Blog

Blog

8 Surprising Ways to Use GoAnywhere's Secure Folders Module

    What is Secure Folders? Secure Folders is a licensed module GoAnywhere MFT offers its users. It provides access to authorized files and folders on the server or network location through a HTTPS Web Client. However, it can do so much more with its array of features. Read on to learn 8 surprising ways to use GoAnywhere’s Secure Folders module. 1....
Blog

Should You Use a File Sharing App?

  Should You Use a File Sharing App? File sharing apps like Dropbox and Google Drive certainly have their appeal. They are user-friendly, often free, and do the job of getting information from one user to another. Until they don’t. Or, until your files are hacked, get into the wrong hands, live in infamy, have unrestricted access, or are manipulated...
Blog

7 Essential Resources on PCI DSS Security

  Note from the Editor: This article was originally published in February 2017. It has been updated with resources current to PCI DSS version 3.2.1. Did you know that 80% of organizations are not compliant with PCI DSS requirements? That means, if you’re reading this, there’s a pretty good chance your company needs to make adjustments to...
Blog

What is Secure File Sharing?

  What is Secure File Sharing? Secure is the operative word here. Dozens of applications allow you to transfer files – small to large – between different users or organizations. A secure file transfer solution, at its most basic, secures the movement of files while at rest and in transit confidentially – all within a protected mode. Secure file...
Blog

Need a Cloud-Based MFT Environment? Try a Hybrid Cloud Setup

  Cloud integration is growing in popularity, but committing 100% to the cloud isn’t always practical or secure for organizations. If you’re in the market for cloud-based solutions, read our quick overview below. For a more comprehensive exploration of when to choose a hybrid cloud and how keep your data encrypted through and after the transition to a...
Blog

Why Choose Managed File Transfer Over Free File Sharing Methods?

  Why Choose Managed File Transfer? It’s no secret that many organizations struggle to fully protect the sensitive data their employees, customers, trading partners, and third-party vendors share. Free file sharing software and scripts are both common ways of transferring files, even though they’re not necessarily the most secure, can be complex, and...
Blog

What is a DMZ and Why Do You Need a DMZ Secure Gateway?

  If you’ve watched a science-fiction movie about space travel, then you’ve likely seen some version of a scene in which an astronaut reenters their ship from the outside abyss. Because the ship exists as a haven from the dangerous environment of empty space, the astronaut cannot simply open the door and stroll directly into the cockpit. To do so would...
Blog

Why You Should Never Use FTP to Transfer Cloud Files

  The cloud has become an increasingly popular topic among organizations in recent years. From sharing projects via cloud collaboration tools to exchanging files between a company and its trading partners using cloud storage buckets, cloud computing platforms like Microsoft Azure and AWS offer users a lot of flexibility over their day-to-day business...
Blog

9 Ways to Use GoAnywhere’s Cloud Connector Integrations

  There are many benefits to having a managed file transfer solution that supports built-in cloud integrations. From trading important files with business partners in Dropbox to automatically updating billing information in Salesforce from a central location, web app integrations in an MFT solution can simplify your critical file transfer and business...
Blog

Introducing GoAnywhere MFT for AWS and Azure Cloud File Transfers

  Are you looking for a solution that automates the movement of files between your on-premises and cloud environments? As cloud computing platforms become more commonplace, organizations are starting to shift their file transfer processes from in-house tools and scripts to secure solutions that promote strong cybersecurity practices, user management,...
Blog

SFTP: The Smart Way to Transfer Your Cloud Data

  With the growing buzz about everything "cloud computing," most organizations are either starting to consider the cloud or have already moved some of their business processes to a cloud platform. No matter where you stand, technology is no stranger to the cloud. Consumers use cloud applications, services, and storage daily, while many organizations...
Blog

3 Ways Your Peers are Using Secure Forms

  If you exchange any amount of sensitive information as paper documents, electronic PDFs, images, or spreadsheets, you know keeping track of data and ensuring it gets where it needs to go can be a challenge. And if you work with multiple parties to receive this information, like employees, vendors, clients, stakeholders, and trading partners, you also...
Blog

On-Premises and the Cloud: A Comparison of Two Unique Environments

On-premises. The cloud. Hybrid environments. As technology evolves and business needs grow, organizations are rapidly trying to make sense of their options. What are the benefits of running their software and data on-premises? What concerns should IT and security teams be aware of when implementing their processes in the cloud? Can they do a bit of both and go hybrid? There is no right or wrong...
Blog

15 Ways to Avoid Document Chaos with Secure Forms

  Vendors, employees, customers, and trading partners exchange an abundance of files every day, often by a variety of means including mail, email, telecomm apps like Skype, shared file storage like Dropbox or Google Drive, and sometimes even SMS. While documents are an inescapable reality for busy organizations, keeping track of this data can be...
Blog

5 Cloud Security Best Practices for Microsoft Azure

  Migrating company data to the cloud is often a primary goal for modern organizations. In fact, by 2018, 60% of organizations’ IT infrastructure will be cloud-based, according to IDG’s Enterprise Cloud Computing Survey. Cloud infrastructure comes with many benefits, including—but not limited to—reducing IT budgets, improved data security, endless...
Blog

5 Best Practices for IBM i File Transfers

  Using IBM’s built-in FTP and Open SSH servers to transfer files to and from your IBM i systems can be time-consuming, if not simply riddled with fine details. From scripting knowledge to running specific (and sometimes obscure) commands, there’s a lot to consider—and the safety and integrity of your files is probably at the top of the list. While...
Blog

30 Ways to Simplify Life with Advanced Workflows

  Are you using GoAnywhere’s Advanced Workflows yet? If not, you’re missing out. What are Workflows? Workflows are projects you can create in GoAnywhere MFT to define your file transfers and improve your business processes. Each project is able to contain multiple tasks that execute in a seamless end-to-end workflow. Pretty neat, right? Why Use...
Blog

7 Cloud Security Best Practices for Amazon Web Services

  Temporary and permanent storage of data in the cloud has grown in popularity over the years. Companies like Land O’Lakes and Boeing moved their information to the cloud last year to simplify the technology they used. Video-streaming behemoth Netflix finished their journey to the cloud in early 2016 after seven years of moving systems and customer...
Blog

How to Create a Cybersecurity Policy for Your Organization

  The cyberattacks and data breaches that make the news are usually the ones that happen at big corporations like TJX or Home Depot. But every organization, large or small, needs to be concerned about cybersecurity. According to Security Magazine, the average cost of a data breach for a small business is between $36,000 and $50,000. And while the...
Blog

10 Shocking PCI DSS Compliance Statistics

If you work for any organization that processes credit or debit card information, you’ve heard of the Payment Card Industry Data Security Standard (PCI DSS), the regulatory standard aimed at preventing costly data breaches like the ones you may have heard about at Home Depot or TJX. But how much do you really know about PCI DSS compliance? Here are some interesting PCI DSS compliance statistics...