Resources

Blog

Managed File Transfer 101: What's in it for Me?

  Image Note from the Editor: This blog is a recap of an older webinar. To view the most recent webinars, you can do so here. Meet MFT The term MFT (Managed File Transfer) is not new, but you may have begun to hear it more frequently. Changes in data security and transmission regulations have brought this established...
Press Release

Clustering, Bandwidth Throttling and Disk Quotas Added to GoAnywhere MFT

Omaha, Neb - August 20, 2013 Linoma Software has released a major new version of the GoAnywhere Managed File Transfer suite to provide more enterprise-level features for its customers with automatic failover, load balancing and more management controls.  The new 4.5.0 release of GoAnywhere Director adds clustering to provide organizations an "active-active" environment where...
Blog

Keeping File Transfers Secure from Hackers and Cyber Threats

  Image Keep Your Files Secure In the battle to secure information, it helps to know a little bit about how it can be compromised. Using FTP is one way to expose critical vulnerabilities and can allow credentials to be hacked. However, these holes in security can also be easily closed if you know how. How Hackers Discover...
Blog

How to Solve 4 Common Email Security Challenges

  Image Yes. Emailing someone is still one of the easiest ways to share data. However, there are some important caveats to sharing files this way that can put your organization’s file transfers at risk. Email File Transfer Challenges These are the four big challenges that organizations should be aware of when transmitting files via...
Press Release

Virtual Folder Highlight GoAnywhere Services 3.0

Omaha, Neb - September 26, 2012 Accessing files quickly across growing storage networks while ensuring data remains secure is crucial for any company in today's business environment. The latest release of GoAnywhere Services 3.0 with its new "Virtual Folders" feature and network shares option makes secure online access to information seamless for the end user and easy to...
Blog

How to Build a Framework for HIPAA and HITECH Compliance

  Image HIPAA, established in 1996, was signed into law to outline the appropriate ways to use and disclose patient health information. Read on to learn how to develop a HIPAA- and HITECH-compliant IT framework for your organization.   Why Does HITECH Exist? HITECH laws were enacted to up the ante on healthcare organizations to...
Blog

Addressing HIPAA and HITECH Compliance Challenges

  Image HIPAA and HITECH regulations were designed and enacted to increase the security surrounding personal health information from those who should not have access to it. Next to finance, the healthcare industry is one of the most regulated industries around. While debates on the cost, structure, and delivery of healthcare...
Blog

Are Insurance Companies Managing Their Risk of Data Breach?

  Image   Insurance companies are the experts at analyzing and managing risk. They identify, quantify, and set pricing based on the calculated costs of risk. Naturally, the higher the perceived risk, the higher the cost to mitigate the potential losses.   Yet, here is the irony. While those in the insurance industry excel at...
Blog

Is Your Company Letting Data Slip Through the Cracks?

  Image Many Americans have spent the last few days frantically searching for receipts and other documentation to finish their taxes before April 15th — only to realize they get a one-month reprieve this year. Despite that sigh of relief, there's no doubt that some of those people thought they knew exactly where to find what they...
Blog

How Important is Auditing Your File Transfers?

  Image When you send someone a file using FTP, how do you know (and later prove) that it was successfully sent? Consider the Complexities It might be possible to save a screenshot as long as the process was simple and you can see all the commands on a single screen. But what if your commands start getting complex? And if you start...
Blog

What Makes FTP an Outdated Security Method

  Image Why is FTP an Outdated Protocol? FTP was designed as an easy mechanism for exchanging files between computers at a time when networks were new and information security was an immature science. In the 1970s, if you wanted to secure a server from unwanted access, you simply locked the computer room door. User access to data...
Blog

Meeting Compliance Regulations and Privacy Laws for Sensitive Data Transfers

  Image Comply with Data Security Requirements Highly sensitive data is exchanged between organizations on a constant basis making data security compliance more vital than ever to keep communication flowing. For instance, if a business routinely transmits financial information to their bank including payroll direct deposits and...
Press Release

Managed File Transfer Solution for IBM System p and System z

(October 20th, 2009) - Linoma Software [now Fortra] is proud to announce that its GoAnywhere Managed File Transfer (MFT) solution has been validated to run on IBM System p and System z platforms. Linoma worked with IBM through a special program, named Chiphopper, for the validation testing of GoAnywhere. Through the Chiphopper program, IBM provided Linoma's engineers with the...
Press Release

Linoma Software [now HelpSystems] release New Solution for Managed File Transfers

(Ashland, NE) - August 24, 2009 - Linoma Software [now Fortra] proudly releases GoAnywhere Services - a new collection of secure data transfer services for your enterprise. GoAnywhere Services allows trading partners (e.g. customers, employees, vendors, etc.) to securely connect to your organization for exchanging files, documents and other types of data. This innovative...