Detailed Features

Listed below are the detailed features in GoAnywhere MFT, which is shown with all the licensed options.

SFTP - FTP over SSH  
SCP - Secure Copy over SSH  
Standard FTP  
AS2, AS3, and AS4  
PeSIT Server and Client connectivity  
File Transfer Acceleration  
Email (SMTP, POP3, IMAP)  
ICAP for DLP and AntiVirus scanning  

Operating Systems Supported

Windows Server 2012, 2016, and 2019  
Windows 8, and 10  
Linux (Red Hat, SUSE, Ubuntu, CentOS, etc.)  
AIX for IBM Power Systems  
IBM i (AS/400, iSeries)  
Mac OS X  

Virtualized Environments

VMware Ready (certified)  
Microsoft Hyper-V  
IBM Power VM  
Amazon EC2  
Microsoft Azure  


Browser based administration (no PC install)  
Secure access over HTTPS  
Remote configuration and monitoring  
Domains for multiple security zones  
Intuitive dashboard with quick links, statistics and analytics  
Dashboard gadgets with custom settings and layouts  
Graphical screens with point-n-click wizards  
Context sensitive help text  
Separation of duties (role-based permissions for admins)  

Browsers Supported

Microsoft Internet Explorer  
Microsoft Edge  
Mozilla Firefox  
Google Chrome  
Apple Safari  

User Account Creation

Create accounts using templates  
Import accounts from CSV or XML files  
Self-register accounts with optional approval process  
Allow users to invite others to register  
Create accounts through API calls from external apps  

User Authentication Methods

Active Directory (AD)  
IBM i user profiles  
SAML for single sign-on  
Kerberos Authentication for GoAnywhere Desktop Client and the Secure Mail Outlook Plugin  
GoAnywhere database  
SSL certificates (X.509 Standard)  
SSH public keys  
Two-Factor Authentication  
Time-based One-Time Passwords  

Password Security

Password strength policy (min length, special char, etc.)  
Password age enforcement (min/max number of days)  
Password history (disallow reuse of prior passwords)  
Password expiration intervals (in days)  
Password expiration email notifications  
Administrator can force password reset  
User can be allowed to change own password  

User Account Security

Authorize services (SFTP, HTTPS, etc.) per user  
Adopt user permissions from groups  
Configure IP whitelists (allowable IPs) per user  
Time out sessions after X seconds of inactivity  
Expire temporary accounts on specific dates  
Auto-disable user accounts after X invalid login attempts  
Auto-disable user accounts with no activity in X days  
Manually disable user accounts  
Limit or disable anonymous access  

Folder Configurations

Auto create folders using variables and/or constants  
Virtual file and folder names (user friendly aliases)  
Defined on user, group and template levels  
Unlimited subfolders  

Folder/File Permissions

Upload (Write)  
Download (Read)  
Subfolder Create  
Subfolder Rename  
Subfolder Delete  

File Systems

Local file system  
UNC paths  
Mounted drives (e.g. NFS)  
Network Attached Storage (NAS)  
Storage Area Network (SAN)  
Mapped drives  
Amazon S3 Buckets  
Microsoft Azure Blob Storage  
Samba (SMB) version 1, 2, 3, and 3.1.1 protocols  
Common Internet File System (CIFS)  
IFS on IBM i  
Chroot Jail  


Encrypt data in transit over SSL, TLS or SSH  
Encrypt files at rest using AES 256-bit encryption  
Open PGP file encryption and digital signing of files  
Open PGP file decryption and verification of digital signatures  
Strong ciphers: AES128, AES192, AES256, Triple DES  
Legacy cipher support: DES, RC4, Blowfish  
Configure the ciphers allowed for client connections  
Force encrypted command channels  
Support for implicit and explicit SSL  
FIPS 140-2 validated algorithms from RSA  

Key and Certificate Management

Browser-based key management  
Create new Open PGP keys, SSH keys and SSL certificates  
Import existing Open PGP keys, SSH keys and SSL certificates  
Export Open PGP keys, SSH keys and SSL certificates  
Assign one or more SSH keys per user  
Authorize key management role to only certain admins  

Data Translation - ETL

Read and write CSV, Excel, XML, JSON, and fixed-width text documents  
Map and format data columns  
Translate values using constants, functions and other column values  
Extract data from database servers (e.g. SQL Server, Oracle, MySQL, MariaDB, DB2, etc.)  
Insert data into database servers  
Run SQL statements against database servers  

Inbound Connectivity

IPv6 compatible  
Custom login banners  
Multiple listeners allowed  
Configurable port numbers  
Can limit number of concurrent connections  
Compression to reduce bandwidth requirements  
Reject or accept files with certain extensions  
Redirect HTTP traffic to HTTPS  

Guaranteed Delivery

Support for client auto-resume / append  
File integrity checksum  
Mac algorithms of SHA1 and MD5  

IP Filtering

Global IP blacklists and whitelists  
User level IP blacklists and whitelists  
Monitor for Malicious User Names with auto blacklist  
Monitor for DoS attacks (anti-hammering) with auto blacklist  
Monitor for Brute Force attacks with auto blacklist  
Temporary and permanent IP blacklisting  
Email alerts on auto-blacklisted IPs  


Design workflows (projects) using a graphical browser-based interface  
No programming or scripting required  
Provides over 60 different tasks that can be chained together  
Control execution with conditional logic (If/Else)  
Debugger allows viewing/changing variables and skipping tasks  
Project revision history and restore from previous versions  
Organize and prioritize workflows using multiple job queues  
Run workflows from GoAnywhere MFT administrator or 3rd party applications  
Integrate from Windows, Linux, IBM i, UNIX, Java, .NET, REST, and SOAP programs  


