Managed File Transfer
Simplify data security, automation, server-to-server file transfers, and more.
Cloud File Transfer
Secure data exchange with trading partners and applications in the cloud.
Secure FTP
Strong encryption and authentication technology for critical file transfers.
AS2 Transfers
Drummond Certified solution for automating AS2 file transfers.
Open PGP Encryption
Asymmetric cryptology for protecting confidential files at rest and in motion.
Sharing & Collaboration
Simple and secure interfaces for user-to-user file sharing and collaboration.
Automation
Build automated workflows to move files effortlessly between internal systems, users, and trading partners.
EDI File Translation
Read, write, and map EDI X12 and XML files between databases.
Data Security
Keep your sensitive data secure, no matter where it resides, or how it's shared.
Send files securely with GoAnywhere Managed File Transfer, an MFT tool that secures & automates data exchanges and eliminates the need for manual methods like custom programs & scripts. Start a trial today.
Gateway
Reverse and forward proxy solution for keeping sensitive files out of the DMZ. Start a free trial.
Secure ICAP Gateway
Clearswift's suite of secure solutions and GoAnywhere MFT integrate to enhance your infrastructure and keep your sensitive data secure.
MFTaaS
Explore how GoAnywhere MFTaaS gives you the power to securely transfer files while we take care of setup, hosting, and management.
FTP Client
Powerful free FTP client for file transfer automation with GoAnywhere MFT.
FTP Server
Enterprise-level FTP server included in GoAnywhere MFT. Start a free trial.
User-to-user file sharing and synchronization with GoDrive™.
Download Open PGP Studio
Encryption and key management, free with Open PGP™ Studio.
GoAnywhere Pricing
If you’re looking to learn more about PGP, one of the most popular encryption methods used today to encrypt files and send encrypted emails, keep reading to learn what it is, how it works, along with its offshoots GPG and Open PGP.
PGP, Pretty Good Privacy, is a standard option for file encryption and authentication. It is currently owned by Symantec, a technology company that develops and sells software solutions.
PGP is used to encrypt files to secure them for file transfer. It uses several encryption technologies, including hashing, data compression, and public/private keys to protect sensitive information. PGP is a flexible solution for today’s cybersecurity needs: it is often used to encrypt files before exchanging them with trading partners or remote locations and can also encrypt emails, directories, and disk partitions.
PGP uses a combination of encryption methodologies, including hashing, data compression, symmetric-key cryptography, and public-key cryptography to secure data. It can be used to encrypt:
GPG, or GnuPG, is a different implementation of the Open PGP standard (more on that below), and a powerful alternative to Symantec’s official PGP software. Also known as the GNU Privacy Guard, GPG is useful in that it works well with non-GPG-based products and can open and decrypt files encrypted by PGP or Open PGP.
Keep reading: PGP vs. GPG: What’s the Difference?
Open PGP is an open source offshoot of PGP that uses PGP as its foundation and was developed by Phil Zimmermann, a computer scientist and cryptographer who also developed PGP. The term “Open PGP” is commonly used to describe tools, features, and solutions that support open-source PGP encryption technology. Open PGP gives developers a way to include PGP in software that is typically free to the public. To do so, developer and vendors who include Open PGP in their software solutions must follow IETF (Internet Engineering Task Force) standards and allow for easy integration with other Open PGP-compliant software vendors.
Keep reading: OpenPGP, PGP, and GPG: What is the Difference?
Open PGP’s main function is to encrypt email communication, but it can be used for a variety of use cases, which is why developers choose to incorporate Open PGP into their products.
Open PGP file encryption, like standard PGP, lets you store sensitive information or transmit information across unsecure networks (i.e., the internet or email) so only the intended recipient can read it. It uses asymmetric (public key) cryptography and addresses the issues of data authentication and non-repudiation through the ability to "sign" files via embedded digital signatures. According to the official OpenPGP website, even intelligence organizations aren’t able to break Open PGP encryption. These features give organizations a high level of data protection, making Open PGP one of the most popular file encryption methods used today.
Encrypt, decrypt, sign files, and verify documents with GoAnywhere Open PGP Studio, a free encryption solution for IT users and teams.
Try It Today
PGP was developed in the early 1990s by Phil Zimmermann & Associates, LLC as a method of securing files that were posted on pre-internet bulletin boards. PGP has changed ownership several times between the 90s and now, and is currently owned by Symantec.
PGP gained popularity because it was initially available freely, which made it attractive to users who wanted to encrypt files and send encrypted emails at no cost. The layers of security are also attractive and helped PGP spread among security-conscious users – PGP uses both symmetric encryption and public key encryption, so users can send or receive messages from people they’re never met without exchanging private encryption keys.
Although some outlets have declared that PGP is dead, PGP, Open PGP, and GPG are all still in use today, and it continues to be a secure way to encrypt your data.
PGP encryption is done with software applications that obscure the message before either the application or the user sends it to the recipient.
