Detailed Features in GoAnywhere MFT
Listed below are the detailed features in GoAnywhere MFT, which is shown with all the licensed options.
Text
| SFTP - FTP over SSH |
|---|
| FTPS - FTP over SSL/TLS |
| SCP - Secure Copy over SSH |
| Standard FTP |
| HTTP/s |
| AS2, AS3, and AS4 |
| PeSIT Server and Client connectivity |
| File Transfer Acceleration |
| MQ/JMS |
| Email (SMTP, POP3, IMAP) |
| ICAP for DLP and AntiVirus scanning |
Operating Systems Supported |
|---|
| Windows Server 2012, 2016, and 2019 |
| Windows 8, and 10 |
| Linux (Red Hat, SUSE, Ubuntu, CentOS, etc.) |
| UNIX |
| AIX for IBM Power Systems |
| IBM i (AS/400, iSeries) |
| HP-UX |
| Solaris |
| Mac OS X |
| Docker |
Virtualized Environments |
|---|
| VMware Ready (certified) |
| Microsoft Hyper-V |
| IBM Power VM |
| Amazon EC2 |
| Microsoft Azure |
| MFTaaS |
Administration |
|---|
| Browser based administration (no PC install) |
| Secure access over HTTPS |
| Remote configuration and monitoring |
| Domains for multiple security zones |
| Intuitive dashboard with quick links, statistics and analytics |
| Dashboard gadgets with custom settings and layouts |
| Graphical screens with point-n-click wizards |
| Context sensitive help text |
| Separation of duties (role-based permissions for admins) |
Browsers Supported |
|---|
| Microsoft Internet Explorer |
| Microsoft Edge |
| Mozilla Firefox |
| Google Chrome |
| Apple Safari |
User Account Creation |
|---|
| Create accounts using templates |
| Import accounts from CSV or XML files |
| Self-register accounts with optional approval process |
| Allow users to invite others to register |
| Create accounts through API calls from external apps |
User Authentication Methods |
|---|
| Active Directory (AD) |
| LDAP |
| IBM i user profiles |
| SAML for single sign-on |
| RADIUS RSA SecurID |
| Kerberos Authentication for GoAnywhere Desktop Client and the Secure Mail Outlook Plugin |
| GoAnywhere database |
| SSL certificates (X.509 Standard) |
| SSH public keys |
| Two-Factor Authentication |
| Time-based One-Time Passwords |
Password Security |
|---|
| Password strength policy (min length, special char, etc.) |
| Password age enforcement (min/max number of days) |
| Password history (disallow reuse of prior passwords) |
| Password expiration intervals (in days) |
| Password expiration email notifications |
| Administrator can force password reset |
| User can be allowed to change own password |
User Account Security |
|---|
| Authorize services (SFTP, HTTPS, etc.) per user |
| Adopt user permissions from groups |
| Configure IP whitelists (allowable IPs) per user |
| Time out sessions after X seconds of inactivity |
| Expire temporary accounts on specific dates |
| Auto-disable user accounts after X invalid login attempts |
| Auto-disable user accounts with no activity in X days |
| Manually disable user accounts |
| Limit or disable anonymous access |
Folder Configurations |
|---|
| Auto create folders using variables and/or constants |
| Virtual file and folder names (user friendly aliases) |
| Defined on user, group and template levels |
| Unlimited subfolders |
Folder/File Permissions |
|---|
| Upload (Write) |
| Download (Read) |
| List |
| Overwrite |
| Append |
| Rename |
| Delete |
| Checksum |
| Subfolder Create |
| Subfolder Rename |
| Subfolder Delete |
File Systems |
|---|
| Local file system |
| UNC paths |
| Mounted drives (e.g. NFS) |
| Network Attached Storage (NAS) |
| Storage Area Network (SAN) |
| Mapped drives |
| Amazon S3 Buckets |
| Microsoft Azure Blob Storage |
| WebDAV |
| Samba (SMB) version 1, 2, 3, and 3.1.1 protocols |
| Common Internet File System (CIFS) |
| IFS on IBM i |
| Chroot Jail |
Encryption |
|---|
| Encrypt data in transit over SSL, TLS or SSH |
| Encrypt files at rest using AES 256-bit encryption |
| Open PGP file encryption and digital signing of files |
| Open PGP file decryption and verification of digital signatures |
| Strong ciphers: AES128, AES192, AES256, Triple DES |
| Legacy cipher support: DES, RC4, Blowfish |
| Configure the ciphers allowed for client connections |
| Force encrypted command channels |
| Support for implicit and explicit SSL |
| FIPS 140-2 validated algorithms from RSA |
Key and Certificate Management |
|---|
| Browser-based key management |
| Create new Open PGP keys, SSH keys and SSL certificates |
