Resources

Blog

A Perfect Match: GoAnywhere MFT and Open PGP

Image As companies face increasing pressure to keep data safe, encryption protocols like Open PGP provide an increased level of security to do so. An open-source version of PGP (Pretty Good Protection), Open PGP delivers the same level of protection in a publicly available format. Because of its high availability, it enjoys widespread...
Blog

Education Industry: How MFT Can Help Stretch Resources

Image Educational institutions, from preschools to university systems, face increasing pressure on budgets as well as personnel lately. When every minute and every dollar counts, bolstering existing resources where possible can offer a bit of relief. One way to stretch those human resources is by automating some of the tasks that are...
Blog

Is FTPS HIPAA-Compliant?

Complying with stringent HIPAA requirements requires strong encryption protocols. GoAnywhere MFT utilizes FTPS, the more commonly used SFTP, and other protocols for secure file sharing.
Article

Verify Files

Learn how to verify the Open PGP digital signature using a public Open PGP key created or imported to a key store.
Article

Sign Files

Learn how to use Open PGP to sign your files using your secret key to add an extra layer of security for sensitive data.
Article

Key Preferences

With PGP Key Preferences in GoAnywhere Open PGP Studio, learn how to quickly choose which algorithms you want to support with your keys.
Article

Key Manager

The Open PGP Key Manager is your first stop for organizing all your PGP keys. Learn more about the features that you can use.
Article

Microsoft Windows

Installing GoAnywhere Open PGP in Windows is a simple process. Follow these instructions to learn how to easily install GoAnywhere Open PGP Studio in Windows in minutes.
Article

Mac OS X

Easily install Open PGP Studio on a Mac with a few simple steps.
Article

Linux and Unix

Follow these easy instructions for installing GoAnywhere Open PGP Studio in a Linux or Unix-based operating system.
Article

How to Encrypt Files with PGP

File encryption is easy using any of the PGP keys in your Open PGP Studio key store. Learn the process of how to encrypt a file or folder within GoAnywhere.
Article

Encrypt and Sign Files

Text The Open PGP Encrypt and Sign option encrypts and authenticates the file. The file will be encrypted with the public key of the person to whom it is sent and it will be signed with your PGP digital signature created from your own secret key. This...
Article

Decrypt and Verify Files

Text The "Decrypt and Verify File(s)" option in Open PGP Studio allows you to decrypt a file and verify its signature with just a few steps. You will need the corresponding secret key of the PGP public key used to encrypt the files or folders to decrypt a...
Blog

What Do Emerging Data Privacy Laws in the U.S. Mean for You?

  Image What is Data Privacy? One can think of data privacy as all the processes involved in how confidential or personal information or data is collected, used, and shared or governed. No singular policy governs data privacy, with requirements and penalties varying across states and countries. Data privacy laws are legal constructs...
Blog

HIPAA vs. HITRUST: The Key Differences

  Image   What is HIPAA?   HIPPA, or the Health Insurance Portability and Accountability Act, is a federal law that addresses regulatory compliance for healthcare organizations. HIPAA sets the standard for protecting sensitive patient data and applies to any company that deals with protected health information (PHI). HIPAA...
Blog

What is HITRUST Compliance?

  Image HITRUST Compliance Helps to Manage Risk The secure storage and transfer of sensitive data is of the utmost importance to the healthcare industry. Data security and complying with the Health Insurance Portability and Accountability Act (HIPAA) is paramount, yet doing so can often be complex and difficult to maintain. This is...
Blog

Cybersecurity Concerns in Healthcare in 2022

  Image Every year the healthcare industry is greeted with headlines stating that ‘last year was the most-breached ever.’ And that trend is unlikely to stop in 2022. The healthcare industry has historically been one of the most-targeted by hackers, and one of the most breached by internal actors. Key reasons why include vast amounts...
Blog

What is PGP Encryption and How to Use It

  Image Encryption is key to securing organizational data in the short term and long. However, there are a few different types of encryption that organizations can use to achieve the optimal level of security. GnuPG is one of the most notable. However, today we’ll break down how PGP encryption works and how to use it to maintain the...