Detailed Features

Detailed Features in GoAnywhere MFT

Listed below are the detailed features in GoAnywhere MFT, which is shown with all the licensed options.

Text

 

SFTP - FTP over SSH
FTPS - FTP over SSL/TLS
SCP - Secure Copy over SSH
Standard FTP
HTTP/s
AS2, AS3, and AS4
PeSIT Server and Client connectivity
File Transfer Acceleration
MQ/JMS
Email (SMTP, POP3, IMAP)
ICAP for DLP and AntiVirus scanning

Operating Systems Supported

Windows Server 2012, 2016, and 2019
Windows 8, and 10
Linux (Red Hat, SUSE, Ubuntu, CentOS, etc.)
UNIX
AIX for IBM Power Systems
IBM i (AS/400, iSeries)
HP-UX
Solaris
Mac OS X
Docker

Virtualized Environments

VMware Ready (certified)
Microsoft Hyper-V
IBM Power VM
Amazon EC2
Microsoft Azure
MFTaaS

Administration

Browser based administration (no PC install)
Secure access over HTTPS
Remote configuration and monitoring
Domains for multiple security zones
Intuitive dashboard with quick links, statistics and analytics
Dashboard gadgets with custom settings and layouts
Graphical screens with point-n-click wizards
Context sensitive help text
Separation of duties (role-based permissions for admins)

Browsers Supported

Microsoft Internet Explorer
Microsoft Edge
Mozilla Firefox
Google Chrome
Apple Safari

User Account Creation

Create accounts using templates
Import accounts from CSV or XML files
Self-register accounts with optional approval process
Allow users to invite others to register
Create accounts through API calls from external apps

User Authentication Methods

Active Directory (AD)
LDAP
IBM i user profiles
SAML for single sign-on
RADIUS RSA SecurID
Kerberos Authentication for GoAnywhere Desktop Client and the Secure Mail Outlook Plugin
GoAnywhere database
SSL certificates (X.509 Standard)
SSH public keys
Two-Factor Authentication
Time-based One-Time Passwords

Password Security

Password strength policy (min length, special char, etc.)
Password age enforcement (min/max number of days)
Password history (disallow reuse of prior passwords)
Password expiration intervals (in days)
Password expiration email notifications
Administrator can force password reset
User can be allowed to change own password

User Account Security

Authorize services (SFTP, HTTPS, etc.) per user
Adopt user permissions from groups
Configure IP whitelists (allowable IPs) per user
Time out sessions after X seconds of inactivity
Expire temporary accounts on specific dates
Auto-disable user accounts after X invalid login attempts
Auto-disable user accounts with no activity in X days
Manually disable user accounts
Limit or disable anonymous access

Folder Configurations

Auto create folders using variables and/or constants
Virtual file and folder names (user friendly aliases)
Defined on user, group and template levels
Unlimited subfolders

Folder/File Permissions

Upload (Write)
Download (Read)
List
Overwrite
Append
Rename
Delete
Checksum
Subfolder Create
Subfolder Rename
Subfolder Delete

File Systems

Local file system
UNC paths
Mounted drives (e.g. NFS)
Network Attached Storage (NAS)
Storage Area Network (SAN)
Mapped drives
Amazon S3 Buckets
Microsoft Azure Blob Storage
WebDAV
Samba (SMB) version 1, 2, 3, and 3.1.1 protocols
Common Internet File System (CIFS)
IFS on IBM i
Chroot Jail

Encryption

Encrypt data in transit over SSL, TLS or SSH
Encrypt files at rest using AES 256-bit encryption
Open PGP file encryption and digital signing of files
Open PGP file decryption and verification of digital signatures
Strong ciphers: AES128, AES192, AES256, Triple DES
Legacy cipher support: DES, RC4, Blowfish
Configure the ciphers allowed for client connections
Force encrypted command channels
Support for implicit and explicit SSL
FIPS 140-2 validated algorithms from RSA

Key and Certificate Management

Browser-based key management
Create new Open PGP keys, SSH keys and SSL certificates
Import existing Open PGP keys, SSH keys and SSL certificates
Export Open PGP keys, SSH keys and SSL certificates
Assign one or more SSH keys per user
Authorize key management role to only certain admins

Data Translation - ETL

Read and write CSV, Excel, XML, JSON, and fixed-width text documents
Map and format data columns
Translate values using constants, functions and other column values
Extract data from database servers (e.g. SQL Server, Oracle, MySQL, MariaDB, DB2, etc.)
Insert data into database servers
Run SQL statements against database servers

Inbound Connectivity

IPv6 compatible
Custom login banners
Multiple listeners allowed
Configurable port numbers
Can limit number of concurrent connections
Compression to reduce bandwidth requirements
Reject or accept files with certain extensions
Redirect HTTP traffic to HTTPS

Guaranteed Delivery

Support for client auto-resume / append
File integrity checksum
Mac algorithms of SHA1 and MD5

IP Filtering

Global IP blacklists and whitelists
User level IP blacklists and whitelists
Monitor for Malicious User Names with auto blacklist
Monitor for DoS attacks (anti-hammering) with auto blacklist
Monitor for Brute Force attacks with auto blacklist
Temporary and permanent IP blacklisting
Email alerts on auto-blacklisted IPs

Workflows

Design workflows (projects) using a graphical browser-based interface
No programming or scripting required
Provides over 60 different tasks that can be chained together
Control execution with conditional logic (If/Else)
Debugger allows viewing/changing variables and skipping tasks
Project revision history and restore from previous versions
Organize and prioritize workflows using multiple job queues
Run workflows from GoAnywhere MFT administrator or 3rd party applications
Integrate from Windows, Linux, IBM i, UNIX, Java, .NET, REST, and SOAP programs

