Blog

Blog

Customer Support is Key to MFT Vendor Satisfaction

Sure, you can pick up a free, open-source file transfer solution to get most of your files where they need to be. But should you? What happens when you run into a problem, have questions, or need to quickly onboard new users? Commercial-based Managed File Transfer (MFT) solutions that offer true customer support vs chat bots and FAQs are invaluable for organizations that depend on reliable, secure...
Blog

Open-Source File Transfer vs Secure Managed File Transfer: Pros and Cons Part Two

Over the last few years many articles have been written comparing commercial off-the-shelf Managed File Transfer (MFT) products to open-source and home-grown solutions, including GoAnywhere MFT’s own article on this topic: Pros and Cons of Open-Sourced Managed File Transfer Software.There are many claims both for and against open-source solutions in these types of articles. As a more technical...
Blog

Multiple Gateway Capability Helps Secure Military and Other High Security Organizations’ File Transfers

Sharing files in most any industry requires some level of security to protect what is often an organization’s most valuable asset – the data entrusted to it. When it comes to the military, the defense industry, or other high-security organizations – government or private – prioritizing the security of files via solutions that offer segmentation opportunities to thwart intrusion is a must...
Blog

Transferring Large Files: UDP-based File Acceleration Solves Headaches

Sending big files can cause big headaches. And with the expectation of large, growing, and streaming files arriving unscathed, these headaches can become a chronic condition without putting robust software in place – software designed from the bottom up to address the issues that come with sending super-sized files around the world.Why Large Files Can be ProblematicBig data sets, or large files...
Blog

MFT as Middleware Streamlines Enterprise Processes

Right now, we’re seeing a trend in the marketplace. Large enterprise customers want some sort of middleware to allow them to secure and streamline the connection between their internal systems and their vast external ones (think cloud-based resources and third-party services). In fact, the global managed file transfer market was valued at USD 2 billion in 2023 and is expected to grow to USD 4.9...
Blog

Stop IP Addresses with Bad Reputations Before They Enter Your Environment

Like a triple-locked door or a guard dog on patrol, stopping bad actors before they enter your environment is a critical, proactive step to take to protect what’s yours. Protecting the often-sensitive information entrusted to organizations requires this same approach to security to help avoid data breaches or the mishandling of data and the resulting financial and reputational fallout.Proactive...
Blog

How to Securely Integrate Established OT with New IT Networks

There is a lot of hype out there about the dangers of mixing operational technology (OT) with information technology (IT), and a lot of it is true. With both technology environments designed to address different requirements, it’s only natural for these environments to each bring their own unique challenges when it comes to integration and potentially introduce risk.As this study revealed: Nearly...
Blog

FTP vs FTPS: Which Protocol Meets Your File Transfer Needs?

Deciding Factors for Choosing a File Transfer ProtocolDetermining which file transfer protocol to choose to transfer your organization’s business-critical files is a matter of determining what requirements the task needs or requires. Let’s take a look at how to make the decision between FTP and FTPS.First, here’s the basics:FTP, or File Transfer Protocol, is used to exchange files over a...
Blog

Lean Into Security: Take the Next Step toward Securing Your Organization

Lean into Security: Take the Next Step toward Securing Your Organization Learn how a forward-leaning security approach can enhance your security maturity level, reduce risks, and empower cybersecurity leadership.  For any security leader, evolving the cybersecurity strategy is key to advancing your organization’s maturity level. The primary motivation is often risk reduction, but there are other...
Blog

Securing Global E-Invoicing Initiatives with Robust MFT

Like many countries, France is spearheading its digital transformation through an initiative that mandates the centralized management of electronic invoices (e-invoices) via the Public Billing Portal (PPF). This initiative, in line with broader European Union (EU) efforts toward digitization, is designed to enhance transparency, prevent fraud, and simplify tax reporting. The time to prepare is now...
Blog

Rethink Security of Your Cloud File Transfer Platform

Sharing files via cloud-based options such as AWS, Box, OneDrive, Dropbox, ShareFile, Google Cloud, and others is the no-brainer option chosen by many organizations. And that choice is made for plenty of good reasons – accessibility, real-time collaboration, scalability, and cost effectiveness, along with version control and less need for hardware.However, despite the user advantages of these...
Blog

iPerf Test Throughput with UDP for Accurate Results

If you want to see how different protocols such as TCP or UDP perform when it comes to maximizing your network capacity, it’s important to test network throughput appropriately and with the correct mode engaged.TCP (Transmission Control Protocol) is a reliable protocol used most often for emails and web traffic. UDP (User Datagram Protocol) is the protocol most organizations rely upon when speed...
Blog

Automate IBM i PGP Encryption and Secure File Transfers with Robust MFT

Streamlining and automating the PGP encryption process for organizations on the IBM i platform can help ease time pressures on IT staff and in turn, reduce risks that lurk around the corner when teams rely on error-prone manual tasks and cumbersome scripts and programming to encrypt and monitor file transfers. There’s a better, a more secure option using a Managed File Transfer (MFT) solution. PGP...
Blog

How Reviews Fit into the MFT Buying Process

Short of direct conversations with IT peers, reviews on third-party review sites can serve as one of the most valuable resources for IT teams when it comes to choosing what software would best suit an organization’s needs.IT pros would be wise to give a nod to the genuine feedback that can be gleaned from reputable sites such as PeerSpot, SoftwareReviews, G2, and Capterra when sourcing solutions...
Blog

Meet Essential Eight Maturity Requirements with MFT

The purpose of Australia’s Essential Eight is to provide a clear, easy-to-follow set of guidelines that can be applied to protect Australian organizations and their information technology systems against cyberattacks.The Essential Eight Maturity Model helps support the implementation of Essential Eight principles and provides a transparent assessment of how easy an organization’s systems are to...
Blog

7 ways to use APIs in MFT to Scale Deployment

If you want to boost the ROI of your Managed File Transfer (MFT) solution and scale your deployment, pairing your MFT with APIs is an efficient way to do so. The added automation, integration, scalability, and ability to customize your existing solution can help increase the use of MFT across your organization.What is an API?In short, an API, or Application Programming Interface, is a rule set...
Blog

The Risks of Outdated File Transfer Protocols

In today's data-driven business landscape, marked by highly interconnected ecosystems, transferring files securely is crucial to operational integrity and confidentiality. With the proliferation of cyber threats and stringent regulatory requirements, safeguarding data during transit cannot be overstated. Secure file transfer solutions protect against unauthorized access and interception, foster...
Blog

How MFT Supports the NIS2 Directive and Oct. 2024 update

If you are not yet up to speed on the latest developments around the European Union’s (EU) NIS2 Directive, get ready, as they go into effect Oct. 17, 2024. That’s when Member States are required to have transposed the directive into national law. EU countries must have their national legislation on par with the NIS2 requirements and comply with the new, broader requirements. This update aims to...
Blog

Protecting PII with Threat Protection Strategies

The task of protecting PII (Personally Identifiable Information) is one faced by many industries, but primarily is top-of-mind for those in healthcare, financial services, retail, education, and government. These business sectors not only are responsible for protecting PII such as Social Security numbers, health records, credit card details, student addresses, and more for the sake of their...
Blog

New MFT eBook Asks 9 Industry Experts What They Think

Want to see the value of a Managed File Transfer (MFT) solution? Ask those who know, use, and love it.In our latest eBook, MFT's Role in Business: IT Leaders Weigh In, Fortra canvasses the opinions of nine industry experts across the realms of IT and lets them speak for themselves. These IT and security professionals share their experiences working with Fortra’s GoAnywhere MFT and candidly share...