How to Centralize and Secure File Transfers Organization-Wide

Thank you for your interest in this on-demand webinar. If you have questions following the webinar, please contact us. You can also download the presentation slides here.

 

Costly data breaches can occur when individuals and departments use file sharing applications that aren’t centralized or secure and they don’t recognize the risks these actions pose. MFT can deliver a more secure, centralized file transfer process if your organization faces the following:

During this session, our presenter Scott Messick will feature these integrations and how they can bolster your data security portfolio.

  • Dependence on legacy scripts
  • Use of unsecure tools, such as Dropbox or unauthorized FTP
  • Multiple file transfer tools in place across departments
  • Lack of visibility
  • Need to meet compliance regulations
  • No consolidated provider or support
  • GoAnywhere can centralize your file transfers, provide more auditing and reporting insights, automate processes, and more all from one single platform.

This 50-minute webinar will cover how GoAnywhere, a user-friendly, secure, managed file transfer solution from Fortra can centralize and consolidate all your file transfers with end-to-end security of files in motion and at rest.

Transcript

Angela:

Hello, everyone. Thank you so much for joining our webinar today, where we will be talking about how to centralize and secure file transfers organization-wide. I'm here with my co-hosts Heath Kath and Michael Barford. Welcome gentlemen.

 

Michael Barford:

Good morning. Good afternoon, everyone.

Heath Kath:

Hello.

Angela:

Hello. Just a couple of quick comments before we begin, we are recording today's event and we will be sending the link out to you afterwards. Please feel free to ask questions throughout the presentation using the question section on the right hand side of your screen. And we'll go ahead and answer them throughout the presentation and during Q&A at the end. Finally, a survey will also be popping up at the end of the presentation. Your participation in that will provide us some valuable feedback. And in addition, any questions that weren't answered during today's event will be answered throughout that survey. All right, let me introduce you to our presenters. Michael Barford is a technical consultant for HelpSystems, with over five years experience in file and data processing. Michael has helped customers design and deploy scalable solutions that meet ever stricter security requirements. Michael's background has been in the payments industry, with work on web design, deployment and integration of PCI DSS compliant solutions for payment processing. His current focuses are on helping customers securely manage and maintain key files for business processing or ad hoc file transfer.

Angela:

Heath Kath is a senior solutions consultant here at HelpSystems working with the GoAnywhere managed file transfer product line. Heath provides pre-sales support, specializing in demos and proof of concepts. Heath is also a member of the professional services team providing additional training and assistance to our GoAnywhere users. All right, let's move on to the agenda. So for today, we're going to start off with introducing you to HelpSystems. Then we're going to talk through some of the common data security challenges and collaborative tools and their risks. Then we're going to go through HelpSystems' proposal for safe collaboration within your organization, and then wrap up with some Q&A. All right, with that, gentlemen, I'm going to go ahead and turn it over to you and you can take it away.

Security & Automation Solutions

Michael Barford:

Thank you very much, Angela. And thank you everybody for joining us today. So managing your file and data movements is absolutely a very key and important aspect, and it's a pleasure to be able to speak with you all today on this topic. Centralizing and securing file transfers is our focus for today, but it's always good to know that here at HelpSystems, we really can solve any and every security and automation need that you might have, be it a case of needing to add data classification to files, or simply looking to put in place data loss prevention, or even automated processes to remove an element of human error. If you have some sort of an IT requirement, then chances are that we have a solution for you.

About HelpSystems

You can be safe in the knowledge to know that no matter where you are, chances are that you're pretty close to a HelpSystems office. We've got footprints over in America and all of our headquarters, and we've got them in Europe and Australia just to name a few of them, but you're also in good hands in that we're well-established. We started way back out in 1982 and we're just short of coming to our 40th anniversary.

Data Security Challenges

So the first topic we're going to take a look at is going to be the data security challenges and where I'm hopefully going to be able to set a little bit of scene for you and give you a bit of overview of some of the challenges that you may face.

So it's no surprise to anyone that there's numerous ways to get information moved from point A to point B or from one place to another. It could be in the form of a colleague simply passing you a note and they could be sending you an email, or they could even be installing some sort of application from the internet. There's so many ways to actually grab different types of information and these different ways of grabbing that information can change as well. Oftentimes, the processes for getting this information becomes commonplace and sometimes, they can even be used inappropriately. And this is particularly the case when it does come to things like sensitive or business critical type of information, things like business reports or customer data. Through legacy processes, or even simply complacency, insecure methods for moving data around can become the norm. And this does potentially open up that very same information to being vulnerable.

