Resources

Blog

Still WFH? Time to Revisit BYOD, Security, and More

  Work from home, which was once an early-pandemic precaution, is becoming a norm across industries. It is likely that the pandemic has shifted how people work forever, with half of employees expecting to work predominantly from home or in a hybrid home-and-office system going forward. However, just as in the early days of the pandemic, cybersecurity...
Blog

Looking to 2022: New Year, New Data Security Strategies

  3 Data Centric Security Strategies for 2022 Despite massive growth in data security spending, the number of data breaches is increasing. With constant changes in how and where work is done—thanks in part to growth in both cloud computing and mobile device usage—the threats are changing, too. And so are the strategies taken to mitigate those threats....
Blog

Dropbox File Transfer Acceleration

What is Dropbox? Dropbox is a file hosting and sharing service used both as a personal cloud storage solution and as a file collaboration tool for businesses. It supports most types of files, including text, video, graphics, and audio. Because Dropbox is cloud-based, you can use it from anywhere. This makes it a top choice for those who work from home or on location rather than in the corporate...
Press Release

GoAnywhere Achieves SOC 2 Type 1 Compliance, Reinforcing its Commitment to Data Security

MINNEAPOLIS – December 6, 2021 – GoAnywhere by Fortra announced today it has successfully completed the SOC 2 (System and Organization Controls) audit assessment for its managed file transfer (MFT) solution. Completing this audit assessment demonstrates Fortra’ commitment to ensuring customers have the highest level of cybersecurity possible as they transfer files. SOC 2 assessment completion also...
Blog

What is SOC 2 and Why it Matters for Security

  There are some things in life that should be a given: rollercoasters are inspected regularly, chefs wash their hands, and your organization’s file transfers are secure. That last is a little more nebulous to see immediate cause-and-effect (it’s not like your rollercoaster car rolling off the tracks or getting food poisoning!) but unsecure file...
Blog

Developing a Plan for Data Risk Management

  What is Data and Risk Management? Data and risk management encompasses the processes and procedures an organization follows to safeguard the data it collects and stores. Data is today’s biggest asset—and today’s biggest target. If your organization has data, no matter now little or how sensitive, it’s at risk for leakage, theft, or attack. Sorry,...
Blog

What is iPerf and How to Use It

What is iPerf? iPerf, which is short for Internet Performance Working Group, is an open-source speed test and network performance measurement tool. The mechanism is fairly simple: it creates TCP and UDP streams, and sends traffic from one host to another, then reports the maximum bandwidth to the user. This allows users to determine network throughput and top bandwidth speed. Originally called...
Blog

The Difference Between Data Privacy, Data Protection, and Compliance

  Data privacy, data protection, and compliance: they’re similar, but not the same. If you’re like most IT professionals, you may have used these terms interchangeably, and with good reason: all data privacy laws deal with protection, many data protection laws have privacy at their heart, and both outline compliance requirements. But what exactly is...
Blog

How Big Are Movie Files in 2022?

Gone are the simple days of moving pictures and practical effects. These days, movies are more sophisticated, with computer-generated special effects and high-resolution images. However, each addition to a film or episode adds to the file size, which can make both downloading for at-home viewing and the process of creating the project more complicated than ever before. While large movie files...
Blog

File Transfer for Live Events

There are many organizations that require the ability to transfer large files fast, sometimes in the moment, to manage the requirements of live events. Fast media file transfer is important for many organizations and events: as they say, time is of the essence and live events are no exception.   For organizations looking for a speedy solution to their live event needs, there is a solution that...
Blog

The Surprising Relationship Between Data Privacy Laws and File Sharing

  Location, location, location. Not just the mantra of realtors and would-be buyers – it’s also a concern for data security professionals world-wide. As cloud computing has ramped up across industries, the physical location of stored data has been called into question, alongside concerns stemming from data privacy laws. Read on to discover how data...
Blog

How to Transfer Files Faster

There are many options for transferring files but not all of them can complete file transfers quickly. When considering transfer distance length and bandwidth predicaments, the speed of file transfers can be called into question even more easily. So, what tools can organizations use to achieve file transfers at high speeds to save time and money without sacrificing core security functionality? If...
Blog

What’s the Number One Enterprise MFT Solution?

  Enterprise operations make critical decisions daily with an impact often felt around the world. One of those choices: selecting the right enterprise managed file transfer (MFT) solution to ensure all the data exchanged daily both internally and externally is secure and the exchange process is automated to maximize productivity. G2 Names GoAnywhere...
Blog

Need Fast File Transfers? FileCatalyst Delivers.

  Got a Need for Speed? FileCatalyst Can Deliver. “How fast?" If that’s the very first thing that comes to mind when thinking about transferring files, you clearly have a need for speed. And if file transfer speed is critical to your business operations, FileCatalyst by Fortra may be the right match for you. Fortra acquired FileCatalyst in early 2021...
Blog

How Managed File Transfer Supports SWIFT Compliance

  Any organization that handles sensitive financial data knows that secure transfers are essential to data security. Discover how a secure file transfer solution can support and enhance your SWIFT usage. What is SWIFT? SWIFT, short for Society for Worldwide Interbank Financial Telecommunications, is a leading secure messaging service for financial...
Blog

GDPR and its Relationship with Healthcare

    What is GDPR?   The General Data Protection Regulation (GDPR) establishes protections for the privacy and security of sensitive data for individuals in the European Union (EU). The data protection regulation was designed to harmonize data privacy laws throughout the EU and replaced the long-standing Data Protection Directive. GDPR regulations...
Blog

Who is Protecting Your Healthcare Records?

  Patient Privacy is in Jeopardy: Data Breaches, High Payouts, and PHI How important is a patient's privacy? If your organization is a healthcare facility, the instinctive answer that comes to mind is "Very important!" After all, a patient's privacy is the basis upon which a doctor/patient relationship is based. Right? When it comes to patient data,...
Blog

Why Banking Growth in Latin America Correlates with Cybercrime

    Bancarization is Exploding in Latin America Latin America is the fastest-growing banking market worldwide, and growth is only expected to continue. Forecasts are anticipating 10 percent increases across all Latin American banking sectors through 2022. Bancarization refers to both the amount of access and the degree of usage of financial services...
On-Demand Webinar

What’s New with FileCatalyst? June 2021

FileCatalyst partner webinar covering a product overview, how it fits into the Fortra MFT suite, recent product updates, and more! As of May 31, FileCatalyst Direct 3.8.3 is available. This webinar will highlight the key features most recently added to FileCatalyst Direct, such as: • New proxy mechanism for certain environments • Transfer improvements for files with reserved characters • New...
Press Release

Scammers Access 50% of Compromised Accounts Within 12 Hours According to New Research

FOSTER CITY, Calif. and LONDON (June 8, 2021) — Agari by Fortra, the market share leader in phishing defense for the enterprise, unveiled today the results of an investigation into the anatomy of compromised email accounts. The threat intelligence brief, titled Anatomy of a Compromised Account, is the first research of its kind, showcasing how threat actors use credential phishing sites to gather...