Blog

Blog

Key MFT Protocols and Their Security Implications

Deciding how to securely send files doesn’t have to be difficult. There are plenty of file transfer protocols that can do the job efficiently and securely (as well as a few that should be out of consideration).File Transfer Protocols and Their Security ConsiderationsFTP (File Transfer ProtocolSecurity considerations: Transmission of files is unencrypted, and data is sent in plaintext (including...
Blog

GoAnywhere v7.8 Brings More Performance to File Transfers

What’s New in GoAnywhere? Version 7.8 Moves Closer to File Acceleration IntegrationGoAnywhere MFT has released v7.8, the latest version of the software Info-Tech rated #1 in the MFT sector for four years running. This latest release, along with new releases of Gateway and Agents, enhances security, performance, efficiency, and reliability.“Many customers are hitting network and performance...
Blog

How MFT Supports Data Governance

Managed File Transfer (MFT) solutions are designed to ensure that data is secure, controlled, and compliant as it moves between and within organizations. As such, they play a critical role in broader data governance policies and guidelines. What is Meant by Data Governance? Data governance can be described as the comprehensive process used to control the security, integrity, availability, use,...
Blog

What Is an SFTP Port and Why Does It Matter?

If you need to establish a secure connection between a client and server to transfer business-critical or sensitive files, an SFTP (Secure File Transfer Protocol) port is a strong choice for securing data in transit. The SFTP port is a network port used to establish a secure connection or communication channel between the client and the server. It ensures that during transit, data is encrypted...
Blog

Streamlining Government File Sharing with MFT

Efficiency: It’s a goal that’s permeating conversations in government circles at all levels lately (and other industries as well). Whether that aim is eliminating cumbersome processes or error-prone legacy systems, nearly every department and entity (including contractors working with government entities) are aiming for a more streamlined way of doing more with less – less effort, fewer personnel,...
Blog

NIS2 and DORA Updates: How MFT Helps Support Directives

Keeping up with the latest compliance or regulatory directives is vital to ensure your organization won’t run afoul of measures designed to keep your organization, your customers, and your trading partners safer from cybersecurity threats. This article outlines where two key directives: NIS2 and DORA stand today and why it’s important to be in compliance. As with any compliance measure introduced,...
Blog

SWIFT Members Increasingly Responsible for Security. MFT Can Help.

Global financial institutions rely on SWIFT every day to exchange information vital to secure payments. However, as members of The Society for Worldwide Interbank Financial Telecommunications (SWIFT) network know, the network alone isn’t enough to ensure safety. This is why SWIFT rolled out their Customer Security Program (CSP).Within the CSP, SWIFT has established a Customer Security Controls...
Blog

iPerf Test Throughput with UDP for Accurate Results

If you want to see how different protocols such as TCP or UDP perform when it comes to maximizing your network capacity, it’s important to test network throughput appropriately and with the correct mode engaged.TCP (Transmission Control Protocol) is a reliable protocol used most often for emails and web traffic. UDP (User Datagram Protocol) is the protocol most organizations rely upon when speed...
Blog

Meet Essential Eight Maturity Requirements with MFT

The purpose of Australia’s Essential Eight is to provide a clear, easy-to-follow set of guidelines that can be applied to protect Australian organizations and their information technology systems against cyberattacks.The Essential Eight Maturity Model helps support the implementation of Essential Eight principles and provides a transparent assessment of how easy an organization’s systems are to...
Blog

How MFT Supports the NIS2 Directive and Oct. 2024 update

If you are not yet up to speed on the latest developments around the European Union’s (EU) NIS2 Directive, get ready, as they go into effect Oct. 17, 2024. That’s when Member States are required to have transposed the directive into national law. EU countries must have their national legislation on par with the NIS2 requirements and comply with the new, broader requirements. This update aims to...
Blog

Folder Encryption Supports Financial Compliance

Encrypted Folders in MFT Can Help Meet Financial Industry Compliance RequirementsOrganizations in the financial sector that need to meet compliance requirements for PCI DSS, GLBA, or SOX can benefit from folder encryption functionality in their Managed File Transfer (MFT) solution. Utilizing folder encryption can help meet the mandate to encrypt sensitive data both in transit and at rest (or not ...
Blog

How Organizations Are Using MFT Today

Once housed in the echelons of “industry best practice,” managed file transfer (MFT) is now becoming common practice for organizations across any industry. Here are how some of those businesses are using MFT today to secure and automate their file transfers. Automation One of the most prominent uses for MFT is replacing manual processes and custom scripts with set-it-and-forget-it ways to manage...
Blog

Overcoming Distance and File Size When Transferring Files

How UDP-based Technology Helps with Long Distance and Large File Transfers “Relying on TCP-based file transfer protocols such as SFTP, HTTP, or FTPS on their own if you need to send files lightning-fast, from remote locations, or off-shore, can put you at a strategic disadvantage, as those protocols lack the acceleration and reliability of purpose...
Blog

How Are You Doing with PCI DSS v4.0 Compliance?

As of March 31, 2024, organizations in the payments industry will need to comply with all new PCI DSS v.4.0 requirements. Find out what the new obligations will be, how to tie them into your enterprise, and how Fortra can help.For many organizations, 2024 will be a big year. Aside from focusing on increasing revenues, market share, and demand, there...
Blog

How MFT Helps the Insurance Industry Secure Files

Insurance industry insiders know an insurance policy is one of the few products purchased that most people hope to never have to put to use. Afterall, “using” your insurance means that an adverse event has occurred – an auto accident, medical crisis, storm damage, or any number of situations where not having a policy in place could have huge financial...
Blog

Hardening Your MFT Environment: A File Security Essential

Congratulate yourself if you already have a secure, managed file transfer (MFT) solution in your organization. You’ve taken a proactive step towards addressing growing cybersecurity concerns around the exchange of your sensitive, often business-critical files.While robust file transfer solutions can offer security, automation, and a streamlined way to...
Blog

What is a TFTP Server?

What is a TFTP Server? TFTP, or Trivial File Transfer Protocol lives up to its name as it is a lightweight, simple protocol used to send files across a network. The server of this “trivial” protocol allows computers in and out of an organization’s network to exchange files using TFTP. As a lightweight protocol, there is less complexity, and therefore...
Blog

Building Strong Software Through Third-Party and Internal Testing

In my last post I wrote about protecting the supply chain and how strong bricks make strong walls, referencing how creating software with strong internal components and securely crafted code adds strength to the enterprises using that software. When considering any component being added into an environment, evaluating its security posture and attack...
Blog

On-Premises vs. Cloud: Which File Transfer Method is Best for You?

If your organization is debating between on-premises and cloud deployment for your business-critical file transfer needs, there are a few considerations around compliance, resources, and infrastructure to help you determine which option makes the most sense for your organization. “If you’re already using an on-premises solution, any discussion of a...