Blog

Blog

How to Prevent Data Breaches with MFT | Checklist and Plan

You know what a data breach looks like in the movies... A character’s computer is suddenly overtaken by lines of green code. Windows and browsers pop up at lightning speed, as if the PC is possessed and has its finger on the fast-forward button. The main characters give each other horrified looks. "We’re being hacked!" a side character shouts,...
Blog

PGP vs. GPG: What's the Difference?

PGP, GPG, GnuPG, Open PGP. These terms file under the same category but refer to slightly different things. If you’re wondering what they mean or what the difference is between them, especially PGP vs. GPG, you’re not alone! Read this article to get a better feel for these standards and their nuances. PGP – Pretty Good Privacy PGP stands for...
Blog

Why You Should Never Use FTP to Transfer Cloud Files

The cloud has become an increasingly popular topic among organizations in recent years. From sharing projects via cloud collaboration tools to exchanging files between a company and its trading partners using cloud storage buckets, cloud computing platforms like Microsoft Azure and AWS offer users a lot of flexibility over their day-to-day...
Blog

Five Secure File Transfer Alternatives to FTP

Last Updated: 05/02/2024 The Need for Secure File Transfer Protocols “FTP served its purpose for its day, but it was never designed to offer up the level of security today’s organizations require, whether for compliance or to help prevent the enormous fiscal and reputational costs a data breach can bring about,” said Chris Spargen, Senior Manager,...
Blog

9 Ways to Use GoAnywhere’s Cloud Connector Integrations

There are many benefits to having a managed file transfer solution that supports built-in cloud integrations. From trading important files with business partners in Dropbox to automatically updating billing information in Salesforce from a central location, web app integrations in an MFT solution can simplify your critical file transfer and...
Blog

Why You Should Incorporate Managed File Transfer into Your Cybersecurity Strategy

Managed File Transfer: A New Cybersecurity Strategy for Sensitive Files Earlier this month, independent news platform Patch reported that Neiman Marcus, a department store chain in the US, has finally agreed to a settlement for their 2014 data breach. They’ll need to "pay $1.5 million and adopt measures to prevent hacks," measures that include...
Blog

Data Breach and Incident Response Plans | 2019 Templates & Best Practices

Every year, organizations hope that statistics for data breaches will improve, that things will be better than the year before. And every year, they are dismayed to discover that even though they’re pulling in new cybersecurity tactics to thwart cyber attacks, so are hackers pulling in new methods to discover their organizations’ weakest...
Blog

High-Performance Computing (HPC) in Oil & Gas

When it comes to the digital oilfield, High-Performance Computing (HPC) is an asset to be relied upon. From upstream discovery and the mapping of ocean floors to production, optimization and design; powerful HPC systems are analyzing, interpreting and manipulating unfathomable amounts of data. FileCatalyst has been helping a number of natural resources companies accelerate their workflows by...
Blog

The Best Cybersecurity Strategies for Banks and Financial Organizations

Banks and financial institutions, take note: though the year is almost over, no one is safe from a data breach. Industries across the board have seen 4.5 million records stolen so far in 2018—a staggering 133% increase over those compromised in 2017. As you create updated cybersecurity plans and data breach prevention strategies for the new year...
Blog

AI Across Industries – Where We Are, Where We’re Going

HAL 9000 might be closer, more useful and friendlier than we think. Artificial Intelligence (AI) might not be here in a fully realized form yet, but it’s already disrupting a lot of industries that we work in. As our customers discuss, question and evaluate the ways they can leverage AI to help streamline their workflows, I thought that I’d share some of the ways industry leaders leverage AI...
Blog

IP-Based Workflows – The Paradigm is Shifting, are You on Board?

Since returning from IBC 2018, I have been thinking about IP-based workflows and the great discussions we had about this emerging trend at our booth. While IP-based workflows are seeing increased adoption and bringing new opportunities, there are also challenges ahead. IP-based workflows aren’t exactly new, but adoption has greatly increased in the media space as of late. Global companies with...
Blog

Why You Should Cluster Your File Transfer Systems

What’s the true cost of downtime for your organization? You may think of it in terms of lost revenue—according to studies released in the last couple years, the average cost of system-wide downtime is $100,000 an hour, and that’s on the low end (it can get up to $300,000 or more). But there are other factors involved in the price of downtime that...
Blog

Chris Speaks at IABM: How Far Can We Go With The Cloud?

This year was another successful IBC for FileCatalyst, and we thank everyone who visited us. Our booth was bustling with activity; from people asking questions about how our fast file transfer solutions can fit in their workflow to people engaged with our in-depth demos that walked them through the user experience firsthand. Big thanks to every attendee that stopped by our booth, we are...
Blog

Making Sense of the Numbers: Breaking Down Our Speed Chart

FileCatalyst World Speed Chart When we attend trade shows, like the IBC Show on the horizon, our FileCatalyst World Speed Chart always garners attention and starts conversations at our booth. The question people always ask about it is, “How?” And I can’t blame them. To take a file that would usually take five hours to transfer, and do it in 8.4...
Blog

Introducing GoAnywhere MFT for AWS and Azure Cloud File Transfers

Are you looking for a solution that automates the movement of files between your on-premises and cloud environments? As cloud computing platforms become more commonplace, organizations are starting to shift their file transfer processes from in-house tools and scripts to secure solutions that promote strong cybersecurity practices, user...
Blog

There are Threats to FTP Servers, are You Mitigating Them?

I just finished reading an article by Marianne Kolbasuk McGee about the threats facing healthcare companies when it comes to FTP servers. I thought it would be a good idea to outline these threats, provide some thoughts, and outline some of the ways FileCatalyst addresses them. The State of FTP Servers The FBI has warned the healthcare sector that the File Transfer Protocol (FTP) can easily...
Blog

SFTP: The Smart Way to Transfer Your Cloud Data

With the growing buzz about everything "cloud computing," most organizations are either starting to consider the cloud or have already moved some of their business processes to a cloud platform. No matter where you stand, technology is no stranger to the cloud. Consumers use cloud applications, services, and storage daily, while many...
Blog

Using FileCatalyst to Remedy Healthcare IT Issues

When it comes to healthcare, file transfers aren’t something to be left to Dropbox or FTP email attachments. The requirements are many; files must remain confidential, visible, and secure – every time. Achieving this is becoming ever more challenging as the sheer size and volume of file transfers grow with every year. I came across an interesting article titled “7 File Transfer Challenges of...
Blog

Globus Toolkit to End Support after 20 Years

The Globus Toolkit has been an open source project since its inception, allowing the community to provide enhancements that have made it what it is today. But after a nearly 20-year run as what many see as the benchmark of grid computing, the Globus team at the University of Chicago will no longer support the Globus Toolkit. One of the toolkit’s...
Blog

From the Magnetic Drum to the Cloud - A Brief History of Data Storage

In my earlier blog post, “A Day In Data: How Much Data We Generate and Consume in a Day” I examined the common data-related tasks and the amounts of data these tasks generate and consume in a day. When I finished my research, I was blown away by some of the figures I found. Did you know that 2.9 million emails are sent every second?! Or how about...