Resources

Blog

How Are You Doing with PCI DSS v4.0 Compliance?

As of March 31, 2024, organizations in the payments industry will need to comply with all new PCI DSS v.4.0 requirements. Find out what the new obligations will be, how to tie them into your enterprise, and how Fortra can help. For many organizations, 2024 will be a big year. Aside from focusing on increasing revenues, market share, and demand, there will also be a big focus on compliance. In...
On-Demand Webinar

Securing Data in SharePoint & Other Cloud Platforms

Discover how to plug the cloud application gaps in your cybersecurity and operational defenses and learn how to apply comprehensive threat protection and data loss prevention controls to content stored or transferred in and out of the cloud.
Blog

Load Balancing Keeps Files Moving, Processes Running

Dreaded network bottlenecks and the ensuing risk of downtime are anxiety-producing situations for many IT teams. Afterall, uptime is how business gets done and when that fails, the domino effect can have serious repercussions. Load balancing, however, can act as a preventative, to keep network traffic flowing. What is Load Balancing? Load balancing is the technique organizations can use to...
Blog

How MFT Helps the Insurance Industry Secure Files

Insurance industry insiders know an insurance policy is one of the few products purchased that most people hope to never have to put to use. Afterall, “using” your insurance means that an adverse event has occurred – an auto accident, medical crisis, storm damage, or any number of situations where not having a policy in place could have huge financial repercussions. Insurers also need to have a...
Blog

Hardening Your MFT Environment: A File Security Essential

Congratulate yourself if you already have a secure, managed file transfer (MFT) solution in your organization. You’ve taken a proactive step towards addressing growing cybersecurity concerns around the exchange of your sensitive, often business-critical files. While robust file transfer solutions can offer security, automation, and a streamlined way to conduct this essential business process, to...
Blog

How MFT Helps Strengthen Your Organization for Top 2024 Cybersecurity Risks

In a recently published blog detailing findings from Fortra’s inaugural 2024 Fortra State of Cybersecurity Survey , top takeaways revealed the concerns and trends of industry insiders, including: What are the top 5 security risks facing your organization in the next 6-12 months? Reviewing the top security risks facing organizations, 81% saw phishing and smishing as a top security risk, with...
Blog

What is a TFTP Server?

What is a TFTP Server? TFTP, or Trivial File Transfer Protocol lives up to its name as it is a lightweight, simple protocol used to send files across a network. The server of this “trivial” protocol allows computers in and out of an organization’s network to exchange files using TFTP. As a lightweight protocol, there is less complexity, and therefore reduced overhead. It works quite simply: A...
Blog

What We Learned in Our Inaugural State of Cybersecurity Survey

No one knows the challenges of securing an organization like the professionals who carry that responsibility daily. We set out to better understand the things they deal with and what they plan to focus on in our inaugural 2024 Fortra State of Cybersecurity Survey. Here are five key takeaways from the survey. 81% Call Phishing and Smishing Top Security Risk for 2024 Both phishing and smishing (SMS...
Blog

Building Strong Software Through Third-Party and Internal Testing

In my last post I wrote about protecting the supply chain and how strong bricks make strong walls, referencing how creating software with strong internal components and securely crafted code adds strength to the enterprises using that software. When considering any component being added into an environment, evaluating its security posture and attack surface is an important part of the purchasing...
On-Demand Webinar

FTP, FTPS, & SFTP: Which Protocol You Should Use and When?

FTP, FTPS, and SFTP are three key file transfer protocols, but do you know which protocol is best for securing your organization’s sensitive data?  This webinar explores the differences between these protocols to help you determine which is best for your organization’s data transfer needs.  
Blog

On-Premises vs. Cloud: Which File Transfer Method is Best for You?

If your organization is debating between on-premises and cloud deployment for your business-critical file transfer needs, there are a few considerations around compliance, resources, and infrastructure to help you determine which option makes the most sense for your organization. “If you’re already using an on-premises solution, any discussion of a potential migration to cloud file transfer should...
Blog

How MFT Solves Email Attachment Problems

Managed File Transfer (MFT) future-proofs an organization’s ability to send files at the speed of business and break free of the limiting constraints of email attachments.
Blog

MFT Security Champions: First Responders for Solution Security

What is a Security Champion? Software users have expectations that the solution they choose to execute key business functions is continually being assessed for security, among other attributes. One role within security-conscious organizations that helps proactively meet those expectations is that of Security Champion. According to industry definitions, a software solution’s Security Champion...
On-Demand Webinar

Strengthen Your Defense: Updated GoAnywhere Hardening Best Practices

Strengthen your security defenses. Our Strengthen Your Defense: Updated GoAnywhere Best Practices customer webinar on zeroes in on GoAnywhere’s updated hardening and architecture guides, which details the best practices and configurations to help you further boost the security of your GoAnywhere environment. Fortra’s Chris Spargen, Senior Manager, Solutions Engineering, covers: Updates to the most...
Blog

Sharing Financial Files: Benefits of MFT

Financial file matters matter. Not only are these files a top priority to the banks and financial institutions that handle millions of transactions daily, they also matter to the industry’s compliance regulators, and to the public trusting that their financial information is secured. How organizational and personal financial data is handled and secured is a heavy responsibility, most often landing...
Blog

Protecting the Supply Chain: Strong Bricks Make Strong Walls

When I was young, we had toy bricks made of cardboard that were great for tiny hands . They were lightweight and easy to stack, and we created many walls, forts, and towers. As wonderful as these were , they would do little to protect against an attacking army. For that, we’d need strong material and sound construction for defense . Quarried stone and stout mortar were excellent for those medieval...
Blog

Considerations When Choosing a File Transfer Protocol (FTP)

We all know “you need the right tool for the job.” When choosing between popular file transfer protocols , that adage remains. But how do you know which one is right for your organization, especially when trying to execute safe, compliant file transfers across your unique ecosystem? This brief guide will help you define your requirements and explain which protocol is right for you. Are You In it...
Blog

MFT Software Demos: Maximize Your Time

When it comes to selecting software that can have a major impact on how your organization conducts business and secures its most valuable data, you can look at the process much like you do when considering a new vehicle. While a test drive of that shiny new ride can help confirm your expectations for speed and performance, a one-on-one demonstration by a professional highly experienced in that car...