Blog

Blog

Why Choose AS2 for Secure File Transfers?

Securing all the data your organization exchanges is a need, not a want in today’s cybersecurity environment. To minimize the risk of a security breach – whether intentionally malicious, or accidental through user error – takes the proverbial village of proactive measures. One of these is employing strong protocols such as AS2 (Applicability Statement 2) when exchanging files. AS2 should be a...
Blog

A Perfect Match: GoAnywhere MFT and Open PGP

As companies face increasing pressure to keep data safe, encryption protocols like Open PGP provide an increased level of security to do so. An open-source version of PGP (Pretty Good Protection), Open PGP delivers the same level of protection in a publicly available format. Because of its high availability, it enjoys widespread use. However, an encryption solution doesn’t stand alone: It needs to...
Blog

FTP 101: What are the Basics?

There's no shortage of shortage when choosing just the right FTP for your organization. Learn the differences and which FTP may be right for you.
Blog

AS2 Drummond Certified: GoAnywhere MFT Delivers Security and Interoperability

If you’re looking for a secure managed file transfer solution, why not check one out that has been recognized by the Drummond Group as AS2-certified? The AS2 features in Fortra' GoAnywhere Managed File Transfer (MFT) solution, were reviewed and tested against the world's highest standards, as set by the Drummond Group . Drummond AS2 Certification Highlights Full interoperability, Security This...
Blog

What is PGP Encryption and How to Use It

Encryption is key to securing organizational data in the short term and long. However, there are a few different types of encryption that organizations can use to achieve the optimal level of security. GnuPG is one of the most notable. However, today we’ll break down how PGP encryption works and how to use it to maintain the safety of your files . The Pros and Cons of PGP Encryption PGP, otherwise...
Blog

What is PGP and How Does It Work?

When someone in your organization wants to transfer a file – internally or outside of the organization – a few concerns may come up: Is the file complete? Is it being sent to the right place? Will it arrive intact? Is sensitive data protected and encrypted from unauthorized recipients? All are valid concerns, and each can be addressed with the help of encryption. By scrambling the data using one...
Blog

What is Drummond Certification?

Drummond Certification: What is it? The Drummond Group is a third-party certification body that certifies software products and solutions to ensure a given solution does what it says it will. A security solution that goes through their extensive certification process earns the right to add the Drummond-certified distinction to its product details. When it comes to file transfer solutions...
Blog

PGP vs. Open PGP: What’s the Difference?

Encryption standards become more and more important every day. With the rise of data breaches , it’s critical now more than ever for organizations to raise the level at which they protect their information. Partly, educating employees has presented itself as an easy way to make data safer. However, taking the time to choose the right method of encryption is the most effective way to make your data...
Blog

Should You Use PGP or GPG Encryption?

Not every piece of information is meant for every pair of eyes. That’s why organizations count on encryption technology – to lock down their sensitive data from malicious acquisition or even human error. And, when it comes to those encryption protocols, you’ve got options. One choice you or your IT team might need to make is whether to use PGP or GPG for your encryption standard. What is PGP...
Blog

AS2 vs. FTP

When it comes to B2B communications, AS2 and FTP rank among the most popular file transfer protocols. Each protocol can serve your business in a different way , which makes it important to examine your needs along the research journey. Today we’re going to examine AS2 vs. FTP by their key components to help you decide which file transfer protocol will serve you best. So, without further ado, let’s...
Blog

What is GPG?

What is GPG? GPG, also known as GNU Privacy Guard ( GnuPG ), is a different adaption, but popular implementation of the Open PGP standard as defined by RFC 4880 . GPG in Depth GPG is an open-source standard and strong alternative to the official PGP software owned by Symantec. It was developed by Werner Koch and released in 1999 as an alternative to Symantec’s software suite of encryption tools...
Blog

What's the Difference Between AS2, AS3, and AS4?

If you think these three protocols are simply sequential updates from the 1990s’ AS1 protocol you’d be mistaken. Each protocol brings its own distinct features to the data transmission table. Here’s a few key differences between them. What is AS2? AS2 (Applicability Statement 2) is a protocol specification used to transmit sensitive data securely and reliably over the internet. AS2 supports the...
Blog

Open PGP and GoAnywhere MFT: What You Need to Know

Which Solution is Right for You? Open PGP vs. GoAnywhere MFT If you have sensitive files that need to get from point A to Point B securely, you may have considered utilizing Open PGP or a managed file transfer solution, like GoAnywhere MFT. Do you know which option is the best fit for your organization? What is Open PGP? Open PGP is an encryption standard. It uses asymmetric (public key)...
Blog

Which is Better? - AS2 vs. AS4

AS2 vs. AS4 AS2 and AS4 are both popular file transfer protocols that allow businesses to exchange data securely with their business partners. However, what is the difference between them, and which of the two is better? What is AS2? AS2 (Applicability Statement 2) is a protocol specification that’s used to transmit sensitive data securely and reliably over the internet. Upgraded from AS1, the...
Blog

5 Benefits of PGP Decryption Using Managed File Transfer

If your trading partners or vendors require you to PGP encrypt or decrypt the files you exchange, you may be on the search for an affordable, trust-worthy PGP software to implement in your organization. The software you’re looking for may also need to support more than basic PGP decrypt and encrypt functionality. You may want it to include a key management system for PGP public and private keys...
Blog

Which is Better: AS2 vs. SFTP?

Over the last several months, we’ve compared many different file transfer protocols, including SFTP vs. FTPS and SFTP vs. MFT , and MFT vs. Dropbox for secure file sharing. Today, we’re going to look at AS2 vs. SFTP. How do these popular file transfer protocols work? How do they differ? And most importantly, which one is better for your organization’s file exchange requirements? Let’s dive in...
Blog

SHA-2 and TLS Security for AS2 Transfers

SHA-2 and TLS Security for AS2 Transfers It’s crucial for organizations to take the time to upgrade the security used to protect their AS2 data transfers. In order to be compliant with the latest security standards, you need to be using a modern AS2 solution. Related Reading: AS2 Protocol Software for Client & Server Transfers The Story of SHA-1 SHA-1 (Secure Hash Algorithm) is a cryptographic...
Blog

What is AS2? Common Protocol Explained

For those that ask "What is AS2?," AS2 is an abbreviation for Applicability Statement 2, which is a popular file transfer protocol that allows businesses to exchange data with their trading partners. AS2 protocol combines the use of several secure and widely used technologies including HTTPS , SSL Certificates , S/MIME, and file hashing. By utilizing the strengths of each of them, AS2 has become...
Blog

OpenPGP, PGP, and GPG: What is the Difference?

The privacy capabilities of encryption methods such as Pretty Good Privacy (PGP) allow organizations to achieve a hightened amount of data security and protection. There are various approaches and elements of comparison for these encryption methods , however, and each one comes with their own histories, features, and capabilities. These are: PGP, Open PGP, and GPG. Need to protect your files in...