Scheduler

Run workflow jobs by the minute, hour, day, week or month
Auto-retry failed jobs
Use custom holiday calendars (skip holidays or run the day before/after)
Email alerts on successes and failures
Pass in custom variables to workflows

Folder Monitors

Scan network folders for new, changed or deleted files
Scan SFTP, FTP/s, Amazon S3, and Microsoft Azure Blob servers for new, changed or deleted files
Use wildcard or regex patterns to scan for multiple files
Configure the scan frequency and times of day
Ensure file availability by either locking files or comparing timestamps/sizes
Send email alerts if files are missing

Triggers

Create triggers based on uploads, downloads, etc.
Multi-level conditions using IFs, ANDs and ORs
Complex expressions using parenthesis
Filter conditions based on user, file name, folder, etc.
Send custom email notifications
Launch external programs and scripts with parameters
Move files
Copy files
Rename files
Delete files
Run project workflows

Adhoc File Transfers

Browser-based HTML 5 web client for adhoc file transfers
Optional applet web client for enhanced file transfers
Multi-select files and folders
Context sensitive right-click menus
Drag-n-drop files for uploads and downloads
Monitor progress of transfers
Queue to process large numbers of transfers
Verifies the integrity of files
Large file support
Rebrand web client with custom logo, colors, fonts
Customizable disclaimer and privacy policy

Cloud Connectors

Transfer and manage files between GoAnywhere and popular web and cloud-based applications

GoDrive For Collaboration

Enterprise File Sync and Sharing
Drag-and-drop files and folders from the desktop to the GoDrive server
Synchronize files with Windows and Mac laptops/desktops
Share files and folders with other users
Specify granular permissions (e.g. read only, edit, etc.) for shared folders and files
Receive automatic email notifications when shared folders and files are accessed by others
View images and PDF files through the browser using the Media Viewer
Add comments to files and folders
Search for files or folders
Keep file revisions, with the ability to restore previous versions
Lock files to temporarily restrict access
Restore files from the Trash Bin
Image thumbnails and previews
Mobile device support for iPhone, iPad, and Android

Secure Mail (email alternative for sending large or sensitive files)

Send secure mail from Outlook 2010 and later
Optionally send secure mail using a browser-based form
Attachments are automatically stripped and centrally stored
Can send File Requests that allow recipients to upload files
HTTPS links are generated for each secure mail package
Option to expire package after X number of days
Option to limit the number of downloads
Optional password protection
Customizable templates for email notifications
Sender can recall packages
Sender can receive notifications when packages are read
Automatic cleanup of expired packages
Local control of secure mail packages (not hosted)

Secure Forms

Provide custom forms to users
User can be authenticated or anonymous
Can submit forms using SOAP or RESTful web services
Provide fields with default values, tooltips, and placeholders
Process Secure Forms automatically using Projects
Provide file downloads through the form
Drag & drop files directly into the form to upload
Uploaded files are automatically secured with AES-256 bit encryption
Set file types, file size limits, and maximum number of files
Save drafts of forms to finish at a later date
View Secure Form submission history

High Availability and Clustering

Database tables for product data (simplifies backup/recovery)
Active-Passive for disaster recovery
Active-Active for automatic failover
Cluster multiple systems (no 3rd party tools required)
Load balance sessions between multiple systems

DMZ Secure Gateway

Inbound reverse proxy
Can keep sensitive files in the private network (out of DMZ)
Allows closing inbound ports into the internal/private network
Can optionally serve as an outbound (forward) proxy
Single DMZ secure gateway can service multiple systems
IP Blacklisting performed at the DMZ

Auditing

Audits user login activity
Generates logs of administrator actions
Logs unauthorized attempts
Logs all trading partner account activity
Database storage of audit log entries
Optional SYSLOG feed of audit records
Automatically can archive old audit entries
Retention period can be customized
Real time monitoring of active sessions
Email alerts for invalid login attempts
View audit logs from browser-based dashboard
Filter results by user, date, time, IP, etc.
Focus on certain activity (e.g. downloads, uploads, etc.)
Select which columns to show/hide
Sort columns by user, date, time, etc.
Export filtered audit entries into CSV format

Reporting

Generate management and analytical reports in PDF format
Create custom reports based on data from a database, Excel, XML, JSON, or flat files
Custom filters including date ranges
Schedule reports to run on future dates/times
Run reports on demand and view in browser
Distribute reports by email or store on the server
PCI DSS Security Settings Report

Data Loss Prevention

Document Sanitization 
Data Redaction 
Anti-Steganography 
Optical Character Recognition 

Threat Protection

Anti-Virus (one to as many as three engines) 
Malware Protection 
Structural Sanitization (Advanced Persistent Threats) 

Backend Database Support (for storing product tables)

Amazon Aurora
DB2 for IBM i
Derby
Microsoft SQL Server
MySQL
MariaDB
Oracle
PostgreSQL

Support

Phone based support with toll-free number
Email support
Live chat
Community web-based forum
Self-service knowledgebase
Product manuals in HTML and PDF format
Maintenance includes product upgrades

Licensing

On-premises software (not hosted)
Cloud deployment (Amazon AWS, Microsoft Azure)
Licensed per server partition/instance
Unlimited administrator users
Unlimited transfers

 This is an add-on feature. Details.

 Comes with Anti-Virus module.

Move Files Securely with GoAnywhere Managed File Transfer

Obtain a personalized quote based on the features you need.

Request Pricing