Blog

Blog

Is Dropbox Secure?

  Image When it comes to file sharing software, Dropbox is often top of mind: many individuals and organizations use it to simplify their file sharing, syncing, and collaboration. But how secure is Dropbox, and is it right for your organization? To break down Dropbox security effectively, we’ll explain what Dropbox is.   What is...
Blog

Signs Your Business is Ready for an Enterprise File Transfer Solution

  Image Follow the Signs If you and your enterprise are needing to regularly transfer sensitive data between users, employees, and trading partners, it’s important to follow the signs. One wrong move, such as the lack of file encryption for transfers, can hit your organization with huge fines for non-compliance. It’s important to...
Blog

Top 3 Things to Look for in a Remote Collaboration Tool

  Image   Feel Like You're Working Together — Even From Apart Finding the best way to securely collaborate on and share files can be difficult in the best of times. With large swathes of people working from home for the first time, finding the solution that meets your business requirements is paramount. Content collaboration...
Blog

What are Data Silos?

  Image   Standing alone can be an uncomfortable feeling at any gathering. You may only hear part of a conversation; you might not mesh well with the others in the room; you could face a number of awkward silences, and even be rejected completely.   Feeling like a lone wolf at a party is discomforting for sure. Having critical...
Blog

What is EFSS?

  Image If you’ve ever had to MacGyver a way to send out a too-large file or work with a group of people on a single document, EFSS is probably what you were looking for to make the process painless: it’s a solution that makes sharing files (of any size) and collaborating in one place easy – and secure. EFSS stands for Enterprise...
Blog

Benefits of a Content Collaboration Platform

  Image   Once upon a time, an organization’s valuable content lived in file drawers with neat little tabbed folders. It also lived on top of desks and on desktops. It lived in saved emails, cloud storage services, and even was embedded in texts. When it was time to share that content however, finding it, working with it, and...
Blog

How Does the DMZ Impact Security?

  Image Your Secret Weapon for Data Security When weapons and military forces have been removed from active duty, this is referred to as “demilitarization.” On the internet, the demilitarized zone, or the DMZ, is a similar situation. What is the DMZ? The DMZ is the neutral network that resides between the Internet and your...
Blog

4 Benefits of On-premises Enterprise File Sync and Sharing

  Image The value of mission-critical business documents can't be overstated — but lax or renegade employees or trading partners can put your sensitive data at risk with reckless storage or sharing practices. Luckily, knowing that your data hasn't been exposed is as easy as implementing a secure Enterprise File Sync and Share (EFSS)...
Blog

User Sharing and Collaboration: Security Concerns, Risks, and How to Securely Collaborate

  Image Collaboration in the Workspace Secure collaboration tools that permit the sharing of sensitive data between users are quickly gaining momentum in the world of technology and file transfer. Although there are many benefits to utilizing these tools in the workspace, with user sharing and secure collaboration comes security...
Blog

What's the Difference Between AS2, AS3, and AS4?

  Image If you think these three protocols are simply sequential updates from the 1990s’ AS1 protocol you’d be mistaken. Each protocol brings its own distinct features to the data transmission table. Here’s a few key differences between them. What is AS2? AS2 (Applicability Statement 2) is a protocol specification used to transmit...
Blog

8 Surprising Ways to Use GoAnywhere's Secure Folders Module

  Image   What is Secure Folders? Secure Folders is a licensed module GoAnywhere MFT offers its users. It provides access to authorized files and folders on the server or network location through a HTTPS Web Client. However, it can do so much more with its array of features. Read on to learn 8 surprising ways to use GoAnywhere’s...
Blog

Should You Use a File Sharing App?

  Image Should You Use a File Sharing App? File sharing apps like Dropbox and Google Drive certainly have their appeal. They are user-friendly, often free, and do the job of getting information from one user to another. Until they don’t. Or, until your files are hacked, get into the wrong hands, live in infamy, have unrestricted...
Blog

What is Secure File Sharing?

  Image What is Secure File Sharing? Secure is the operative word here. Dozens of applications allow you to transfer files – small to large – between different users or organizations. A secure file transfer solution, at its most basic, secures the movement of files while at rest and in transit confidentially – all within a protected...
Blog

Open PGP and GoAnywhere MFT: What You Need to Know

  Image       Which Solution is Right for You? Open PGP vs. GoAnywhere MFT If you have sensitive files that need to get from point A to Point B securely, you may have considered utilizing Open PGP or a managed file transfer solution, like GoAnywhere MFT. Do you know which option is the best fit for your organization? What is...
Blog

Which is Better? - AS2 vs. AS4

  Image   AS2 vs. AS4   AS2 and AS4 are both popular file transfer protocols that allow businesses to exchange data securely with their business partners. However, what is the difference between them, and which of the two is better? What is AS2? AS2 (Applicability Statement 2) is a protocol specification that’s used to transmit...
Blog

Why Choose Managed File Transfer Over Free File Sharing Methods?

  Image Why Choose Managed File Transfer? It’s no secret that many organizations struggle to fully protect the sensitive data their employees, customers, trading partners, and third-party vendors share. Free file sharing software and scripts are both common ways of transferring files, even though they’re not necessarily the most...
Blog

What is a DMZ and Why Do You Need a DMZ Secure Gateway?

  Image If you’ve watched a science-fiction movie about space travel, then you’ve likely seen some version of a scene in which an astronaut reenters their ship from the outside abyss. Because the ship exists as a haven from the dangerous environment of empty space, the astronaut cannot simply open the door and stroll directly into...
Blog

5 Benefits of PGP Decryption Using Managed File Transfer

  Image If your trading partners or vendors require you to PGP encrypt or decrypt the files you exchange, you may be on the search for an affordable, trust-worthy PGP software to implement in your organization. The software you’re looking for may also need to support more than basic PGP decrypt and encrypt functionality. You may want...
Blog

Which is Better: AS2 vs. SFTP?

Over the last several months, we’ve compared many different file transfer protocols, including SFTP vs. FTPS and SFTP vs. MFT, and MFT vs. Dropbox for secure file sharing. Today, we’re going to look at AS2 vs. SFTP. How do these popular file transfer protocols work? How do they differ? And most importantly, which one is better for your organization’s file exchange...
Blog

3 Ways Your Peers are Using Secure Forms

  Image If you exchange any amount of sensitive information as paper documents, electronic PDFs, images, or spreadsheets, you know keeping track of data and ensuring it gets where it needs to go can be a challenge. And if you work with multiple parties to receive this information, like employees, vendors, clients, stakeholders, and...