Run workflow jobs by the minute, hour, day, week or month  
Auto-retry failed jobs  
Use custom holiday calendars (skip holidays or run the day before/after)  
Email alerts on successes and failures  
Pass in custom variables to workflows  

Folder Monitors

Scan network folders for new, changed or deleted files  
Scan SFTP, FTP/s, Amazon S3, and Microsoft Azure Blob servers for new, changed or deleted files  
Use wildcard or regex patterns to scan for multiple files  
Configure the scan frequency and times of day  
Ensure file availability by either locking files or comparing timestamps/sizes  
Send email alerts if files are missing  


Create triggers based on uploads, downloads, etc.  
Multi-level conditions using IFs, ANDs and ORs  
Complex expressions using parenthesis  
Filter conditions based on user, file name, folder, etc.  
Send custom email notifications  
Launch external programs and scripts with parameters  
Move files  
Copy files  
Rename files  
Delete files  
Run project workflows  

Adhoc File Transfers

Browser-based HTML 5 web client for adhoc file transfers  
Optional applet web client for enhanced file transfers  
Multi-select files and folders  
Context sensitive right-click menus  
Drag-n-drop files for uploads and downloads  
Monitor progress of transfers  
Queue to process large numbers of transfers  
Verifies the integrity of files  
Large file support  
Rebrand web client with custom logo, colors, fonts  
Customizable disclaimer and privacy policy  

Cloud Connectors

Transfer and manage files between GoAnywhere and popular web and cloud-based applications  

GoDrive For Collaboration

Enterprise File Sync and Sharing  
Drag-and-drop files and folders from the desktop to the GoDrive server  
Synchronize files with Windows and Mac laptops/desktops  
Share files and folders with other users  
Specify granular permissions (e.g. read only, edit, etc.) for shared folders and files  
Receive automatic email notifications when shared folders and files are accessed by others  
View images and PDF files through the browser using the Media Viewer  
Add comments to files and folders  
Search for files or folders  
Keep file revisions, with the ability to restore previous versions  
Lock files to temporarily restrict access  
Restore files from the Trash Bin  
Image thumbnails and previews  
Mobile device support for iPhone, iPad, and Android  

Secure Mail (email alternative for sending large or sensitive files)

Send secure mail from Outlook 2010 and later  
Optionally send secure mail using a browser-based form  
Attachments are automatically stripped and centrally stored  
Can send File Requests that allow recipients to upload files  
HTTPS links are generated for each secure mail package  
Option to expire package after X number of days  
Option to limit the number of downloads  
Optional password protection  
Customizable templates for email notifications  
Sender can recall packages  
Sender can receive notifications when packages are read  
Automatic cleanup of expired packages  
Local control of secure mail packages (not hosted)  

Secure Forms

Provide custom forms to users  
User can be authenticated or anonymous  
Can submit forms using SOAP or RESTful web services  
Provide fields with default values, tooltips, and placeholders  
Process Secure Forms automatically using Projects  
Provide file downloads through the form  
Drag & drop files directly into the form to upload  
Uploaded files are automatically secured with AES-256 bit encryption  
Set file types, file size limits, and maximum number of files  
Save drafts of forms to finish at a later date  
View Secure Form submission history  

High Availability and Clustering

Database tables for product data (simplifies backup/recovery)  
Active-Passive for disaster recovery  
Active-Active for automatic failover  
Cluster multiple systems (no 3rd party tools required)  
Load balance sessions between multiple systems  

DMZ Secure Gateway

Inbound reverse proxy  
Can keep sensitive files in the private network (out of DMZ)  
Allows closing inbound ports into the internal/private network  
Can optionally serve as an outbound (forward) proxy  
Single DMZ secure gateway can service multiple systems  
IP Blacklisting performed at the DMZ  


Audits user login activity  
Generates logs of administrator actions  
Logs unauthorized attempts  
Logs all trading partner account activity  
Database storage of audit log entries  
Optional SYSLOG feed of audit records  
Automatically can archive old audit entries  
Retention period can be customized  
Real time monitoring of active sessions  
Email alerts for invalid login attempts  
View audit logs from browser-based dashboard  
Filter results by user, date, time, IP, etc.  
Focus on certain activity (e.g. downloads, uploads, etc.)  
Select which columns to show/hide  
Sort columns by user, date, time, etc.  
Export filtered audit entries into CSV format  


Generate management and analytical reports in PDF format  
Create custom reports based on data from a database, Excel, XML, JSON, or flat files  
Custom filters including date ranges  
Schedule reports to run on future dates/times  
Run reports on demand and view in browser  
Distribute reports by email or store on the server  
PCI DSS Security Settings Report  

Data Loss Prevention

Document Sanitization  
Data Redaction  
Optical Character Recognition  

Threat Protection

Anti-Virus (one to as many as three engines)  
Malware Protection  
Structural Sanitization (Advanced Persistent Threats)  

Backend Database Support (for storing product tables)

Amazon Aurora  
DB2 for IBM i  
Microsoft SQL Server  


Phone based support with toll-free number  
Email support  
Live chat  
Community web-based forum  
Self-service knowledgebase  
Product manuals in HTML and PDF format  
Maintenance includes product upgrades  


On-premises software (not hosted)  
Cloud deployment (Amazon AWS, Microsoft Azure)  
Licensed per server partition/instance  
Unlimited administrator users  
Unlimited transfers  

This is an add-on feature. Details.

Comes with Anti-Virus module.

Move Files Securely with GoAnywhere Managed File Transfer

Obtain a personalized quote based on the features you need.

Request Pricing