We can see this being evidenced with countless number of reported data breaches over the past few years, things like emails being leaked or database records being somehow grabbed and received into the wrong hands. And it can also be exacerbated by making use of out of date protocols, out of date processes. For example, making use of things like SSL version 3. These out of date protocols are inherently opened up to vulnerabilities as they have had vulnerabilities around them found. Having numerous tools used to get this data moved around can exacerbate the issue as well. It makes it extremely difficult to manage, update, or even generally kind of maintain the processes that are in place to get that data moved around. And there's a number of ways that the problem itself can rear its ugly head, but commonly, we see it emerging when collaborating with individuals or teams who may be in different geographies. They could be different trading partners or even with your customers.

Current Data Security Trends

And this feeds into just a few trends that's been found happening around security and when it does come to data. So the very first thing I want to highlight here is this statistic at the top. So in Q3 of 2020 alone, there was a record breaking, I don't believe anyone's really going to be celebrating this particular record, but there's a record breaking number of records stolen. And in just the quarter itself, it was estimated about 8 billion records had been leaked or kind of taken away from the organizations or places where they originated. When we compare that to the whole of 2017 and how many records were reported to have been stolen, which was only 2.5 billion, you can see that is very much a problem that is becoming more and more commonplace, no matter where you go.

In fact, in 2020, we did see a number of major breaches occur. You may have remembered perhaps at the beginning of the year, companies such as Microsoft, it was found out that about 250 million customer service records, as well as support records had been found to have been leaked. And these records dated all the way back to 2005. So some really, really legacy types of information there. Later on in the year in November, there was also discovered that about 2 million records of staff, user and subscriber data was leaked from mashable.com. And no one's really immune to this, either. When we look back, it was actually recently discovered that the United Nations themselves were subject to some sort of data breach in 2019. Since they have diplomatic immunity, they aren't actually required to divulge what data was taken or even notify the individuals who may have been affected by that. So these problems are definitely kind of exacerbated and increasing in frequency as well as in volume. And you'll find that more and more kind of efforts need to be put in place to ensure that that doesn't happen. And this directly translates to things like monetary loss to the organization, be it in the case of loss of reputation or just physical information taken away. And it's becoming more and more expensive as time goes on as well.

Remote Work and Data Security

So with the recent pandemic, home working has really become commonplace for a number of people and a number of organizations. The impact of the pandemic does vary region to region, but trends are generally indicated that a significant number of people will continue to be working and incorporating remote work into that general kind of working environment for the foreseeable future. Remote working itself does of course have its own risks. You're effectively adding in an additional layer between your organization and your colleagues, and the outside world introduced into this may mean that certain information, which has traditionally been handled by colleagues and by individuals may be at more risk to things like security breaches and vulnerabilities.

There's a few key tips that we've got to ensure that you keep your remote working environment safe. So on the previous slide, we briefly touched on the impact of data breaches and commonly, that does occur due to human error. It's still the single most common way for data to be leaked or breached kind of elsewhere. A recent report found that about 99% of cyber attacks do require some level of human intervention. And that could be through the form of things like man in the middle attacks, where users are logged into portals and that information is taken away from them, or it could be malware infected apps where the malware itself has been downloaded through something like an email. Much of this does come down to simply educating your employees about the risks such as using free WiFi connections. And then also security awareness training is really key to ensure that the employees themselves can be trusted to do the processes and the duties, which they're meant to do outside of the local office controls.

Another tip we've got is establishing standards, put in place standards and good practices for how your colleagues and how individuals treat data, particularly personal data, so any users have access to it have some sort of procedure that they can follow. Process or process data on the kind of only given access if required kind of model, ensure that not every colleague has access to certain bits of information and any information which they do need access to, which is sensitive in nature, is restricted and controlled through either a controlled process, such as logging in maybe through a VPN tunnel, something like that, or through some other kind of method, which is then easily documented.

Another thing here is that many tools, which your organization may have deployed, have been built and designed to work internally only. Perhaps you've deployed particular solutions before and remote working was even a possibility. So it's really important that anyone who has access to these applications and any relevant data at home, both from desktop and mobile devices, goes through these processes and tools, which you've put in place, and that can commonly again be done through something like a VPN. Try to avoid using shadow IT, try not to use those, I guess, free tools, which you can lose quite a lot of visibility in how users are interfacing with it and how information is being accessed and where it's being accessed from. And also keep in touch with colleagues. Deploy a sort of like an agile like type of environment to ensure that communication itself doesn't break down. Frequently get in touch with colleagues, get an understanding of how they're doing processes and ensure that you're in the know with what processes they themselves are running through.

