Resources

Article

Mac OS X

Easily install Open PGP Studio on a Mac with a few simple steps.
Article

Linux and Unix

Follow these easy instructions for installing GoAnywhere Open PGP Studio in a Linux or Unix-based operating system.
Article

How to Encrypt Files with PGP

File encryption is easy using any of the PGP keys in your Open PGP Studio key store. Learn the process of how to encrypt a file or folder within GoAnywhere.
Article

Encrypt and Sign Files

Text The Open PGP Encrypt and Sign option encrypts and authenticates the file. The file will be encrypted with the public key of the person to whom it is sent and it will be signed with your PGP digital signature created from your own secret key. This...
Article

Decrypt and Verify Files

Text The "Decrypt and Verify File(s)" option in Open PGP Studio allows you to decrypt a file and verify its signature with just a few steps. You will need the corresponding secret key of the PGP public key used to encrypt the files or folders to decrypt a...
Product Video

Open PGP Encryption

Video Transcript: GoAnywhere supports Open PGP compliant encryption technology, allowing you to automate the encryption, signing, verification, and decryption of your files with PGP. Let's take a look at how GoAnywhere can encrypt and sign a file. Here is an example of a file containing information that needs to be encrypted before it is transmitted to a trading partner. On...
On-Demand Webinar

How to Automate Your PGP Encryption

About the Webinar Are you using a free PGP encryption tool? Now it's time to take file transfers to the next step! Although free tools like OpenPGP Studio are a great option, GoAnywhere helps to automate file transfers securely and can save crucial time, plus so much more! This webinar focuses on automating your PGP encryption, touching on the negatives that can come from...
Blog

How to Send Big Files Quickly

  Image Big and fast. Speedy and large. It’s a combination that’s sometimes tricky to execute, especially when it comes to sending large data files rapidly. Do you sacrifice speed? Do you risk having files interrupted mid-stream? Or do you roll the dice and hope your file won’t be rejected from the starting gate? You don’t have to...
Blog

Best Practices to Share Large Files for Work

  Image There are thousands of ways you could share large files, both with your colleagues or with friends and family: you can choose from half a dozen popular file storage and synchronization services, specialized one-time services, or even email. But there are some differences in best practices when it comes to personal versus work...
Blog

What is PGP Encryption and How to Use It

  Image Encryption is key to securing organizational data in the short term and long. However, there are a few different types of encryption that organizations can use to achieve the optimal level of security. GnuPG is one of the most notable. However, today we’ll break down how PGP encryption works and how to use it to maintain the...
Blog

What is PGP and How Does It Work?

  Image When someone in your organization wants to transfer a file – internally or outside of the organization – a few concerns may come up: Is the file complete? Is it being sent to the right place? Will it arrive intact? Is sensitive data protected and encrypted from unauthorized recipients? All are valid concerns, and each can...
Blog

Improve Your Big Data File Transfers: 11 Security Features to Consider

  Image New challenges and new opportunities have arisen due to big data, which is altering the nature of file transfer technology. The Good News Big data is leading to new file sharing technology, which is making it easier to solve certain big data file transfer problems. On the other hand, it is increasing the bandwidth...
Blog

PGP vs. Open PGP: What’s the Difference?

  Image   Encryption standards become more and more important every day. With the rise of data breaches, it’s critical now more than ever for organizations to raise the level at which they protect their information. Partly, educating employees has presented itself as an easy way to make data safer. However, taking the time to choose...
Blog

Should You Use PGP or GPG Encryption?

  Image Not every piece of information is meant for every pair of eyes. That’s why organizations count on encryption technology – to lock down their sensitive data from malicious acquisition or even human error. And, when it comes to those encryption protocols, you’ve got options. One choice you or your IT team might need to make is...
Blog

What is GPG?

  Image What is GPG? GPG, also known as GNU Privacy Guard (GnuPG), is a different adaption, but popular implementation of the Open PGP standard as defined by RFC 4880. GPG in Depth GPG is an open-source standard and strong alternative to the official PGP software owned by Symantec. It was developed by Werner Koch and released in...