Blog

Blog

Eight Hacks You Can Implement to Combat "Hackable" Network Vulnerabilities

Although we’re becoming savvier to the tricks hackers have pulled in the past, they are still working to up their game and catch us where and when we least expect it. Fortunately, there are some solid guidelines you can follow in order to keep your organization’s data from hollering "Hack Me!" at the top of its lungs. It’s important to avoid these eight common cybersecurity mistakes and...
Blog

Everything You Need to Know About SFTP Automation

There are many file transfer protocols that organizations could use within their workflows. But most likely, organizations are simply looking for a way to automate their file transfers . Whether you send a dozen file transfers a week, hundreds a day, or even more, automation is a smart step for businesses. The benefits are simple: automatic file transfers cut down on user errors, reduce or...
Blog

How SFTP Works

How does SFTP work? When you need to secure server-to-server file transfers between yourself, your trading partners, and enterprise servers, SFTP (which stands for SSH File Transfer Protocol or Secure File Transfer Protocol) is a more secure option than FTP. Secure File Transfer Protocol (SFTP) works over the Secure Shell (SSH) data stream to establish a secure connection and provide organizations...
Blog

5 Benefits of PGP Decryption Using Managed File Transfer

If your trading partners or vendors require you to PGP encrypt or decrypt the files you exchange, you may be on the search for an affordable, trust-worthy PGP software to implement in your organization. The software you’re looking for may also need to support more than basic PGP decrypt and encrypt functionality. You may want it to include a key management system for PGP public and private keys...
Blog

How to Think like a Hacker and Secure Your Data [Webinar Recap]

There’s no denying that data breach incidents are becoming more common each and every day. Organizations continue to work tirelessly to combat looming threats with the latest cybersecurity best practices and technology. However, the larger the volumes of sensitive information being collected, processed, and shared, the greater the chance is of getting hit by a critical cyber threat. This also...
Blog

What’s the Difference Between GoAnywhere 6.0 and 6.1?

We’re excited to share that GoAnywhere 6.1 is now available for download! The newest version of our managed file transfer solution includes over 30 new features , such as X12 data translation and a built-in data mapping tool for centralized encryption and EDI, along with many additional enhancements that our customers have requested. Many of our GoAnywhere customers have asked what’s new and...
Blog

How to Encrypt Files in Linux

If your organization uses Linux operating systems to run key business processes, it’s important to implement tried-and-tested Linux security practices that support critical files as they transfer from one system to another. One requirement that pops up frequently for Linux users is file encryption. Linux files need to be encrypted seamlessly and quickly to prevent critical business data from being...
Blog

Everything You Need to Know about FTP Automation Software

So, you want to automate your FTP file transfers. Whether you send a dozen file transfers a week, hundreds a day, or even more, automation is a smart step for most businesses. The benefits are simple: automatic file transfers cut down on user errors, reduce or eliminate the need for scripts, free up manual time spent on creating and maintaining jobs, and most importantly, get files where they need...
Blog

How to Prevent Data Breaches with MFT | Checklist and Plan

You know what a data breach looks like in the movies... A character’s computer is suddenly overtaken by lines of green code. Windows and browsers pop up at lightning speed, as if the PC is possessed and has its finger on the fast-forward button. The main characters give each other horrified looks. "We’re being hacked!" a side character shouts, and then alarms and red lights blare across the...
Blog

The Pros and Cons of Open Source Managed File Transfer Software

There comes a day for many companies when it’s time to implement a managed file transfer (MFT) solution . Perhaps there are new compliance requirements to meet, new relationships with third parties and customers requiring advanced data exchange, or escalated internal needs among teams. Regardless of the reason, the option of using open source managed file transfer software will likely arise. Many...
Blog

Which is Better: AS2 vs. SFTP?

Over the last several months, we’ve compared many different file transfer protocols, including SFTP vs. FTPS and SFTP vs. MFT , and MFT vs. Dropbox for secure file sharing. Today, we’re going to look at AS2 vs. SFTP. How do these popular file transfer protocols work? How do they differ? And most importantly, which one is better for your organization’s file exchange requirements? Let’s dive in...
Blog

Who’s Leading the Managed File Transfer Data Quadrant?

Note from the Editor: This article shares highlights from the 2019 Info-Tech Category Report. Read our articles about the 2020 report , 2021 report , or download the latest copy . For most IT professionals, finding credible, third-party evaluations is critical when researching new software solutions. You want the most comprehensive, honest information you can find to help you decide if a solution...
Blog

PGP vs. GPG: What's the Difference?

PGP, GPG, GnuPG, Open PGP. These terms file under the same category but refer to slightly different things. If you’re wondering what they mean or what the difference is between them, especially PGP vs. GPG, you’re not alone! Read this article to get a better feel for these standards and their nuances. PGP – Pretty Good Privacy PGP stands for Pretty Good Privacy. It was created in the 1990s and is...
Blog

16 Surprising Facts about Managed File Transfer

Whether you’re already using a managed file transfer (MFT) product or are evaluating your options, the many features and capabilities of MFT software will likely surprise you—in a good way! As businesses find they increasingly need to share data internally and externally, a solution like GoAnywhere MFT offers an easy-to-use platform that protects sensitive information and improves overall...
Blog

Why You Should Never Use FTP to Transfer Cloud Files

The cloud has become an increasingly popular topic among organizations in recent years. From sharing projects via cloud collaboration tools to exchanging files between a company and its trading partners using cloud storage buckets, cloud computing platforms like Microsoft Azure and AWS offer users a lot of flexibility over their day-to-day business processes. These platforms, however, are not free...
Blog

Public Defender’s Office Reduces Manual Data Entry with Secure File Transfer Software

Every organization has legacy processes. Manual data entry, file cabinets full of paper records, sensitive documents sent across the organization by email, or even file transfers sent via homegrown scripts or FTP—all these processes can cause more headaches than their worth. Unfortunately, implementing a new strategy to replace a legacy one isn’t always as easy as saying "let’s do it!" Sometimes...
Blog

Five Secure File Transfer Alternatives to FTP

The Need for Secure File Transfer Protocols Back in the day, File Transfer Protocol (FTP) was the go-to protocol for sending files. It was a simpler time, and security was far less of an issue than it is today. But as hackers have gotten more sophisticated, they have discovered FTP’s lack of security. They know there’s a limited way for FTP to ensure the identity of the person accessing files...
Blog

Which is Better: Free SFTP Software vs. Enterprise-Level SFTP Software?

Free SFTP Software vs. Enterprise-Level SFTP Solutions In general, people like free things. Beverages, company lunches, swag at tradeshows and conferences, t-shirts and socks, those intriguing items in the “For Free” box at your local yard sale… You can’t go wrong with free, right? Well, coffee you don’t have to pay for is great, but the adage “There’s no such thing as a free lunch” exists for a...
Blog

What is Secure File Transfer?

Moving sensitive, often-proprietary files from one person—or organization—to another has become a complex aspect of the business world today. This complexity comes not only from the size and number of files that need to be shared, but also from the need to protect them at all points during their journey from sender to receiver. Even though there are excellent solutions available for secure file...
Blog

9 Ways to Use GoAnywhere’s Cloud Connector Integrations

There are many benefits to having a managed file transfer solution that supports built-in cloud integrations. From trading important files with business partners in Dropbox to automatically updating billing information in Salesforce from a central location, web app integrations in an MFT solution can simplify your critical file transfer and business processes even more than usual. Last year, the...