Free is Best, Right?

So free tools are great. They're really, really good for a number of reasons. First off, being free is fantastic. And there's a huge wealth of free tools out there to kind of enable you or enable individuals to get things moving. They're generally very easy to deploy, and they can kind of help to mitigate the ease of actually doing remote working in the first place. And they could be very simple to use to collaborate with others for example. So it does make it very easy to work with in that remote environment, but they cannot be used if you do want a truly managed environment. Again, speaking of that shadow IT effect, you really want to try and move away from that. Your colleagues making use of services and products without any type of visibility is what really drives that shadow IT process and makes it so that you don't have that kind of level of knowledge or understanding of where things are moving.

Some of the most popular EFSS and collaboration cloud platforms are not actually secure enough to host sensitive data, things that might fall under PCI DSS or HIPAA or HITECH for example. They may not actually be able to be stored within these cloud solutions. A secure platform gives you the power to send critical information without worrying that it may conflict with these industry or government regulations. And part of working with these shadow IT cloud devices and applications is that the choice of data storage can be really difficult to control, but you ultimately know whereabouts that information is going to be stored, and you know how it's being accessed.

Working remotely can result in a bit of a communication bubble as well. You can even close off communications and ensure it can make it so that processes which were previously handled by numerous different teams and given more visibility, maybe kind of closed off and isolated to individuals instead. Cloud storage is the obvious choice to ensure that data is placed in a well-known area that is protected. However, enforcing the use of the chosen storage is much more difficult. Teams must understand the importance of collaboration and how to work together using centralized cloud repositories. Oftentimes, free tools deployed for a business case may not provide sufficient logging to actually help analyze where an issue may lie, which could be very costly when it does come to dealing with a critical case. Ease of use of cloud-based applications for remote and collaborative work increases the surface area of cyber attacks.

And now I'm going to pass on to my colleague, Heath.

Why Managed File Transfer?

Heath Kath:

All right, thanks, Michael. I appreciate that, some really great information there, some things really think about around your file transfers, your team, your organization, excuse me. And I agree, with more and more employees working remotely, working from home, having the right tools in place so the users can get their job done, but again, get it done in a secure way, and to manage everything. So this really brings me to this topic here, why manage file transfers? Our topic today is around the centralization, and some may see this really around standardization as you've mentioned as well. It will be more beneficial if a single solution can do what you need to do versus trying to manage several solutions. And in some cases, some solutions may only run on specific platforms.

So now you may have additional hardware to manage. And overall, this is providing some limitations and just those challenges of managing all the different solutions. As many of you may know today, you may have several methods and tools being used to transfer files across your organization. It's hard to manage, to secure all these different solutions when many are doing their own thing to get their files move from point A to point B. Costly data breaches have occurred, as Mike kind of hinted there, when there are so many different file sharing applications which are also not centralized, that are not all that secure. Today, talking about GoAnywhere managed file transfer is very different. It's a centralized solution, centralized MFT solution, your managed file transfer that you can deploy on-prem, in the cloud on platforms like Microsoft, Azure and AWS, or within your own hybrid environments. Our secure managed file transfer solution runs easily on platforms like Linux, Windows, AIX, the IBM i, iMac, and more. We even offer a SaaS solution go in your MFT as a service of which will manage the hardware and software for you in AWS.

Once you have GoAnywhere MFT installed where you choose, you simply use the browser of your choice, like IE, FileZilla, Chrome, Opera to manage and to share these files. So it becomes really easy and very powerful for you. With GoAnywhere, we actually offer many types of different protocols to help you transfer those files from secure FTP, FTPS, AS2, HTTPS, SMB and more. You also will see that it's an automation. Automation is key. The more you can automate, the better off you will be in the long run with less chance of a user error, again as Mike mentioned that earlier as well. It's a key area, just things going wrong very simply, but also a thought to think about, who has the time and knowledge to do what you do around these file transfers if you're out of the office?

