Blog

Blog

Five Secure File Transfer Alternatives to FTP

Last Updated: 05/02/2024The Need for Secure File Transfer Protocols“FTP (File Transfer Protocol) served its purpose for its day, but it was never designed to offer up the level of security today’s organizations require, whether for compliance or to help prevent the enormous fiscal and reputational costs a data breach can bring about,” said Chris...
Blog

Which is Better: Free SFTP Software vs. Enterprise-Level SFTP Software?

Free SFTP Software vs. Enterprise-Level SFTP Solutions In general, people like free things. Beverages, company lunches, swag at tradeshows and conferences, t-shirts and socks, those intriguing items in the “For Free” box at your local yard sale… You can’t go wrong with free, right? Well, coffee you don’t have to pay for is great, but the adage “There’s no such thing as a free lunch” exists for a...
Blog

What is Secure File Transfer?

Moving sensitive, often-proprietary files from one person—or organization—to another has become a complex aspect of the business world today. This complexity comes not only from the size and number of files that need to be shared, but also from the need to protect them at all points during their journey from sender to receiver.Even though there are...
Blog

9 Ways to Use GoAnywhere’s Cloud Connector Integrations

There are many benefits to having a managed file transfer solution that supports built-in cloud integrations. From trading important files with business partners in Dropbox to automatically updating billing information in Salesforce from a central location, web app integrations in an MFT solution can simplify your critical file transfer and business...
Blog

Data Breach and Incident Response Plans | 2019 Templates & Best Practices

Every year, organizations hope that statistics for data breaches will improve, that things will be better than the year before. And every year, they are dismayed to discover that even though they’re pulling in new cybersecurity tactics to thwart cyber attacks, so are hackers pulling in new methods to discover their organizations’ weakest...
Blog

What is FTPS?

Whether you’re looking to upgrade from your current FTP file transfers or have new requirements from a trading partner or customer, you might be wondering what FTPS is. You may ask: how does FTPS work, and does it differ from secure file transfer protocols like SFTP and AS2?Good questions. Let’s start by defining what FTPS is. ...
Blog

Which is Better: SFTP vs. MFT?

SFTP, or MFT: that is the question.Even though we’re not all famous poets like William Shakespeare, many IT professionals will ask this question at some point or another. Should they use an SFTP or managed file transfer (MFT) solution to transfer sensitive files securely—and why?It brings up an interesting choice. By nature, SFTP and MFT solutions...
Blog

The Best Cybersecurity Strategies for Banks and Financial Organizations

Banks and financial institutions, take note: though the year is almost over, no one is safe from a data breach. Industries across the board have seen 4.5 million records stolen so far in 2018—a staggering 133% increase over those compromised in 2017.As you create updated cybersecurity plans and data breach prevention strategies for the new year, it’s...
Blog

Why You Should Cluster Your File Transfer Systems

What’s the true cost of downtime for your organization? You may think of it in terms of lost revenue—according to studies released in the last couple years, the average cost of system-wide downtime is $100,000 an hour, and that’s on the low end (it can get up to $300,000 or more). But there are other factors involved in the price of downtime that can...
Blog

Which is Better: SFTP vs. FTPS?

How do you transfer sensitive files? Business requirements and security standards have increased in recent years across industries and continents, but many organizations have struggled to keep up. Manual scripts, legacy tools, and single-use software are still utilized by IT and security teams despite their risks, causing more problems than they solve...
Blog

Introducing GoAnywhere MFT for AWS and Azure Cloud File Transfers

Are you looking for a solution that automates the movement of files between your on-premises and cloud environments? As cloud computing platforms become more commonplace, organizations are starting to shift their file transfer processes from in-house tools and scripts to secure solutions that promote strong cybersecurity practices, user management,...
Blog

SFTP: The Smart Way to Transfer Your Cloud Data

With the growing buzz about everything "cloud computing," most organizations are either starting to consider the cloud or have already moved some of their business processes to a cloud platform.No matter where you stand, technology is no stranger to the cloud. Consumers use cloud applications, services, and storage daily, while many organizations...
Blog

3 Ways Your Peers are Using Secure Forms

If you exchange any amount of sensitive information as paper documents, electronic PDFs, images, or spreadsheets, you know keeping track of data and ensuring it gets where it needs to go can be a challenge. And if you work with multiple parties to receive this information, like employees, vendors, clients, stakeholders, and trading partners, you also...
Blog

On-Premises and the Cloud: A Comparison of Two Unique Environments

On-premises. The cloud. Hybrid environments.As technology evolves and business needs grow, organizations are rapidly trying to make sense of their options. What are the benefits of running their software and data on-premises? What concerns should IT and security teams be aware of when implementing their processes in the cloud? Can they do a bit of both and go hybrid?There is no right or wrong...
Blog

15 Ways to Avoid Document Chaos with Secure Forms

Vendors, employees, customers, and trading partners exchange an abundance of files every day, often by a variety of means including mail, email, telecomm apps like Skype, shared file storage like Dropbox or Google Drive, and sometimes even SMS. While documents are an inescapable reality for busy organizations, keeping track of this data can be...
Blog

10 Essential Tips for Securing FTP and SFTP Servers

Most organizations use FTP or SFTP servers to exchange files and other critical business documents with their trading partners. Unfortunately, these servers have become a primary target for hackers, putting your FTP or SFTP server at risk of a costly data breach.Bob Luebbe, GoAnywhere Chief Architect at Fortra, hosted a webinar to help you ensure your...
Blog

Is Your Data REALLY Safe on the IBM i (AS/400)?

“AS/400 is built to be safe and reliable.”“No one makes viruses for the IBM i. There are no known cases of malware, either.”“IBM has amazing IBM i server security, so we don’t have to worry about vulnerabilities.”Do these statements sound familiar? Perhaps you’ve come across these claims in the industry, heard someone say something similar at an event...
Blog

Managed File Transfer: It's More than SFTP

For many, MFT and SFTP are a package deal. You can’t seem to have a managed file transfer solution without relying on an SFTP server to secure your file transfers. But this leaves a lot of people wondering—is managed file transfer only useful for SFTP file transfer automation?The reality is, MFT is far more than just an SFTP (SSH File Transfer...
Blog

5 Ways to Protect Your Financial Organization from a Data Breach

While several industries, including business and education, make up a big portion of yearly data breach counts, banks and credit unions aren’t left risk free. According to the Identity Theft Resource Center (ITRC), the banking/credit/financial sector totals 5.8% of 2017’s data breaches as of June 30, 2017. That’s up two percent from 2016’s first...
Blog

Are SSH Keys or Passwords Better for SFTP Authentication?

There are two popular methods of SFTP authentication: Using SSH keys and authentication. How do they work? Is one better or more secure than the other? Which is the best fit for your organization: SFTP with password or SSH Keys? Questioning what the best SFTP security best practice is doesn't have an easy answer. Both SSH keys and passwords have their...