Blog

Blog

5 Tips for Large File Transfers

It doesn't matter if you’re a small organization, a small-to-medium-sized (SMB) business, or an enterprise: at some point, you’ll likely need to exchange a large file transfer with a trading partner, third-party vendor, or client. If you don’t know how to support a large file transfer or lack the tools to execute it properly, this may be a stressful event—but it doesn’t have to be. Prepare now by...
Blog

What is Operation Yellowhammer and How Does it Affect Data Transfers?

What is Operation Yellowhammer? If you are located in the United Kingdom (UK), then you may already be familiar with Operation Yellowhammer and its relationship to Brexit and the European Union (EU). For those of you that haven’t been briefed on Operation Yellowhammer and how it relates to Brexit, now is the perfect time to learn how this newsworthy code name could possibly affect you and your...
Blog

Meeting IT Security and Compliance Requirements with GoAnywhere MFT

Meet your IT and compliance requirements easily with GoAnywhere MFT. GoAnywhere helps organizations and IT professionals comply with an array of strict regulations, methods, and technologies. To open a larger, clickable image, choose the "Download" option below. DOWNLOAD For more of an in-depth look into the areas GoAnywhere works with, explore our live demo ! Related Content: Watch our short...
Blog

Which is Better? - AS2 vs. AS4

AS2 vs. AS4 AS2 and AS4 are both popular file transfer protocols that allow businesses to exchange data securely with their business partners. However, what is the difference between them, and which of the two is better? What is AS2? AS2 (Applicability Statement 2) is a protocol specification that’s used to transmit sensitive data securely and reliably over the internet. Upgraded from AS1, the...
Blog

Why You Should Migrate from Your Current MFT Software

Is Your MFT Solution Keeping Up with Your File Transfer Requirements? With the increasing responsibilities IT professionals must juggle, including managing a myriad of daily tasks, addressing cybersecurity concerns, creating projects and business guidelines, meeting partner requests, and keeping abreast of compliance requirements, life is far too short for a file transfer solution that doesn’t...
Blog

GDPR: Understanding the 8 Rights of Data Subjects

Find out what these new rights mean for your organization and how you can prepare. GDPR (General Data Protection Regulation) is the EU’s new legal framework that replaced the EU Data Protection Directive in May 2018. While the directive was merely a recommendation, GDPR carries the force of law. The purpose of GDPR is similar to today’s Data Protection Directive. The regulation is designed to...
Blog

Think Your Customer Data was Exposed? Follow These Steps

When a prospect or customer shares personal data with a business, they expect their information will be stored securely, kept safe from vulnerabilities, and used only for the purposes with which it was collected. Whether this data is an email address, a birthday, a personal identifier, or credit card numbers, the weight of trust placed on this information is the same. With these expectations, it's...
Blog

Is FTP Dead?

Is FTP still a viable option for sending file transfers? While organizations across all industries have started shifting to secure FTP protocols like SFTP and FTPS, a surprising number of businesses still use FTP to transfer sensitive documents across internal and external networks. The search "how to use FTP" comes up with over 163 million results on Google, for example, versus only 29 million...
Blog

Why Choose Managed File Transfer Over Free File Sharing Methods?

Why Choose Managed File Transfer? It’s no secret that many organizations struggle to fully protect the sensitive data their employees, customers, trading partners, and third-party vendors share. Free file sharing software and scripts are both common ways of transferring files, even though they’re not necessarily the most secure, can be complex, and lack robust automation and security features...
Blog

New Zealand Healthcare Agencies Required to Eliminate Fax Machine Use and Secure Emails for Compliance by 2020

Here’s what you need to know in order to make the transition and achieve compliance with HISF Chapter 8 by 2020 Are you part of a health agency or healthcare organization in New Zealand that uses traditional fax machines or other insecure data transfer methods to share patient information and communications? If so, you’ll want to pay close attention to the January 2020 and December 2020 deadlines...
Blog

Top 5 Reasons to Try GoAnywhere’s ROI Calculator

You know you need a managed file transfer (MFT) solution. While you see the benefit in allowing IT staff to secure and automate file transfer tasks, you also need to demonstrate the investment value to get internal buy-in. This ROI calculator can help! Not only will it show you the value of GoAnywhere MFT and how much you could save vs. your current solution over 5 years, it will also give you a...
Blog

Are SFTP Files Encrypted?