GoAnywhere MFT is a single solution that offers both an admin site and a user site, making it very easy to set up and manage your file transfers, but also to manage your users and your trading partners as needed. In fact, you will be able to define what protocols your users can use to connect to your server like HTTPS, secure FTP, FTPS, AS2, and so forth. Once connected based on their permissions, what folders can they access, what functions or permissions do they have, like listing, uploading, downloading, renaming and deleting, et cetera. You're in full control of what they can do and see out there. You'll also learn that GoAnywhere has built an integration task. And as a teaser, as shown in the slide, GoAnywhere can reach out to an ICAP server like Clearswift to automatically scan files, scanning for DLP, data loss prevention, but also to be able to scan for those files are coming in from viruses.

And then at that point to be able to perform the necessary actions, if the file is to move forward because it's clean or redact information, block it, or put that file in a quarantine folder or simply delete it.

Each company, regardless of size and industry requires exchanging information with internal and/or external collaborators. Maybe it's payments, invoices, policies, inventories, or just those quarterly reports. Today, some of you may be using a less secure method of file transfers. Traditionally, the way to exchange this information has been around just plain old FTP or SSH. These are really no longer viable protocols. Maybe you are using those very popular cloud type services like Box, Dropbox, Google Drive, Salesforce, and so forth. Many different services, some with very little to no tracking are limited to those sites' security area.

Maybe you have non-secure APIs that you are opening some security vulnerabilities within the applications that are sharing the data back and forth. I still come across a few that still use the old standard email. It's quick, it's simple, right? To add to this list, maybe you're saving information to an external disk or a portable drive, and then manually delivering the content yourself. These are no also no longer viable protocols as we need to tighten things up, especially around transmitting that potential PII or PHI or PCI information, that sensitive information that you got to keep control of.

The last item, automated scripts. These scripts could be awesome. They could be so complex. They can do a lot. However, what we find is that they're typically hard to maintain or to manage them. And some are just, there are challenges to use them.

This is probably one of the biggest challenges within MFT space, that is not having one place to go, not having one centralized administration, pane of glass, to manage all the different movements, all the different file transfers and maybe data manipulation that you need to do. The administration of complex scripts, multiple tools and different solutions that you need today, maybe you have people using a free FTP server and then someone else using an open P2P studio for their P2P encryption and somebody else is using something else for the file transfer protocol of the process. It's a complete mix or a mess if you will, but don't forget the mix of protocols. What do your trading partners require you guys to use to trust files to them, or pull files back?

The management of service users, this is the case in the systems and the applications that the users need to use. User management can be a huge problem, whether it's administrative users, whether it's the users that connect up to your system to do FTP or to log into a client. Not having a centralized place, it's very difficult to manage all of them, but also can create security holes as far as creating different service accounts. The lack of integration to active directory, or it's maybe just too hard to set up and manage for you. You need a solution that makes it easy to integrate with active directory or generic LDAP or even LDAP managed accounts. If you don't have AD or LDAP, you must at least have another option that can make it easy to manage these users through their individual user call outs in groups. All of that needs to be able to set up with that application.

How about managing the encryption keys? These keys and certificates can be all over the place. Maybe you have your own PK environment for certificates, but you use open SSH, some type of servers for P2P keys, and then maybe you generate the SSH keys using PuTTY or something else. The point here, again, your tools should be centralized, not decentralized, not to mention who's managing all this, who's taking ownership of all this.

One more key point to mention, many users today may struggle with their tools because they lack automation. The more that you can automate the better. The less user interaction, the less that could go wrong. Plus, what if the person who is doing all these manual steps to push or pull files is out of the office? Who has the knowledge and the time to back up that person to run through all those steps? Does your process today have built in auto retry logic? What if you were doing a file transfer, especially on a larger file to a partner and in midstream, the connection goes down? Maybe they rebooted the server or you did, do you have some auto resume logic built in to pick up where left off versus starting all over or just to help with a successful delivery?

Do you have simple workflows that you can build and automate the entire file transfer? Usually, we see companies building scripts, sometimes several scripts just to pick up a file, encrypt it and deliver it. Now, if this is you, you're probably lacking an easy to use graphical user interface. You're not able to build projects and really fully automate the whole entire workflow.

Limited controls of your secure file movements, maybe you're putting files into the hands of other users that really don't understand the sensitivity of the actual data. You're depending on them to know that it's sensitive. And you're assuming that they will use that secure mail tool that they have are hoping they will use some secure method of pushing the files out. Do they know how to encrypt with P2P and so forth? Do they have the right key even? All of this is really manual and very risky way of managing these files.