| Import existing Open PGP keys, SSH keys and SSL certificates |
| Export Open PGP keys, SSH keys and SSL certificates |
| Assign one or more SSH keys per user |
| Authorize key management role to only certain admins |
Data Translation - ETL |
|---|
| Read and write CSV, Excel, XML, JSON, and fixed-width text documents |
| Map and format data columns |
| Translate values using constants, functions and other column values |
| Extract data from database servers (e.g. SQL Server, Oracle, MySQL, MariaDB, DB2, etc.) |
| Insert data into database servers |
| Run SQL statements against database servers |
Inbound Connectivity |
|---|
| IPv6 compatible |
| Custom login banners |
| Multiple listeners allowed |
| Configurable port numbers |
| Can limit number of concurrent connections |
| Compression to reduce bandwidth requirements |
| Reject or accept files with certain extensions |
| Redirect HTTP traffic to HTTPS |
Guaranteed Delivery |
|---|
| Support for client auto-resume / append |
| File integrity checksum |
| Mac algorithms of SHA1 and MD5 |
IP Filtering |
|---|
| Global IP blacklists and whitelists |
| User level IP blacklists and whitelists |
| Monitor for Malicious User Names with auto blacklist |
| Monitor for DoS attacks (anti-hammering) with auto blacklist |
| Monitor for Brute Force attacks with auto blacklist |
| Temporary and permanent IP blacklisting |
| Email alerts on auto-blacklisted IPs |
Workflows |
|---|
| Design workflows (projects) using a graphical browser-based interface |
| No programming or scripting required |
| Provides over 60 different tasks that can be chained together |
| Control execution with conditional logic (If/Else) |
| Debugger allows viewing/changing variables and skipping tasks |
| Project revision history and restore from previous versions |
| Organize and prioritize workflows using multiple job queues |
| Run workflows from GoAnywhere MFT administrator or 3rd party applications |
| Integrate from Windows, Linux, IBM i, UNIX, Java, .NET, REST, and SOAP programs |
Scheduler |
|---|
| Run workflow jobs by the minute, hour, day, week or month |
| Auto-retry failed jobs |
| Use custom holiday calendars (skip holidays or run the day before/after) |
| Email alerts on successes and failures |
| Pass in custom variables to workflows |
Folder Monitors |
|---|
| Scan network folders for new, changed or deleted files |
| Scan SFTP, FTP/s, Amazon S3, and Microsoft Azure Blob servers for new, changed or deleted files |
| Use wildcard or regex patterns to scan for multiple files |
| Configure the scan frequency and times of day |
| Ensure file availability by either locking files or comparing timestamps/sizes |
| Send email alerts if files are missing |
Triggers |
|---|
| Create triggers based on uploads, downloads, etc. |
| Multi-level conditions using IFs, ANDs and ORs |
| Complex expressions using parenthesis |
| Filter conditions based on user, file name, folder, etc. |
| Send custom email notifications |
| Launch external programs and scripts with parameters |
| Move files |
| Copy files |
| Rename files |
| Delete files |
| Run project workflows |
Adhoc File Transfers |
|---|
| Browser-based HTML 5 web client for adhoc file transfers |
| Optional applet web client for enhanced file transfers |
| Multi-select files and folders |
| Context sensitive right-click menus |
| Drag-n-drop files for uploads and downloads |
| Monitor progress of transfers |
| Queue to process large numbers of transfers |
| Verifies the integrity of files |
| Large file support |
| Rebrand web client with custom logo, colors, fonts |
| Customizable disclaimer and privacy policy |
Cloud Connectors |
|---|
| Transfer and manage files between GoAnywhere and popular web and cloud-based applications |
GoDrive For Collaboration |
|---|
| Enterprise File Sync and Sharing |
| Drag-and-drop files and folders from the desktop to the GoDrive server |
| Synchronize files with Windows and Mac laptops/desktops |
| Share files and folders with other users |
| Specify granular permissions (e.g. read only, edit, etc.) for shared folders and files |
| Receive automatic email notifications when shared folders and files are accessed by others |
| View images and PDF files through the browser using the Media Viewer |
| Add comments to files and folders |
| Search for files or folders |
| Keep file revisions, with the ability to restore previous versions |
