Resources

Article

Verify Files

Learn how to verify the Open PGP digital signature using a public Open PGP key created or imported to a key store.
Article

Sign Files

Learn how to use Open PGP to sign your files using your secret key to add an extra layer of security for sensitive data.
Article

Key Preferences

With PGP Key Preferences in GoAnywhere Open PGP Studio, learn how to quickly choose which algorithms you want to support with your keys.
Article

Key Manager

The Open PGP Key Manager is your first stop for organizing all your PGP keys. Learn more about the features that you can use.
Article

Microsoft Windows

Installing GoAnywhere Open PGP in Windows is a simple process. Follow these instructions to learn how to easily install GoAnywhere Open PGP Studio in Windows in minutes.
Article

Mac OS X

Easily install Open PGP Studio on a Mac with a few simple steps.
Article

Linux and Unix

Follow these easy instructions for installing GoAnywhere Open PGP Studio in a Linux or Unix-based operating system.
Article

How to Encrypt Files with PGP

File encryption is easy using any of the PGP keys in your Open PGP Studio key store. Learn the process of how to encrypt a file or folder within GoAnywhere.
Article

Encrypt and Sign Files

Text The Open PGP Encrypt and Sign option encrypts and authenticates the file. The file will be encrypted with the public key of the person to whom it is sent and it will be signed with your PGP digital signature created from your own secret key. This...
Article

Decrypt and Verify Files

Text The "Decrypt and Verify File(s)" option in Open PGP Studio allows you to decrypt a file and verify its signature with just a few steps. You will need the corresponding secret key of the PGP public key used to encrypt the files or folders to decrypt a...
On-Demand Webinar

Manage, Sanitise and Secure your File Transfers

About the Webinar Anti-virus engines are good. But not good enough. Did you know: 24% to 47% of malware attacks are missed by AV engines All of Australia’s major cyber incidents have involved malware not being detected by AV engines All files you receive from external sources, yes, even those trusted partners can be a potential source of malicious code infection. Watch...
On-Demand Webinar

Keep Your Data Secure with Clearswift and GoAnywhere MFT

About the Webinar Many organizations have secure file transfer requirements. However, encrypting the transmission of content is not always enough. The areas which often need to be fine-tuned are: Data loss prevention controls Granual rules for specific people, as opposed to givign everyone similar controls Restricting access to sensitive content Enhanced decision-making If...
On-Demand Webinar

Is Your Remote Workforce a Top Security Risk?

Comfy clothes. No commute. Zoom meetings. File exchange security threats. One of these things does not belong in your remote workforce environment. The ever-increasing number of employees working remotely at least part of the workweek poses a top security threat to your organization, especially when sensitive files are being exchanged. If your organization does not currently...
On-Demand Webinar

Improving Data Security Through GoAnywhere MFT Integrations

Fortra’ GoAnywhere MFT helps move and share data securely, to meet critical trading partner and auditor requirements. But did you know the GoAnywhere MFT solution is part of a powerful data security suite that includes integrations with threat protection, Data Loss Prevention (DLP) controls, Data Classification, and large file transfer acceleration products? During this...
On-Demand Webinar

How to Think Like a Hacker and Secure Your Data

About the Webinar There’s no denying it: data security incidents are increasing. Organizations try to keep up with the latest cybersecurity best practices and technology, but the more they collect, process, and share large volumes of sensitive information, the more chance they have of getting hit by a cyber threat. In response, most IT teams play defensive. They create data...
On-Demand Webinar

How to Prevent Data Breaches with GoAnywhere

About the Webinar It’s easy to feel frustrated when discussing data breaches and cybersecurity incidents. Organizations dedicate time and money annually to improve their security strategies, but hackers move forward too, creating new hacking methods that keep IT professionals on their toes. Staying two steps ahead of today’s cyber threats is hard. IT and security teams can...