Many times we hear that encryption and decryption are still a manual process, and it's a lot of work for these users. And typically we find that they complain it's a pain in the rear for them. So this kind of brings it back. So why managed file transfers? This key point, it's a centralized solution installed and managed on a server that you choose giving you a lot of control, security and flexibility around your file movement. GoAnywhere is a simple way, a solution to securely transfer your files, a centralized tool for your administrators, one tool, really the same tool that allows them to build your automated file transfers, to manage the keys, manage the users and maintain your file transfer securely, a single pane of glass, if you will, a solution that offers full traceability and control, a tool that gives you the visibility, the auditing of your file transfers and what your users are doing, and the security that can be defined in a single solution, helping you become compliant, as you may have strict state privacy laws, you may have to be HIPAA, SOC, ISO, PCI, GLBA compliant, and so forth.

Why Isn’t Encryption Enough?

And the last point listed, automation, automate your file transfers. No longer do you need to rely on other solutions to kick off your file transfers or users to manually kick off that file movement themselves. GoAnywhere MFT offers scheduling, folder monitoring and trigger events to help you kick off these workflows automatically. Earlier, I threw a teaser at you about integration, where GoAnywhere admin workflows can integrate with other solutions. You will be able to run native scripts, applications, MQ from one solution, if needed. Yes, GoAnywhere is a great, very secure solution for your file transfers and more. With a little bit of help, GoAnywhere can also integrate with like an ICAP server to scan the contents of files.

What if a file coming in has a virus or some malware attached to it? What if a user's trying to send out a document that contains PII, PCI or PHI information, that what if, how do you handle today? Do you have some type of DLP data loss prevention in place? For over five years, many of our customers within GoAnywhere have been using GoAnywhere and Clearswift together. Another solution helps us working hand in hand, a tight integration between MFT and with Clearswift, a way to scan documents, scan with documents that are coming in or going up the door as needed. Files that are coming in will automatically be scanned and are then moved as directed if they're clean or if a certain file type or a virus has fallen to delete them or to move the documents to a quarantine folder, if by chance those files, the docs are being sent out contain personal information to either block the document completely or redact the embedded information before it's actually going out, before it's sent.

MFT Use Cases

This here is just really, the slide's just kind of really just for your reference. It really kind of recaps the previous screen, just walking through the process of a file being scanned with an ICAP solution like Clearswift and then falling through the process to move it on as needed.

How MFT Helps with File Sharing

So jumping ahead, just going back to the main topic here today, that's centralized solution, right? So here with GoAnywhere, standardization, centralization, one flexible tool. And before I jump into a quick demonstration, quick, just an overview of GoAnywhere MFT, just so you know, GoAnywhere can act as an inbound for services like web client, utilizing HTTPS, AS2, secure FTP, FTPS and so forth. Users like yourself, other employees, customers, trading partners can easily perform ad hoc and batch requests to easily share those files as needed. GoAnywhere offers different tools, allow users to access the data, how they need to and different protocols as I kind of defined earlier. So you have full control over them.

You'll see that with GoAnywhere, we have what we call secure folders, your ad hoc file transfers using HTTPS, simply set up an HTTPS listener within GoAnywhere and give the users a web user ID and password on the browser. It's a very nice GU interface of which you can rebrand using your own images, your logos, and the once users connected, they could then simply drop off files with you or pick them up. It's all based on the permissions you set for them. As you know, it's really neat. Our customers really love that feature. It's really easy. We have GoDrive, a called base file and share an alternative available within GoAnywhere. It provides enterprise file syncing and sharing, EFSS services for your employees, partners, and customers. It's really kind of complete replacement for Box and Dropbox. With GoDrive, GoDrive provides PCI level of security using AES 256 bit encryption. And it's also tracking that file movement of which you really don't get with other solutions, other tools.

We have secure forms, it's like a web-based questionnaire. You will be able to customize these forms with fields to collect the information that you need to from the users. It supports like text boxes, radio buttons, buttons, check boxes, dropdown list, and more. These forms could allow them to attach some documents as well. Once filled out, they simply press the submit button to send you the information and possibly some files too, and then an automated workflow in the back end, the project, it will pick up and process that information, maybe updated a data table, update a spreadsheet, create a new user profile, taking the attachments, encrypting them, delivering them, sending some confirmation emails out. It's all to you guys what you do in the backend automatically.

We also have secure mail, allowing you to email secure data, the attachments and the body of email that never ends up in your change server. Secure mail allows users to quickly send confidential messages and files using the convenience of email and the security of HTTPS. The message, the attachments are automatically encrypted and GoAnywhere sends an email notification to the recipient with a link, allowing the users to download the message and files over a secure HTTPS connection directly from your server. You may require a password and the users to have a valid user account, user profile and password. There are no files restrictions, unless you set one. You can also set the number of days before the email package expires, and even the number of times it can be downloaded.

