Resources

Case Study

AnMed Health Improves File Transfer Stability and Enjoys Significant Cost Savings Thanks to MFT

Industry: Healthcare As legacy FTP processes start to degrade, they slowly consume more and more IT resources. Most companies don't recognize the true enormity of the problem until it comes to a head. AnMed Health (Anderson Area Medical Center) recognized the inefficiency and risk of their file transfer operations and set out to find a replacement: GoAnywhere MFT. Reducing Staffing Resources...
Blog

Are SSH and SFTP the Same?

Are SSH and SFTP the Same? SSH and SFTP are a classic pair. They intertwine when it comes to securing communication, and while they have similar capabilities, they are not the same thing. So, what’s the difference between them? Read on to find out.   What is SSH? Secure Shell (SSH) is a transport layer that is used to secure logins and...
Case Study

Meliá Hotels International Gains File Transfer Stability and Confidence with GoAnywhere MFT

Adding GoAnywhere MFT to their IT environment for secure file transfers was the remedy Melia needed. GoAnywhere allowed Meliá Hotels International to integrate these third-party exchanges into the same tool as the rest of their transfers, without making any protocol changes, and with added security through its built-in SFTP and Secure Forms capabilities.
Case Study

Medical University of South Carolina

  The Medical University of South Carolina (MUSC) is South Carolina's only comprehensive academic medical center. We spoke with GoAnywhere customer Carl Gottlieb, Senior iSeries Analyst/Programmer at Medical University of South Carolina, while attending the 2014 COMMON Annual Meeting and Exposition. ...
Case Study

Monterey Mushrooms

    For Monterey Mushrooms, the e-mail notifications, the ability to automate projects, and the seamless version updates are just a few of Barabara Bularzik's favorite features with GoAnywhere. ...
Blog

Security Risks of File Transfers and How to Reduce Them

  Transferring files between customers and trading partners, especially files containing sensitive data without appropriate data security protection solutions applied, involves at least some level of risk. You might accidentally send files to the wrong recipient. Or your latest email attachment was sent with an unsecure File Transfer Protocol (FTP)...
Blog

Revoke Access to Your Files from Anywhere – Digital Rights Management (DRM) and How it Works

Your auditor sends a copy of your company’s recent financial statements to his firm to verify another clean pass. Because he’s worked there for years, he sends the file to his partner without encrypting it and leaves for the day. On his way home, his phone buzzes as an email notification comes in with the subject “Wrong Jeff?” Almost immediately, your...
Blog

What is High Latency File Transfer and Why Should You Use It

When taking off on a vacation, the less time spent traveling the better, right? A non-stop flight, versus one with iffy connections and layovers is the way to go whenever possible. There are fewer hiccups, and the overall experience is simply better. File transfers operating in a high latency network can be a bit like that multi-stop flight, with delays, missed connections, and a general bog down...
Blog

How to Secure Your Data Exchanges

  Exchanging Data Securely Requires Stepped Up Data Transfer Methods Exchanging data is easy, right? Just grab a file, attach it, and hit “send.” Then sit back and relax. Not so fast! If you want to securely exchange data and protect any sensitive data your files may contain, you need to send them with a secure file transfer solution that protects...
Blog

5 Things You Should Know About Digital Rights Management (DRM)

As the ongoing digital revolution continues to evolve the ways we do business, even the most standard practices of data security are no longer enough. “We're getting to the point where simply sending confidential information with basic encryption is no longer an acceptable method,” states Ian Thornton-Trump, CISO at Cyjax. While managed file transfer ...
Blog

This Month in Cybersecurity: The Weather is Heating Up and So Are Cyberattacks

  At the time of writing, much of Europe and the U.S. is in the midst of a major heatwave, delivering record temperatures and concerns about climate change. Just as the heat is rising, so is the threat of cyberattacks. New data has emerged that reveals 2022 is looking like it could be the worst year ever for cybersecurity in terms of the volume and...
Blog

4 Ways You Can Use Your Digital Rights Management Tool

    In an increasingly collaborative work environment, it’s more important now than ever before that your organization has the highest level of visibility and control possible over its data. While knowing how to choose the right data security solutions such as managed file transfer, data classification, and more is a challenge in and of itself, the...
Blog

Common Questions About Fast File Transfer

There is no doubt we live in an information-intensive world, one in which getting the right data quickly is often pivotal to an organization’s success. Moving files from point A to point B requires many considerations, but when it comes to large, mission-critical files that need to reach recipients around the world as fast as possible, it’s time to move beyond options such as Dropbox and Google...
Blog

What Do Emerging Data Privacy Laws in the U.S. Mean for You?

  What is Data Privacy? One can think of data privacy as all the processes involved in how confidential or personal information or data is collected, used, and shared or governed. No singular policy governs data privacy, with requirements and penalties varying across states and countries. Data privacy laws are legal constructs that set clear lines...
Blog

Largest Data Breaches in Last 10 Years

  Bigger is often better. A bigger slice of pizza or a bigger paycheck sounds pretty nice. An extra-large data breach, not so much. Listing out the biggest data breaches of all time can be challenging, as the next big one could be right around the corner. At the time of this writing, reports are out that the Personally Identifiable Information (PII)...