – either entirely or simply for a few key business processes. Without a secure cloud file transfer solution in place, your valuable data could be at risk.The cloud...
Blog

What are the Secure Messaging Standards in Australia?

Secure Messaging in HealthcareHealthcare is essential to live a healthy life, but it shouldn’t come at the expense of your privacy.Healthcare is an industry that will always be growing, which means that if your situation transitions to a place where you need to see a new doctor or a specialist, your very private and personal health records will need...
Blog

How Advanced Workflows Goes Beyond the Surface

Imagine taking one of your monstrous, days-long tasks and condensing it into just a few clicks. With Advanced Workflows, you can do just that: set up a task once and let GoAnywhere MFT do the rest. The full scope of Advanced Workflows is vast; dive deep into this popular Project-builder that helps you automate and manipulate data movement throughout...
Blog

What is the California Consumer Privacy Act?

The California Consumer Privacy Act (CCPA), the latest data privacy law in the Golden State, went into effect on January 1st, 2020. Some have compared it to the UK’s GDPR (General Data Protection Regulation), and they’re not far off – like the GDPR, the CCPA is intended to protect individuals’ private data by making data collection and usage more...
Blog

8 Surprising Ways to Use GoAnywhere's Secure Folders Module

What is Secure Folders? Secure Folders is a licensed module GoAnywhere MFT offers its users. It provides access to authorized files and folders on the server or network location through a HTTPS Web Client. However, it can do so much more with its array of features. Read on to learn 8 surprising ways to use GoAnywhere’s Secure Folders module....
Blog

What is PIPEDA?

PIPEDA, the Personal Information Protection and Electronic Documents Act, is a privacy law that applies to private-sector organizations and businesses throughout Canada.The goal of PIPEDA is to ensure that all provinces and territories protect personal data. This includes:Asking for and obtaining consent when an individual’s information is initially...
Blog

How Banks are Benefiting from MFT Integration

Trying to integrate and tie diverse internal and external banking applications, branches, systems and trading partners together so they work seamlessly with internal and central banking applications can have your IT department constantly untangling complex knots to ensure transactions and information flows easily.There is a way to untangle this...
Blog

PDPA in Singapore Helps Protect Personal Data

What is the PDPA of 2012?The Personal Data Protection Act of 2012 (PDPA) is a law designed to regulate and enforce the proper collection, use, disclosure, and care of the personal data of citizens in the Republic of Singapore. The Personal Data Protection Commission (PDPC) is charged with establishing policies and for reviewing organizational actions...
Blog

Should You Use a File Sharing App?

Should You Use a File Sharing App?File sharing apps like Dropbox and Google Drive certainly have their appeal. They are user-friendly, often free, and do the job of getting information from one user to another. Until they don’t.Or, until your files are hacked, get into the wrong hands, live in infamy, have unrestricted access, or are manipulated...
Blog

7 Essential Resources on PCI DSS Security

Note from the Editor: This article was originally published in February 2017. It has been updated with resources current to PCI DSS version 3.2.1.Did you know that 80% of organizations are not compliant with PCI DSS requirements? That means, if you’re reading this, there’s a pretty good chance your company needs to make adjustments to ensure a fully...
Blog

What is Secure File Sharing?

What is Secure File Sharing?Secure is the operative word here. Dozens of applications allow you to transfer files – small to large – between different users or organizations. A secure file transfer solution, at its most basic, secures the movement of files while at rest and in transit confidentially – all within a protected mode.Secure file transfer...
Blog

Need a Cloud-Based MFT Environment? Try a Hybrid Cloud Setup

Cloud integration is growing in popularity, but committing 100% to the cloud isn’t always practical or secure for organizations. If you’re in the market for cloud-based solutions, read our quick overview below. For a more comprehensive exploration of when to choose a hybrid cloud and how keep your data encrypted through and after the transition to a...