Another nice option around secure mail. Let's say you're working with a trading partner or a customer who needs to send you some information and some documents securely quickly and easily. With secure mail, you could send a request file email. The recipient this time receives the email with an upload link versus download. So now they can easily upload those files directly to your server. And once those docs arrive, you'll be notified.

Then we have the last thing on the list here around cloud connectors. And we have really an easy way for you guys to integrate with different web service applications. We have several different cloud connections available within our marketplace plus options even to build your own. I have a better list here in the next slide. So we have at least 38 cloud connectors available today of which you can integrate within these workflows to be able to reach out to SharePoint, ShareFile, JAMS, JIRA, you name it. With GoAnywhere, you will be able to connect and share files with multiple file systems and databases. GoAnywhere also allows you to connect to many different types of servers, using different protocols to push and pull files and even monitor for files to be picked up and moved as needed.

And security is also a key to being successful. GoAnywhere gives you the tools to be secure, to apply the correct type and level of encryption as you guys need to. Several factors must be considered before choosing an encryption standard to follow. How sensitive is the data being exchanged? How will the data be transmitted? We'll be using secure FTP or FTPS email or HTTP. Are the files large and should they be compressed? What encryption method will be used if zipped? Should the files be encrypted at rest before the transmission, or should the connection, the channel itself be encrypted, or do you guys require both? What encryption standards do your trading partners require support? A trading partner may ultimately dictate the encryption standards which they support. For instance, many banking and financial institutions require that customers encrypt files use an open P2P encryption standard, but then also follow a secure file transfer protocol like secure FTP.

GoAnywhere MFT gives you the tools to comply to that. A small handful of use cases to kind of highlight before I jump in the demonstration. Here, we have a government and a public sector, a California city government uses GoAnywhere to help streamline their file sharing, sending surveillance clips and voice recordings. And then we have the U.S. state government using secure forms for military personnel to safely and conveniently actually send their ballots in electronically. A pharmaceutical company in the UK needed a centralized solution that can help them perform several steps actually. And with GoAnywhere, they're able to get XML files, read them and based on the content, the actual data itself perform the necessary actions within the workflows, all automatically. A U.S.-based manufacturing corporation, they needed a solution that will give them more greater control over their file transfers. By using GoAnywhere, they able to have a centralized solution that helped them build a standard process sending these files securely. They are no longer doing manual IT requests, manual downloads and no longer distributed data via standard email.

There are actually many, many use cases actually listed on our website, but this fourth use case that I grabbed is around global music corporation, a global music corporation. They needed a secure solution, something that allows them and their users to share files securely without opening up any firewalls. GoAnywhere provided that centralization and the security that they needed, at the same time allowing their authorized users to better control and see their file movements. All right, let me jump into a quick demonstration. And the focus here is around the solution, a centralized solution, giving the tools that you need to be better, more successful in transferring files securely.

Demo

What you're looking at here is that actually the GoAnywhere MFT as the point of view as an administrator and an admin who sets us up and just really quickly, you have one page, one centralization, one dashboard, they can see what's happening in your server. So at a quick glance, I can make sure my listeners are up and running. I can see my status. These are my jobs, users are logged in and a lot, lot more, get a very quick glance, but to kind of walk you through some of the ops on the top here. And if you guys would like to have a little deeper dive and understand a little more about the functionality capability, we would love to give you a demonstration of it as well, but just kind of walking through it. We've got the home, which is where I started here. We've got our initial dashboard. Then we have resources.

Resources, what you'll see here is that it's one place has kind of defined that connection to different servers using the different protocols. Within these resources is one place to set them up, one place to manage them, one place to test them. You can see, we have S3 buckets, your different AS2, 3 and 4 type servers, Azure Blob Storage, et cetera. All these different resources can be set up. Your network shares are very common as well, to be able to access different shares, to share files back and forth. And I would say probably one of the most common type of connections are through secure FTP and as I stated, it's one place to set up, one place to manage and one place to even test these connections. So you can set them up to find them what's required, the IP address, the DNS name, profile password, maybe even a key, again a centralized solution that provides the key management.

