Blog

Blog

5 Reasons to Consolidate Your File Transfer Processes with MFT

  Image There are many reasons organizations start using managed file transfer (MFT) solutions, but one of the most impactful is consolidation. MFT solutions are a great way to achieve and maintain data regulation compliance, automate new and ongoing file transfers, and gain greater insight into data movement and user access. ...
Blog

What is GPG?

  Image What is GPG? GPG, also known as GNU Privacy Guard (GnuPG), is a different adaption, but popular implementation of the Open PGP standard as defined by RFC 4880. GPG in Depth GPG is an open-source standard and strong alternative to the official PGP software owned by Symantec. It was developed by Werner Koch and released in...
Blog

How a Remote Workforce Impacts Your Data Security

  Image You did it. Many months ago, you sent your employees home armed with their laptops, a few passwords, and a couple of Zoom invites. Now, hunkered down in their stretchy, comfy clothes, thankful for not having to commute, they’re carrying on the day-to-day business responsibilities for your organization. But is it really...
Blog

SFTP and the Cloud: How to Transfer Your Data Securely

  Image Is SFTP Cloud Based? SFTP, Secure File Transfer Protocol, is a protocol used to transfer files between your organization, trading partners, and enterprise servers. It helps to establish a secure data connection and protect files in transit. SFTP can be used for your cloud file transfer needs, but also for any on-premises...
Blog

How to Implement the Right Enterprise File Sharing Solution

  Image Implementation 101 An enterprise file sharing solution is an important tool for organizations to have. The benefits are practically endless – from ensuring compliance with data regulations, to streamlining transfers with automation, to the auditing and reporting capabilities – implementing the right tool is key. However,...
Blog

iPaaS and MFT: What You Need to Know

Once upon a time, you carried an MP3 player to listen to music, a cell phone to text and make calls, and a book if you wanted to read. Video games and the internet? Best to use your preferred gaming device and home computer for those. Then came the smartphone – suddenly, everything is accessible from one location, and all you have to do is download the right app. Like a...
Blog

Why You Should Use File Encryption Software

  Image   File Encryption Software is “Key”   What is the key to keeping your data safe? One word: Encryption. There’s no question that encrypting sensitive data at rest and in motion is essential when it comes to guarding against cyber threats and complying with local, national, or industry-standard requirements. However, if you...
Blog

What to Consider When Choosing an MFT Solution

  Image A managed file transfer (MFT) solution simplifies your data security, automation, server-to-sever file transfers, and more. Organizations move from other file transfer methods to MFT solutions for various reasons, but mostly for some combination of: Centralization Time and money savings Increased security Whether your...
Blog

Why Businesses Need MFT

  Image Why Businesses Need MFT Reputations can be built or ruined in a matter of a few keystrokes. Just ask any business victimized by a data breach – either malicious or due to human error. The loss of reputation, trust, money, and time can be nearly incalculable. But, it’s not only a data breach that can severely impact a...
Blog

7 Benefits of Using Managed File Transfer (MFT)

  Image Moving beyond the scripts and programs you lovingly set up to carry your data around can be scary but, like pushing a baby bird out of the nest, it eventually becomes necessary. Instead of sending data “in the clear,” constantly fixing scripts, or mad dashes to pull together audit logs, switch to a secure file transfer method...
Blog

How Encryption Works: Everything You Need to Know

Image   What is Data Encryption? Encryption is a method of encoding data (messages or files) so that only authorized parties can read or access that data. Encryption software uses complex algorithms to scramble the data being sent. Once received, the data can be decrypted using a key provided by the originator of the message. The...
Blog

How GoAnywhere MFT Can Support You During COVID-19

  Image Virtual Hug Coming Your Way As workforces are now more remote than ever due to COVID-19, it’s not just lagging Wi-Fi you need to keep an eye on. Files containing your organization’s most sensitive data are being put to the test, most likely no longer within the safety of your company’s firewall and not secure enough to...
Blog

5 Projects You Could Tackle with a GoAnywhere Trial

  Image It's happened to us all – you start a free software trial, only to get stuck at step 2: what to do first? Plotting a plan of attack before your first login can help you get the most out of your limited time with the product (and might even help you down the line when you're making the case for adoption to your internal...
Blog

Open PGP and GoAnywhere MFT: What You Need to Know

  Image       Which Solution is Right for You? Open PGP vs. GoAnywhere MFT If you have sensitive files that need to get from point A to Point B securely, you may have considered utilizing Open PGP or a managed file transfer solution, like GoAnywhere MFT. Do you know which option is the best fit for your organization? What is...
Blog

5 Benefits of PGP Decryption Using Managed File Transfer

  Image If your trading partners or vendors require you to PGP encrypt or decrypt the files you exchange, you may be on the search for an affordable, trust-worthy PGP software to implement in your organization. The software you’re looking for may also need to support more than basic PGP decrypt and encrypt functionality. You may want...
Blog

How to Encrypt Files in Linux

  Image If your organization uses Linux operating systems to run key business processes, it’s important to implement tried-and-tested Linux security practices that support critical files as they transfer from one system to another. One requirement that pops up frequently for Linux users is file encryption. Linux files need to be...
Blog

GoAnywhere MFT Not Affected by EFAIL Vulnerabilities

  Image Ashland, NE, May 16, 2018 In light of the recent Open PGP & S/MIME warning (EFAIL), GoAnywhere has performed a software security review of its managed file transfer solution to ensure customers and their encrypted emails are not affected by this vulnerability. The review was positive and demonstrates that GoAnywhere MFT is...
Blog

How to Solve 4 Common Email Security Challenges

  Image Yes. Emailing someone is still one of the easiest ways to share data. However, there are some important caveats to sharing files this way that can put your organization’s file transfers at risk. Email File Transfer Challenges These are the four big challenges that organizations should be aware of when transmitting files via...
Blog

Meeting Compliance Regulations and Privacy Laws for Sensitive Data Transfers

  Image Comply with Data Security Requirements Highly sensitive data is exchanged between organizations on a constant basis making data security compliance more vital than ever to keep communication flowing. For instance, if a business routinely transmits financial information to their bank including payroll direct deposits and...