Resources

Blog

A Perfect Match: GoAnywhere MFT and Open PGP

Image As companies face increasing pressure to keep data safe, encryption protocols like Open PGP provide an increased level of security to do so. An open-source version of PGP (Pretty Good Protection), Open PGP delivers the same level of protection in a publicly available format. Because of its high availability, it enjoys widespread...
Article

Verify Files

Learn how to verify the Open PGP digital signature using a public Open PGP key created or imported to a key store.
Article

Sign Files

Learn how to use Open PGP to sign your files using your secret key to add an extra layer of security for sensitive data.
Article

Key Preferences

With PGP Key Preferences in GoAnywhere Open PGP Studio, learn how to quickly choose which algorithms you want to support with your keys.
Article

Key Manager

The Open PGP Key Manager is your first stop for organizing all your PGP keys. Learn more about the features that you can use.
Article

Microsoft Windows

Installing GoAnywhere Open PGP in Windows is a simple process. Follow these instructions to learn how to easily install GoAnywhere Open PGP Studio in Windows in minutes.
Article

Mac OS X

Easily install Open PGP Studio on a Mac with a few simple steps.
Article

Linux and Unix

Follow these easy instructions for installing GoAnywhere Open PGP Studio in a Linux or Unix-based operating system.
Article

How to Encrypt Files with PGP

File encryption is easy using any of the PGP keys in your Open PGP Studio key store. Learn the process of how to encrypt a file or folder within GoAnywhere.
Article

Encrypt and Sign Files

Text The Open PGP Encrypt and Sign option encrypts and authenticates the file. The file will be encrypted with the public key of the person to whom it is sent and it will be signed with your PGP digital signature created from your own secret key. This...
Article

Decrypt and Verify Files

Text The "Decrypt and Verify File(s)" option in Open PGP Studio allows you to decrypt a file and verify its signature with just a few steps. You will need the corresponding secret key of the PGP public key used to encrypt the files or folders to decrypt a...
Blog

7 Scenarios in Which to Use Encryption Software

  Image Not sure what encryption software is used for – or maybe just when to use each type? Discover common file transfer scenarios and which data encryption protocol best fits your needs.   What is Data Encryption Software? Data encryption software, also called file encryption software, solutions come in various forms: free or...
Blog

What is PGP Encryption and How to Use It

  Image Encryption is key to securing organizational data in the short term and long. However, there are a few different types of encryption that organizations can use to achieve the optimal level of security. GnuPG is one of the most notable. However, today we’ll break down how PGP encryption works and how to use it to maintain the...
Blog

PGP vs. Open PGP: What’s the Difference?

  Image   Encryption standards become more and more important every day. With the rise of data breaches, it’s critical now more than ever for organizations to raise the level at which they protect their information. Partly, educating employees has presented itself as an easy way to make data safer. However, taking the time to choose...
Blog

Should You Use PGP or GPG Encryption?

  Image Not every piece of information is meant for every pair of eyes. That’s why organizations count on encryption technology – to lock down their sensitive data from malicious acquisition or even human error. And, when it comes to those encryption protocols, you’ve got options. One choice you or your IT team might need to make is...
Blog

What is GPG?

  Image What is GPG? GPG, also known as GNU Privacy Guard (GnuPG), is a different adaption, but popular implementation of the Open PGP standard as defined by RFC 4880. GPG in Depth GPG is an open-source standard and strong alternative to the official PGP software owned by Symantec. It was developed by Werner Koch and released in...
Blog

How a Remote Workforce Impacts Your Data Security

  Image You did it. Many months ago, you sent your employees home armed with their laptops, a few passwords, and a couple of Zoom invites. Now, hunkered down in their stretchy, comfy clothes, thankful for not having to commute, they’re carrying on the day-to-day business responsibilities for your organization. But is it really...
Blog

Why You Should Use File Encryption Software

  Image   File Encryption Software is “Key”   What is the key to keeping your data safe? One word: Encryption. There’s no question that encrypting sensitive data at rest and in motion is essential when it comes to guarding against cyber threats and complying with local, national, or industry-standard requirements. However, if you...