Resources

Blog

Open Source Fast File Transfers

There exist a number of open source projects trying to tackle accelerated file transfer via UDP. Some solutions are more mature than others and also use different technologies to solve the same problem of large data transfer over WAN. This article should provide the reader enough information to compare the different solutions and gauge if an open source project could be used instead of purchasing...
Blog

Analysis On Improving Throughput Part 2: Memory

The life cycle of a file transfer follows this basic pattern: The first and last step in the diagram, Disk IO, were covered in Part 1 of the series: Improving Throughput Part 1: Disk IO . Disk IO is always a good place to start when analysing a system to see why files are not transferring fast enough. In the 2nd article in this series, we’re going to concentrate on that white fluffy cloud—the...
Press Release

GoAnywhere Adds FIPS 140-2 Validated Encryption Module

Omaha, Neb - May 22, 2012 Organizations can now secure their data transmissions using FIPS 140-2 validated encryption with the GoAnywhere managed file transfer solution from Linoma Software [now Fortra]. FIPS 140-2 is a critical compliance requirement for US federal government and state agencies, as well as for those companies that exchange sensitive data with the government. In order to provide...
Blog

Are Insurance Companies Managing Their Risk of Data Breach?

Insurance companies are the experts at analyzing and managing risk. They identify, quantify , and set pricing based on the calculated costs of risk. Naturally, the higher the perceived risk, the higher the cost to mitigate the potential losses. Yet , here is the irony. While those in the insurance industry excel at evaluating risk management for their clients, they often neglect risk mitigation...
Blog

Is Your Company Letting Data Slip Through the Cracks?

Many Americans have spent the last few days frantically searching for receipts and other documentation to finish their taxes before April 15th — only to realize they get a one-month reprieve this year. Despite that sigh of relief, there's no doubt that some of those people thought they knew exactly where to find what they needed, and were dismayed to discover that their confidence — and their data...
Blog

How Important is Auditing Your File Transfers?

When you send someone a file using FTP, how do you know (and later prove) that it was successfully sent? Consider the Complexities It might be possible to save a screenshot as long as the process was simple and you can see all the commands on a single screen. But what if your commands start getting complex? And if you start sending quite a few files every day, how do you organize all these...
Blog

Analysis On Improving Throughput Part 1: Disk IO

This post is the first of a series and continues in Part 2: Memory In light of the release of FileCatalyst Direct v3.0, I thought I’d write a few articles about the road to achieving 10Gbps speeds. It seems to me the best place to start is with the endpoint of the transfer: the storage media. Why? Before we even think about the file transfer protocol, we have to be sure that our disks can keep up...
Blog

Reverse Proxy DMZ Secure Gateways Might Be the Missing Link in Your MFT Strategy

By now, most companies have gotten the message that their data—as well as the sensitive data belonging to customers and partners—needs reliable protection from unauthorized access. The ever growing regulatory environment is making it more and more painful for any company who does not take their data security seriously. The challenges of data security The difference between the desire to keep data...
Blog

SFTP vs. FTPS: What's the Best Protocol for Secure FTP?

What is Secure FTP? SFTP vs. FTPS: Secure FTP Authentication SFTP vs. FTPS: Secure FTP Implementation SFTP vs. FTPS: Speed SFTP vs. FTPS: Security Watch a Demo An increasing number of organizations are looking to move away from transferring data with FTP (a standard file transfer protocol). In the beginning stages of research, questions often arise around which secure transfer protocols are...
Blog

Driving Securely Through the Cloud

Cloud computing is not for everything and not for everyone, but it has made a permanent mark in the lexicon of technology services. And there is a lot of hype around cloud computing and what it can do for organizations. To be fair, it is a very powerful tool. But it’s important to work out how you can use it most effectively and securely. The best way to start is by uncovering what cloud computing...
Blog

Are You Next in Line for a Data Breach?

A Data Breach is Closer Than You Think As the percentage of data breaches increase, the risk of organizations losing your sensitive data also increases. No one wants to receive the news that some or all of their personally identifiable information (PII) was stolen. Sure, there are people who are victims of various phishing scams, but it's more likely that the information in your organization will...
Blog

The Culture of Data Security

Here at Fortra, we hear a lot of buzz about protecting both customer and company data, but it's alarming how many IT departments and enterprise users are still not protecting their data correctly. According to the Ponemon Institute , fewer than 50 percent of organizations have comprehensive encryption protection in place. Prevention vs. Remediation Data and network security should be the basis for...
Blog

What Makes FTP an Outdated Security Method

Why is FTP an Outdated Protocol? FTP was designed as an easy mechanism for exchanging files between computers at a time when networks were new and information security was an immature science. In the 1970s, if you wanted to secure a server from unwanted access, you simply locked the computer room door. User access to data was controlled by the basic User ID and password scenario. At this time, the...
Blog

Meeting Compliance Regulations and Privacy Laws for Sensitive Data Transfers

Comply with Data Security Requirements Highly sensitive data is exchanged between organizations on a constant basis making data security compliance more vital than ever to keep communication flowing . For instance, if a busines s routinely transmit s financial information to their bank including payroll direct deposits and ACH payments , t hese transactions likely contain sensitive elements . This...
Press Release

Reverse Proxy DMZ Secure Gateway Added to GoAnywhere

OMAHA, NE (Sept 15th 2010) - Linoma Software [now Fortra], developers of the GoAnywhere suite of secure managed file transfer solutions, is now offering a new reverse proxy server product - GoAnywhere Gateway . In addition, Linoma is announcing a major release of its GoAnywhere Services file transfer server. The combination of GoAnywhere Gateway and GoAnywhere Services provide an enterprise...
Blog

CriticalPast Introduces One of the World’s Largest Online Archives

On the 3rd of June, CriticalPast announced the launch of CriticalPast.com , an absolutely astonishing archive of historic footage and photographic images: From the press release on Business Wire : CriticalPast’s library of more than 57,000 video clips is drawn from government sources and digitized, making it easy for users to search CriticalPast’s extensive collection, then stream or download a...
Press Release

Managed File Transfer Solution for IBM System p and System z

(October 20th, 2009) - Linoma Software [now Fortra] is proud to announce that its GoAnywhere Managed File Transfer (MFT) solution has been validated to run on IBM System p and System z platforms. Linoma worked with IBM through a special program, named Chiphopper, for the validation testing of GoAnywhere. Through the Chiphopper program, IBM provided Linoma's engineers with the equipment, software...
Press Release

Linoma Software [now HelpSystems] release New Solution for Managed File Transfers

(Ashland, NE) - August 24, 2009 - Linoma Software [now Fortra] proudly releases GoAnywhere Services - a new collection of secure data transfer services for your enterprise. GoAnywhere Services allows trading partners (e.g. customers, employees, vendors, etc.) to securely connect to your organization for exchanging files, documents and other types of data. This innovative solution eliminates the...