So we have a built in key vault. In this example, the key vault up here would actually have that SSH key from that user that we need to use to connect to the server. Once it's in the key vault, we just select it. That's it. And then as I mentioned, test it. We want you to be able to set them up, test it right from one location, and blue is good. All right, once we have the resources set up, we have workflows. This is where you can start creating these projects, the step by step process that you need to follow. So we create these projects, and then after that, we get into more of the automation where you schedule it, monitor a folder for documents you've picked up or set up some trigger events to react to users into your server, and to instantly react to what they're doing, if they're uploading a file or downloading a file.

Just a quick little example here today in a project, from this project, you have different folders, different things you can set up or different folders you can set up to help manage these projects, create a folder, sub folder by customer, a region, a department, it's up to you guys. Here, we have a folder. We have a few interim projects in there. And let me just kind of walk you through on really quickly here today. And we do have different ways to help you build these projects. We have templates too as well to make it even easier. But just to give you a quick walkthrough, we have a timestamp in today's date format of which you can use maybe to rename a file, create a directory with today's date on it, whatever it might be. Using a P2P encrypt task, that's over here in the left hand side, expand the P2P. There's that encrypt task. You can easily drag and drop or double-click to bring that action that task into your workflow.

We got the files that need to be encrypted, maybe apply a filter in to include or exclude certain files, but also take note of the key. When you're crippling someone's file or documents, they're going to share their public key with you. Again, put in the key vault and select the right key to encrypt it with, and then we're going to deliver it as needed. And this one here, I'm just kind of put into a temporary space, but I am keeping track of them through a variable. Variables will make it easy, easy to manage more powerful in the long run. Because of these variables here, we have encrypted files created, just whatever you want to call it. I'm going to do a next step here to transfer these encrypted files to my trading partner, because of that remote server. Select that resource, as you would define it earlier from a dropdown list. Transfer those files.

Here, I'm using that variable that was created in the previous step, again keeping track of those files, that encrypted. And then I am transferring the files to that remote server. Simply put, click on those three dots browse, and it actually uses that resource you've defined or selected earlier. I'm on that remote server. It's really easy to build that path up and transfer it. You can also do additional steps. Here, we have a transfer. Maybe you want to archive those files also from an archive folder. That's where I'm putting today's date on it. Typically I would have then maybe as an option, delete or move those files, up to you guys how you want to do it. This is my test system, so I don't want to delete them, but it's real easy. Using variables, I can go back and quickly clean them up and then just a little temporary workspace, but you can validate the high level.

Does it look good? Yes. There we go. Execute it. And you can actually run this project. Again, in the long run you want to automate it as I talked about earlier. Set the scheduler, or set up a folder monitoring to do that all from the same tool. There it is. Blue is good, go to the job log and you can verify exactly what just happened. Four files encrypted, kind of just going through quickly here, four files are uploaded to my roll up server. They're all P2P files, et cetera, and even copied, archived with today's date on it and things like that. So as you can see, all these different things are happening pretty easily and all the tracing auditing that's built into it.

All right. So that's a quick little walk through of the workflow. One thing I forgot to mention that I do want to show you too as well, because these tools like GoAnywhere, this one here provides some really great outstanding built-in help, a solution that can quickly you click on this little question mark has built in application level help, it's content aware. It knows what you're looking at. It knows that I was looking at the secure FTP task and you can get some quick help on that. So again, a solution that gives you all the information that you need, some detailed information, screenshots, and sometimes several examples to help you out. All right, so that will get those workflows again. Next thing you look at your automation pieces there from the scheduling monitors services. So now I'm kind of switching gears for going through it to also act as a listener, the server side for users to cut to your server, using different protocols, one place to set it up and manage them as well.

Then it's all about the user themselves. You have your administrators, the admins here as I'm doing right now, but also the users that need to share files with you. We group them together as a web user, but they can be using secure FTP with FileZilla or SEP, but then also just, I'll give you a quick note here. We have different templates into groups, help you set them up and manage them to find different login methods as I mentioned earlier, to be able to utilize active directory, LDAP, RSA ready, RSA, Okta, et cetera, or turn on multifactor. Reporting to be able to look and run different reports, to see what's happening on your server, to automate the distribution of the reports, to be able to sub SLA as a service whole of agreements, your audit logs, to be able to drill into the auto-lock, seeing what's having it on your server in one area.

