Blog

Blog

MFT Agents: Definition, Differences and Use Cases

  Image In GoAnywhere’s latest product release of its Managed File Transfer solution, MFT agent capabilities were introduced. The following resource aims to help readers understand what MFT agents are, the difference between a traditional MFT deployment and an MFT agent deployment and some example use cases. For further questions,...
Blog

The State of File Transfer Security

Note from the Editor: This article shares highlights from an older report. For the latest on data security and best practices for keeping file transfers safe, visit our Data Security page or check out the latest additions to our blog. The 2017 Cybersecurity Trends Report was recently released by Crowd Research Partners. The report covers many aspects of cybersecurity...
Blog

How to Create a Cybersecurity Policy for Your Organization

  Image The cyberattacks and data breaches that make the news are usually the ones that happen at big corporations like TJX or Home Depot. But every organization, large or small, needs to be concerned about cybersecurity. According to Security Magazine, the average cost of a data breach for a small business is between $36,000 and ...
Blog

TransferAgent Brings the Power of Filecatalyst to the Simplicity of a Web Browser

I just finished watching a webinar our president, John Tkaczewski, gave on the new version 4.9.9 of FileCatalyst Workflow and it was a great learning experience. He gave an in-depth overview of TransferAgent and outlined its features past and new. It was really interesting stuff, so I thought I would write a blog article that outlines some of these new features. Consider this a...
Blog

SSL and file transfers, the marriage of all marriages

The support team here at FileCatalyst team polled our customers who are using FileCatalyst Central v3.6 and asked what type of improvements they would like to see in our next release of Central. Security was a topic of interest to our customers, and they were asking us about the things we are doing in terms of security. With this in mind, we have taken steps with SSL that has...
Blog

Still Using SHA-1 to Secure File Transfers? It’s Time to Say Goodbye

  Image Securing information is rising in importance for organizations worldwide. Using outdated technology is extremely risky, yet many organizations continue to do so because of legacy systems that don’t allow them to upgrade, lack of resources and time to upgrade, or they are simply unaware of the risks. The commonly used SHA-1...
Blog

10 Shocking PCI DSS Compliance Statistics

If you work for any organization that processes credit or debit card information, you’ve heard of the Payment Card Industry Data Security Standard (PCI DSS), the regulatory standard aimed at preventing costly data breaches like the ones you may have heard about at Home Depot or TJX. But how much do you really know about PCI DSS compliance? Here are some interesting PCI DSS...
Blog

Moving Big Data in the Oil & Gas Industry

Did you know it takes over $100 million to drill a deep-water well? Holding true to the cliched phrase oil and gas companies know all too well: it takes money to make money. The deep digging associated with the oil and gas industry requires equally deep pockets. When it comes to making the big business decisions required in the oil and gas industry, major companies like Shell,...
Blog

No Such Thing as a Free File Transfer, Part 2: Cost-effective Security

    Image With new corporate data breaches in the news seemingly every day, it’s no surprise that security is a top concern for IT professionals. However, file transfers are an area where many companies are still vulnerable. Most file transfers still use FTP, a protocol that comes with inherent risks. Other common file transfer...
Blog

No Such Thing as a Free File Transfer, Part I: How MFT Saves Time

    Image   Every business engages in some kind of information exchange, whether it’s a small retailer attaching an invoice to an email or a hospital sending hundreds of patient records between departments. Some methods of exchanging files, like a basic FTP server or a file sharing app, seem like an inexpensive way to deal with...
Blog

The Benefits of File Transfer Automation

    Image Organizations today are challenged with maximizing their resources in a fiercely competitive environment. Benjamin Franklin famously said, “Lost time is never found again.” This is a problem that IT departments of all sizes have become familiar with. Take, for example, an IT staff member who spends countless hours...
Blog

How To: Change Emulation Mode in Internet Explorer to Load TransferAgent Properly

Any FileCatalyst application that previously used embedded Java applets in a browser has a migration path to FileCatalyst TransferAgent. Moving forward with this solution, we have been able to bring functionality of this product Google Chrome v42 and newer. Firefox v40 and newer. Internet Explorer v10 and newer. In Internet Explorer, users have found that the...
Blog

Four Modern Alternatives to FTP Explained

Read about the latest alternatives to FTP: Five Secure File Transfer Alternatives to FTP Today's data-driven world is demanding, requiring accuracy, speed, integrity and above all -- security. It's a tall order to fill, and in the past, many organizations relied heavily on the legacy FTP protocol to transmit files. But over time, FTP alternatives have become necessary...
Blog

Bringing content to life with Aframe

If you’ve ever tried to send a large video file, you know what a time consuming process it can be. For the production pros using Aframe – the world’s most powerful video collaboration platform – they need to transfer thousands of videos every day. Imagine how long this would take using standard FTP. Image Image ...
Blog

3 Steps to Safeguarding Company Data and Limiting Risk

  Image   Security professionals of today are inundated with headlines about the potential consequences of a data breach. Making headlines for a data breach can cost you – and more than just reparations or a fine. Data breaches are the worst of bad press and can impact your finances for years to come. As security...
Blog

Picking up right where we left off with the 2016 Rio Olympic Games

Over the years, we have had the privilege of working with many customers and partners who have benefited from the FileCatalyst technology and this year, that privilege continues. Once again, NBC Sports and FileCatalyst join forces to deliver seamless coverage of the 2016 Rio Olympic Games. During the Games, NBC Olympics will utilize FileCatalyst technology to move data over a...
Blog

SHA-2 and TLS Security for AS2 Transfers

  Image   SHA-2 and TLS Security for AS2 Transfers   It’s crucial for organizations to take the time to upgrade the security used to protect their AS2 data transfers. In order to be compliant with the latest security standards, you need to be using a modern AS2 solution. Related Reading: AS2 Protocol Software for Client & Server...
Blog

What is AS2? Common Protocol Explained

  Image For those that ask "What is AS2?," AS2 is an abbreviation for Applicability Statement 2, which is a popular file transfer protocol that allows businesses to exchange data with their trading partners. AS2 protocol combines the use of several secure and widely used technologies including HTTPS, SSL Certificates, S/MIME, and...
Blog

Teleportation, time travel and covered wagons

After the death of Leanord Nimoy this year, I found myself cruising the internet reading about him, about Star Trek, about sci-fi in general. I came across an article about teleportation that really caught my interest. This article pointed out that researchers had worked out how many bits of information were stored in a human being. It was an astounding 2.6 Tredecillion bits ...