| Lock files to temporarily restrict access |
| Restore files from the Trash Bin |
| Image thumbnails and previews |
| Mobile device support for iPhone, iPad, and Android |
Secure Mail (email alternative for sending large or sensitive files) |
|---|
| Send secure mail from Outlook 2010 and later |
| Optionally send secure mail using a browser-based form |
| Attachments are automatically stripped and centrally stored |
| Can send File Requests that allow recipients to upload files |
| HTTPS links are generated for each secure mail package |
| Option to expire package after X number of days |
| Option to limit the number of downloads |
| Optional password protection |
| Customizable templates for email notifications |
| Sender can recall packages |
| Sender can receive notifications when packages are read |
| Automatic cleanup of expired packages |
| Local control of secure mail packages (not hosted) |
Secure Forms |
|---|
| Provide custom forms to users |
| User can be authenticated or anonymous |
| Can submit forms using SOAP or RESTful web services |
| Provide fields with default values, tooltips, and placeholders |
| Process Secure Forms automatically using Projects |
| Provide file downloads through the form |
| Drag & drop files directly into the form to upload |
| Uploaded files are automatically secured with AES-256 bit encryption |
| Set file types, file size limits, and maximum number of files |
| Save drafts of forms to finish at a later date |
| View Secure Form submission history |
High Availability and Clustering |
|---|
| Database tables for product data (simplifies backup/recovery) |
| Active-Passive for disaster recovery |
| Active-Active for automatic failover |
| Cluster multiple systems (no 3rd party tools required) |
| Load balance sessions between multiple systems |
DMZ Secure Gateway |
|---|
| Inbound reverse proxy |
| Can keep sensitive files in the private network (out of DMZ) |
| Allows closing inbound ports into the internal/private network |
| Can optionally serve as an outbound (forward) proxy |
| Single DMZ secure gateway can service multiple systems |
| IP Blacklisting performed at the DMZ |
Auditing |
|---|
| Audits user login activity |
| Generates logs of administrator actions |
| Logs unauthorized attempts |
| Logs all trading partner account activity |
| Database storage of audit log entries |
| Optional SYSLOG feed of audit records |
| Automatically can archive old audit entries |
| Retention period can be customized |
| Real time monitoring of active sessions |
| Email alerts for invalid login attempts |
| View audit logs from browser-based dashboard |
| Filter results by user, date, time, IP, etc. |
| Focus on certain activity (e.g. downloads, uploads, etc.) |
| Select which columns to show/hide |
| Sort columns by user, date, time, etc. |
| Export filtered audit entries into CSV format |
Reporting |
|---|
| Generate management and analytical reports in PDF format |
| Create custom reports based on data from a database, Excel, XML, JSON, or flat files |
| Custom filters including date ranges |
| Schedule reports to run on future dates/times |
| Run reports on demand and view in browser |
| Distribute reports by email or store on the server |
| PCI DSS Security Settings Report |
Data Loss Prevention |
|---|
| Document Sanitization |
| Data Redaction |
| Anti-Steganography |
| Optical Character Recognition |
Threat Protection |
|---|
| Anti-Virus (one to as many as three engines) |
| Malware Protection |
| Structural Sanitization (Advanced Persistent Threats) |
Backend Database Support (for storing product tables) |
|---|
| Amazon Aurora |
| DB2 for IBM i |
| Derby |
| Microsoft SQL Server |
| MySQL |
| MariaDB |
| Oracle |
| PostgreSQL |
Support |
|---|
| Phone based support with toll-free number |
| Email support |
| Live chat |
| Community web-based forum |
| Self-service knowledgebase |
| Product manuals in HTML and PDF format |
| Maintenance includes product upgrades |
Licensing |
|---|
| On-premises software (not hosted) |
| Cloud deployment (Amazon AWS, Microsoft Azure) |
| Licensed per server partition/instance |
| Unlimited administrator users |
| Unlimited transfers |
This is an add-on feature. Details.
Comes with Anti-Virus module.
Move Files Securely with GoAnywhere Managed File Transfer
Obtain a personalized quote based on the features you need.