You can easily export information. You can also apply filters to help you find what you're looking for. You can also break down the service logs by different protocol types to see what the users are doing based on that protocol type, downloading, et cetera, what they're downloading, what IP address they're running from, et cetera, more and more. To find different login settings. What do you want to do there? Or your log setting, excuse me, encryption. As I mentioned, GoAnywhere provides a built in KMS, key management system that allows you to manage your certificates, your SSH, and your P2P keys from one area where you can import, you can create new key pairs very easily. So again, add key pairs, import whatever you need to do as well. Encrypted folders, to set files at rest being protected with AES 256 bit encryption, the system to set up different security settings like FIPs 140-2, to defining some odd IP blacklisting and then additional help. So again, one solution that gives a lot of information there. All right, I'm going to jump out of there. Hopefully I gave you some quick ideas of what GoAnywhere can do. At this point, I'm going to kind of start hand things back to Angela to see what kind of questions we may have out there on the floor.

Q&A

Angela:

Excellent. Thank you so much, Heath. Great job, both you and Michael. I appreciate your time. We have a couple of questions. I know that we have been answering them live in the GoToWebinar platform, but for the greater group, I think we can also ask them here too. So couple things, first one for AD integration, can you integrate with multiple clients AD so that they can all potentially use SSO?

Heath Kath:

Yeah. Great question, absolutely. And absolutely, you can define the different types of authentication methods and you can define them for different users, not just the admins versus the web users as we call them, but individual users within that group too. So we can define them as needed. And if you want more permission to want that, we definitely will reach out to as well.

Michael Barford:

That's nice, just to echo on that as well. You can filter through different groups within AD as well. So you can filter, I guess you can connect into different AD environments, as well as filtering through the groups. So you can have multiple different types of groups and different types of users set up. So if you've got things like support personnel, and then you might want to be doing password resets and then developers who wants to do things with those workflows, you can kind of split them out that way.

Angela:

Lovely. Next question, if services aren't running and alerts generated, excuse me, if services aren't running, are alerts generated or integrations with monitoring tools such as SolarWinds?

Heath Kath:

Good question. And you know, that's one thing I didn't highlight and I should have, because it's something I really believe in that every process, every job should have some type of alerts set up. You want to be informed. I mentioned a little bit about SLAs, but going beyond that, you want to be informed if things are successful. You can be informed if things fail and yes, SLAs is something didn't happen that should have. If a file is supposed to arrive by a certain timeframe, be notified, but also these services, I mean, alerts and logs, they're built right into GoAnywhere and you can set up and customize these alerts to notify you if you can't cut to a server that you're monitoring.

Again, if the files don't arrive, if GoAnywhere is being started or shut down, you can be notified just to expand to about keys. You can set up automated alerts to inform you in advance if a P2P key or certificate is about to expire so you can define it to notify you in say 10, 20, 30 days, whatever advance. So you can take that time to go out there and rebuild and refresh those keys and to expand a little more and taking some of Michael's thunder here, because I know he wants to talk, but GoAnywhere, it can also integrate with SIEM, different platforms. You can push these logs to your own SIS log server, if needed to.

Michael Barford:

Yeah, absolutely. I mean you did, I didn't get to mention it. You did a great demonstration there. One thing I do want to mention is in the actual workflows themselves, you can incorporate your own error handling. You can say when particular tasks are going to error, you can look out for the certain, I guess, responses or kind of behaviors that you're probably expecting. And with that information, you can then put in place logic to really extend how you're going to run free processes because ultimately, any kind of job you're doing is going to have some sort of process which needs to handle or incorporate some sort of error handling. And it might be a case of just popping a message into an MQ. It could be sending an email out or it could be sending an SMS message, but there's a number of ways you can incorporate that into there.

Heath Kath:

Yep. And I've been coming across a lot of users that want a successful message. So the other is what files were just picked up and transferred. So they want to keep track of what files have been picked up and moved so they can be alerted either when it happens or at the end of the day, a report gets sent out. Thank you for those questions. You have really good ones.

Angela:

Excellent. Well, if there are any other questions that weren't answered during the presentation, please feel free to submit those during that survey that will pop up at the close of today's session. Michael, Heath, thank you so much for the great presentation and demonstration, and please feel free to fill out that survey after that pops up here at the close of the event. And we'll be sending that recording out to you shortly. So thank you everyone for your time and we'll be signing off.

Heath Kath:

Thanks everyone. Michael, great job as well. Appreciate your help.

Michael Barford:

Thank you everybody. Likewise.

Heath Kath:

Take care. Bye bye.

Angela:

Bye.

Ready to See GoAnywhere in Action?

Schedule a live demo. Choose from our 15-, 30-, or 60-minute options to pick the level of detail that works best for you!

Schedule My Demo