Resources

Blog

Why You Should Migrate from Your Current MFT Software

  Image Is Your MFT Solution Keeping Up with Your File Transfer Requirements? With the increasing responsibilities IT professionals must juggle, including managing a myriad of daily tasks, addressing cybersecurity concerns, creating projects and business guidelines, meeting partner requests, and keeping abreast of compliance...
Blog

GDPR: Understanding the 8 Rights of Data Subjects

Image Find out what these new rights mean for your organization and how you can prepare.   GDPR (General Data Protection Regulation) is the EU’s new legal framework that replaced the EU Data Protection Directive in May 2018. While the directive was merely a recommendation, GDPR carries the force of law. The purpose...
Blog

Think Your Customer Data was Exposed? Follow These Steps

  Image When a prospect or customer shares personal data with a business, they expect their information will be stored securely, kept safe from vulnerabilities, and used only for the purposes with which it was collected. Whether this data is an email address, a birthday, a personal identifier, or credit card numbers, the weight of...
Blog

Is FTP Dead?

  Image Is FTP still a viable option for sending file transfers? While organizations across all industries have started shifting to secure FTP protocols like SFTP and FTPS, a surprising number of businesses still use FTP to transfer sensitive documents across internal and external networks. The search "how to use FTP" comes up with...
Blog

Why Choose Managed File Transfer Over Free File Sharing Methods?

  Image Why Choose Managed File Transfer? It’s no secret that many organizations struggle to fully protect the sensitive data their employees, customers, trading partners, and third-party vendors share. Free file sharing software and scripts are both common ways of transferring files, even though they’re not necessarily the most...
Blog

New Zealand Healthcare Agencies Required to Eliminate Fax Machine Use and Secure Emails for Compliance by 2020

  Image   Here’s what you need to know in order to make the transition and achieve compliance with HISF Chapter 8 by 2020 Are you part of a health agency or healthcare organization in New Zealand that uses traditional fax machines or other insecure data transfer methods to share patient information and communications? If so, you’ll...
Blog

Top 5 Reasons to Try GoAnywhere’s ROI Calculator

Image You know you need a managed file transfer (MFT) solution. While you see the benefit in allowing IT staff to secure and automate file transfer tasks, you also need to demonstrate the investment value to get internal buy-in. This ROI calculator can help! Not only will it show you the value of GoAnywhere MFT and how much you could...
Blog

Are SFTP Files Encrypted?

    Image The definitive answer to "Are SFTP Files Encrypted," is yes! SFTP, short for Secure Shell (SSH) File Transfer Protocol is a network protocol that organizations use to secure and send file transfers. SFTP is firewall-friendly, supports key-based authentication, encrypts usernames and passwords, and implements strong...
Blog

I’ve Just Been Breached, Now What?

  Image So, you think (or perhaps you know) you’ve been breached. It’s every organization’s nightmare, and you’re living it, facing local and federal fines, upset customers, public panic, and a loss of intellectual property. A breach can be a harrowing ordeal; if you’re not sure what to do immediately after discovering the breach,...
Blog

40 Cybersecurity User Groups, Forums & Communities to Join

  Image What is the best cybersecurity resource? Answer: other people! Today more than ever, people are connecting with each other over shared problems and interests. Maybe there’s a particularly tricky problem that’s taunting you. Maybe you have exciting best practices to share with other professionals. Whether you’re a...
Blog

7 Benefits of Using MFT for Encrypted File Transfers

  Image   7 Benefits of Using MFT for Encrypted File Transfers   At minimum, a managed file transfer (MFT) solution is a product that encompasses all aspects of inbound and outbound file transfers while using industry-standard network protocols and seamless encryption. It can automate and transfer data across your network, systems...
Blog

The Key Differences Between SFTP and FTP

Image Last Updated 05/03/2024 Are SFTP and FTP the same? While they both transfer files, the answer to this question is ultimately, NO. Secure File Transfer Protocol or SSH File Transfer Protocol (SFTP) and File Transfer Protocol (FTP) are NOT the same thing. SFTP, not to be confused with FTP Secure (FTPS), is a network SFTP is an...
Blog

Everything You Need to Know About Open PGP Encryption

Image What is Open PGP? PGP is the backbone of Open PGP. It is an open source standard that allows PGP to be used in software that is typically free to the public. The term "Open PGP" is often applied to tools, features, or solutions that support open source PGP Encryption technology. It is Internet Engineering Task Force (IETF)...
Blog

Automation Operations: 5 Benefits of Automation

  Image   Advantages of Automation Visions of a mechanized world flourished long before the term "automation" was coined. The star of Westinghouse’s exhibit at the 1939 World’s Fair was Electro, a robot that could walk, talk, and count on its fingers. Sadly, Electro and his kind were little more than demonstrations of remote...
Blog

6 Ways to Get Internal Buy-In for Your MFT Solution

  Image There are a lot of moving pieces that go into a product evaluation. You need to navigate through the myriad of options in today's marketplace, attend vendor demonstrations, try the software in a test environment to ensure it works as expected, request pricing and consider if the quote provided fits in your budget, and finally...
Blog

What is a DMZ and Why Do You Need a DMZ Secure Gateway?

  Image If you’ve watched a science-fiction movie about space travel, then you’ve likely seen some version of a scene in which an astronaut reenters their ship from the outside abyss. Because the ship exists as a haven from the dangerous environment of empty space, the astronaut cannot simply open the door and stroll directly into...
Blog

Eight Hacks You Can Implement to Combat "Hackable" Network Vulnerabilities

Image Although we’re becoming savvier to the tricks hackers have pulled in the past, they are still working to up their game and catch us where and when we least expect it. Fortunately, there are some solid guidelines you can follow in order to keep your organization’s data from hollering "Hack Me!" at the top of its lungs. It’s...
Blog

Everything You Need to Know About SFTP Automation

Image Last edited on 4/25/2024 There are many file transfer protocols that organizations could use within their workflows. Some organizations may simply be looking for a way to automate their file transfers. Whether you send a dozen file transfers a week, hundreds a day, or rely on SFTP in an enterprise-fashion, to transmit millions...
Blog

How SFTP Works

Image How does SFTP work? When you need to secure server-to-server file transfers between yourself, your trading partners, and enterprise servers, SFTP (which stands for SSH File Transfer Protocol or Secure File Transfer Protocol) is a more secure option than FTP. Secure File Transfer Protocol (SFTP) works over the Secure Shell (SSH...
Blog

5 Benefits of PGP Decryption Using Managed File Transfer

  Image If your trading partners or vendors require you to PGP encrypt or decrypt the files you exchange, you may be on the search for an affordable, trust-worthy PGP software to implement in your organization. The software you’re looking for may also need to support more than basic PGP decrypt and encrypt functionality. You may want...