Resources

Product Video

Project Workflows

The advanced interface in GoAnywhere MFT makes it easy to quickly build and manage your projects. The project designer is built around four main work areas. The component library is where you'll find project tasks organized by function. Just expand a pane, and then drag the component to your outline. Or double click an element to drop it right into the workflow. The project outline is a visual...
Product Video

GoAnywhere MFT Overview

If secure file transfers are critical to your organization, and you're tired of juggling multiple tools to manage the exchange of data between trading partners, vendors, customers and employees, GoAnywhere Managed File Transfer is your all-in-one solution. Unlike complicated scripts or legacy programs, GoAnywhere MFT easily automates and manages file transfers using modern data security...
Product Video

GoAnywhere MFT on Windows

GoAnywhere MFT is a Managed File Transfer solution, which streamlines the exchange of data between your systems, employees, customers, and trading partners. It provides a single point of control with extensive security settings, detailed audit trails and reports. GoAnywhere MFT's intuitive interface and comprehensive workflow features will help to eliminate the need for custom programs, scripts,...
Product Video

GoAnywhere MFT 3-Minute Demo

Watch this short demonostration to see how you can simplify and secure your file exchanges with GoAnywhere MFT. See the customizable dashboard in action, learn how MFT helps to automate and centralize your file transfer processes, and see how GoAnywhere can take you beyond MFT. ...
Product Video

Video Tour: Agents

GoAnywhere agents provide real-time remote workflow and file transfer capabilities that are controlled from a central GoAnywhere MFT server. Agents can run multi-step workflows on the systems where they are installed. These workflows can securely transfer or archive files, translate data, work with databases on the system, execute native commands, or perform other local file system tasks. ...
Blog

PCI DSS 4.0 - What to Expect, What's Coming, How to Comply

  Get ready for more stringent PCI DSS compliance requirements. The PCI Security Standards Council (PCI SSC) updated its version 4.0 requirements in March 2022, in large part to address increasingly sophisticated cybercriminal threats. Rapidly growing contactless and cloud-based card usage also helped nudge an update to PCI DSS requirements, which were...
Blog

Security Risks of File Transfers and How to Reduce Them

  Transferring files between customers and trading partners, especially files containing sensitive data without appropriate data security protection solutions applied, involves at least some level of risk. You might accidentally send files to the wrong recipient. Or your latest email attachment was sent with an unsecure File Transfer Protocol (FTP)...
Blog

How to Secure Your Data Exchanges

  Exchanging Data Securely Requires Stepped Up Data Transfer Methods Exchanging data is easy, right? Just grab a file, attach it, and hit “send.” Then sit back and relax. Not so fast! If you want to securely exchange data and protect any sensitive data your files may contain, you need to send them with a secure file transfer solution that protects...
Blog

What Do Emerging Data Privacy Laws in the U.S. Mean for You?

  What is Data Privacy? One can think of data privacy as all the processes involved in how confidential or personal information or data is collected, used, and shared or governed. No singular policy governs data privacy, with requirements and penalties varying across states and countries. Data privacy laws are legal constructs that set clear lines...
Blog

Largest Data Breaches in Last 10 Years

  Bigger is often better. A bigger slice of pizza or a bigger paycheck sounds pretty nice. An extra-large data breach, not so much. Listing out the biggest data breaches of all time can be challenging, as the next big one could be right around the corner. At the time of this writing, reports are out that the Personally Identifiable Information (PII)...
Blog

Lessons Learned from the REvil Ransomware Attack of 2021

  Fireworks lighting up the sky, the smell of backyard grills cranking out delicious food, and organizations reeling from massive global cyberattacks. Aaah….those not-so-sweet memories of that first weekend in July 2021, when hundreds of businesses were smacked with the financial, logistical, and reputational ramifications of ransomware attacks. While...
Press Release

GoAnywhere Director was upgraded and renamed to GoAnywhere MFT.

In July of 2015, GoAnywhere Director was upgraded and renamed to GoAnywhere MFT, which is the next evolution in Managed File Transfer technology. GoAnywhere MFT merges workflow automation capabilities (adapted from GoAnywhere Director) with secure FTP server and collaboration features (adapted from GoAnywhere Services). This provides customers with a unified browser-based interface, centralized...
Blog

This Month in Cybersecurity: Summer is Here, but There’s No Vacation From Cyberattacks

  June generally marks the start of summer, although anyone thinking the cyber criminals will take a few months off should probably think again. Not only has one of most sacred of summer institutions – Wimbledon – been subject to a threat, but fresh attacks and threats emerged all over the world. It’s clear that organizations must remain vigilant and...
Blog

What is the Smominru Botnet?

  What is the Smominru Botnet? Though its origins date back to 2017, Smominru is a dangerous botnet that has been making headlines recently as it continues to spread, attacking targets in every industry. Smominru, which also operates under known variants like including Hexmen and Mykings, has infiltrated hundreds of thousands of machines, primarily...
Press Release

Taking Steps to Proactively Address Supply Chain Security Risks

MINNEAPOLIS – June 29, 2022 – In The Logistics Point, Chris Spargen looks at how secure managed file transfer can help organizations combat data loss security risks in the supply chain. Excerpt: “For cybercriminals, supply chains represent a highly tempting target. These highly connected systems often involve the control of millions of pounds worth of payments and shipped goods. All it takes is...
Blog

End-to-End Rights Management Made Simple with SFT

  Digital files are the crown jewels of any organization, and end-to-end rights management is increasingly the goal of businesses who need to transfer files securely. How can organizations ensure data is secure from inception to publication, especially when third parties enter the picture? Enter secure file transfer plus digital rights management....
Press Release

GoAnywhere Recognized as 2022 Top Performer in Managed File Transfer by SourceForce

MINNEAPOLIS – May 18, 2022 – Fortra today announced that its managed file transfer (MFT) solution GoAnywhere has been awarded a Spring 2022 Top Performer Award by SourceForge. The award recognizes exceptional companies and products with a significant number of favorable user reviews on the SourceForge website. “We’re delighted to see customers continue to validate GoAnywhere as the leading...
Blog

Is Your Disaster Recovery Site Ready?

  The old adage, "It's not a matter of if, but when" can strike fear in the heart of every IT professional, especially when talking about recovering form the unexpected impact of outages. Whether the result of a natural disaster, cybercrime impact, or large-scale network outages that dreaded downtime and the security measures that need to be taken...
Blog

How GoAnywhere MFT Works with SharePoint

  Data and documents are the lifeblood of the business and sharing that data to both external trading partners and internal stakeholders is essential. Discover how GoAnywhere works with one of today’s favorite intranet sites for teams and file sharing: SharePoint. What is SharePoint? SharePoint helps teams meet various business needs by providing...
Blog

How to Streamline Secure Data Exchanges

  Secure Data Exchanges Don't Have to Sacrifice Efficiency Hitting “send” is as routine and frequent as sipping on coffee for many employees. And uploading a file to a third-party, vendor, or another colleague happens with that same automatic mind-set. Outside of the IT team, many employees don’t actually give a lot of thought to the journey of the...