The definitive answer to "Are SFTP Files Encrypted," is yes! SFTP , short for Secure Shell (SSH) File Transfer Protocol is a network protocol that organizations use to secure and send file transfers. SFTP is firewall-friendly, supports key-based authentication, encrypts usernames and passwords, and implements strong encryption algorithms. How does SFTP do all of this and handle file transfer...
Blog

I’ve Just Been Breached, Now What?

So, you think (or perhaps you know) you’ve been breached. It’s every organization’s nightmare, and you’re living it, facing local and federal fines, upset customers, public panic, and a loss of intellectual property. A breach can be a harrowing ordeal; if you’re not sure what to do immediately after discovering the breach, your situation can quickly get worse. Your first instinct may be to brush...
Blog

40 Cybersecurity User Groups, Forums & Communities to Join

What is the best cybersecurity resource? Answer: other people! Today more than ever, people are connecting with each other over shared problems and interests. Maybe there’s a particularly tricky problem that’s taunting you. Maybe you have exciting best practices to share with other professionals. Whether you’re a cybersecurity industry veteran, or only hear the word "firewall" when watching an...
Blog

7 Benefits of Using MFT for Encrypted File Transfers

7 Benefits of Using MFT for Encrypted File Transfers At minimum, a managed file transfer (MFT) solution is a product that encompasses all aspects of inbound and outbound file transfers while using industry-standard network protocols and seamless encryption. It can automate and transfer data across your network, systems, applications, trading partners, and cloud environments from a single, central...
Blog

Are SFTP and FTP the Same?

The Key Differences Between SFTP and FTP Are SFTP and FTP the same? While they originate from the same ballpark, the answer to this question is ultimately NO. Secure File Transfer Protocol or SSH File Transfer Protocol (SFTP) and File Transfer Protocol (FTP) are NOT the same thing. SFTP, not to be confused with FTP Secure (FTPS), is a network which allows file access, transfer, and management over...
Blog

Everything You Need to Know About Open PGP Encryption

What is Open PGP? PGP is the backbone of Open PGP. It is an open source standard that allows PGP to be used in software that is typically free to the public. The term "Open PGP" is often applied to tools, features, or solutions that support open source PGP Encryption technology. It is Internet Engineering Task Force (IETF) approved. Open PGP file encryption techniques enables you to store...
Blog

Automation Operations: 5 Benefits of Automation

Advantages of Automation Visions of a mechanized world flourished long before the term "automation" was coined. The star of Westinghouse’s exhibit at the 1939 World’s Fair was Electro, a robot that could walk, talk, and count on its fingers. Sadly, Electro and his kind were little more than demonstrations of remote control by human operators. By the early sixties, they had been replaced in the...
Blog

6 Ways to Get Internal Buy-In for Your MFT Solution

There are a lot of moving pieces that go into a product evaluation. You need to navigate through the myriad of options in today's marketplace, attend vendor demonstrations, try the software in a test environment to ensure it works as expected, request pricing and consider if the quote provided fits in your budget, and finally narrow it down to the solution you want to purchase. Unfortunately, that...
Blog

What is a DMZ and Why Do You Need a DMZ Secure Gateway?

If you’ve watched a science-fiction movie about space travel, then you’ve likely seen some version of a scene in which an astronaut reenters their ship from the outside abyss. Because the ship exists as a haven from the dangerous environment of empty space, the astronaut cannot simply open the door and stroll directly into the cockpit. To do so would compromise the human-compatible environment of...