By transforming plain, readable text into a complex code of unreadable characters, PGP encryption provides essential privacy missing from online communication. Once encrypted – hashed, data compressed, and “locked” via either symmetric private key cryptography or asymmetric public key cryptography – the message travels to the recipient fully cyphered. The recipient then uses PGP to decrypt the message.
With this system, each user has both:
The public key encrypts the message or file, while the private key decrypts.
This encryption standard addresses the issues of data authentication and non-repudiation through the ability to "sign" files via embedded digital signatures. Digital signatures use public-key cryptography to authenticate that data is coming from the source it claims to be from and has not been tampered with. Digital signatures are sent alongside the message body and work by using an algorithm to combine the sender’s private key with the data they are authenticating. The process makes digital signatures essentially impossible to forge unless the private key has been compromised.
Keep reading: Everything You Need to Know about PGP Encryption
PGP is used to encrypt or decrypt the file you exchange and having a trustworthy PGP software is paramount.
For sending files with PGP, the sender will need to have access to the recipient’s public key before they can send their files. Once the file is compressed, PGP will efficiently encrypt the plaintext with private key cryptography, turning the message into ciphertext. The session key is then encrypted using the sender’s public key. Once the recipient has received the encrypted file, they can decrypt it using their private key.
Some managed file transfer (MFT) tools, including GoAnywhere MFT, support Open PGP. Using an MFT solution gives you the ability to leverage Open PGP to:
Maintain the privacy and integrity of the data you exchange with external trading partners, clients, customers, and internal users when you use Open PGP via MFT.
Keep reading: 5 Benefits of PGP Decryption Using Managed File Transfer
Schedule a 15, 30, or 60-minute demo to discover how Open PGP encryption can boost your file security.
Learn how to decrypt files using Open PGP and GoAnywhere Workflows using the PGP Decrypt Task.
Discover how to use Open PGP encryption software from GoAnywhere to encrypt files and sign them with this tutorial. Store sensitive information or transmit across insecure networks with Open PGP.
VIEW ALL RESOURCES: PGP
Solutions
Products
Administration
Connectivity
Amazon S3 Bucket
AS2
AS3
AS4
Database
FTP
FTPS
GoFast
HTTP(S)
ICAP
Mail Servers
Message Queue (MQ)
Native Calls
Network Shares
SCP
SFTP
SMS
SNMP
WebDAV
File Servers
Azure
Linux
HTTPS
Encryption
FIPS 140-2
Encrypted Folders
Open PGP
Open PGP for IBM i
GnuPG (GPG)
SSH
SSL/TLS
Zip with AES
Key Management
Agents
Translation
Delimited Text
Excel
Fixed Width Text
XML
Workflows
Resources
Tasks
Scheduler
File Monitoring
Commands and APIs
Triggers
Collaboration
GoDrive
Mobile Apps
Secure Mail
Secure Forms
Secure Folders
Auditing and Reporting
Auditing
Reporting
Clustering
Cloud Integrations
Box
Salesforce
SharePoint Online
Dropbox
Microsoft Dynamics 365
Google Drive
Licensed Modules
Learn More
Detailed Features
Security and Compliance
FAQ
Installation Requirements
Guides and Tutorials
Getting Started with GoAnywhere MFT
Getting Started with File Transfer Services
Getting Started with Projects
Automating Project Workflows
How to Encrypt Files with Open PGP
How to Import a CSV File into a Database
Getting Started with Domains
Converting Scripts to Projects
How to Read JSON Data and Insert it into a Database
How to Query a Database and Write the Data to JSON
Using the SQL Wizard to Join Data from Two Database Tables
How to Enable SSL for HTTPS/AS2 Server Connections
Configuring the AS2 Client to Send AS2 Messages
How to Configure the AS2 Service to Receive AS2 Transfers
Configuring Web User Accounts to Receive AS2 Messages
Release Notes
Reverse and Forward Proxy
Load Balancing
PCI DSS Compliance
FAQs
Download
Getting Started
Installation
Microsoft Windows
Linux and Unix
Mac OS X
Key Manager
Key Preferences
Encrypt
Sign
Encrypt and Sign
Decrypt and Verify
Verify
Support
Services
Health Check
Implementation & Configuration
Migration Assistance
Project Consulting
Product Training
Product Upgrades
By Topic
AS2, AS3 and AS4 Transfers
File Transfer Automation
Compliance
EDI
File Encryption
File Sync & Sharing
Get the Most Out of GoAnywhere
Send Large Files
By Type
Brochures
Case Studies
Product Videos
Tutorials
Use Cases
Webinars
White Papers
Platforms
Windows
VMware
Amazon EC2
Microsoft Azure
Docker
IBM i
AIX and UNIX
Mac OS
Industries
Banking and Finance
Healthcare
Higher Education
Insurance
IT & Telecom
Logistics
Manufacturing
Media & Entertainment
Public Sector
Retail