Blog

Blog

The Key Differences Between SFTP and FTP

Last Updated 05/03/2024Are SFTP and FTP the same? While they both transfer files, the answer to this question is ultimately, NO.Secure File Transfer Protocol or SSH File Transfer Protocol (SFTP) and File Transfer Protocol (FTP) are NOT the same thing. SFTP, not to be confused with FTP Secure (FTPS), is a network SFTP is an extension of the 2.0 version...
Blog

Everything You Need to Know About Open PGP Encryption

What is Open PGP?PGP is the backbone of Open PGP. It is an open source standard that allows PGP to be used in software that is typically free to the public. The term "Open PGP" is often applied to tools, features, or solutions that support open source PGP Encryption technology. It is Internet Engineering Task Force (IETF) approved.Open PGP file...
Blog

Automation Operations: 5 Benefits of Automation

Advantages of AutomationVisions of a mechanized world flourished long before the term "automation" was coined. The star of Westinghouse’s exhibit at the 1939 World’s Fair was Electro, a robot that could walk, talk, and count on its fingers. Sadly, Electro and his kind were little more than demonstrations of remote control by human operators. By the...
Blog

6 Ways to Get Internal Buy-In for Your MFT Solution

There are a lot of moving pieces that go into a product evaluation. You need to navigate through the myriad of options in today's marketplace, attend vendor demonstrations, try the software in a test environment to ensure it works as expected, request pricing and consider if the quote provided fits in your budget, and finally narrow it down to...
Blog

What is a DMZ and Why Do You Need a DMZ Secure Gateway?

If you’ve watched a science-fiction movie about space travel, then you’ve likely seen some version of a scene in which an astronaut reenters their ship from the outside abyss. Because the ship exists as a haven from the dangerous environment of empty space, the astronaut cannot simply open the door and stroll directly into the cockpit. To do so would...
Blog

Eight Hacks You Can Implement to Combat "Hackable" Network Vulnerabilities

Although we’re becoming savvier to the tricks hackers have pulled in the past, they are still working to up their game and catch us where and when we least expect it. Fortunately, there are some solid guidelines you can follow in order to keep your organization’s data from hollering "Hack Me!" at the top of its lungs. It’s important to avoid these...
Blog

Everything You Need to Know About SFTP Automation

Last edited on 4/25/2024 There are many file transfer protocols that organizations could use within their workflows. Some organizations may simply be looking for a way to automate their file transfers. Whether you send a dozen file transfers a week, hundreds a day, or rely on SFTP in an enterprise-fashion, to transmit millions of files per day,...
Blog

How SFTP Works

How does SFTP work? When you need to secure server-to-server file transfers between yourself, your trading partners, and enterprise servers, SFTP (which stands for SSH File Transfer Protocol or Secure File Transfer Protocol) is a more secure option than FTP. Secure File Transfer Protocol (SFTP) works over the Secure Shell (SSH) data stream to...
Blog

5 Benefits of PGP Decryption Using Managed File Transfer

If your trading partners or vendors require you to PGP encrypt or decrypt the files you exchange, you may be on the search for an affordable, trust-worthy PGP software to implement in your organization. The software you’re looking for may also need to support more than basic PGP decrypt and encrypt functionality. You may want it to include a key...
Blog

How to Think like a Hacker and Secure Your Data [Webinar Recap]

There’s no denying that data breach incidents are becoming more common each and every day. Organizations continue to work tirelessly to combat looming threats with the latest cybersecurity best practices and technology. However, the larger the volumes of sensitive information being collected, processed, and shared, the greater the chance is of getting...
Blog

What’s the Difference Between GoAnywhere 6.0 and 6.1?

We’re excited to share that GoAnywhere 6.1 is now available for download! The newest version of our managed file transfer solution includes over 30 new features, such as X12 data translation and a built-in data mapping tool for centralized encryption and EDI, along with many additional enhancements that our customers have requested. Many of our...
Blog

How to Encrypt Files in Linux

If your organization uses Linux operating systems to run key business processes, it’s important to implement tried-and-tested Linux security practices that support critical files as they transfer from one system to another. One requirement that pops up frequently for Linux users is file encryption. Linux files need to be encrypted seamlessly and...
Blog

Everything You Need to Know about FTP Automation Software

So, you want to automate your FTP file transfers. Whether you send a dozen file transfers a week, hundreds a day, or even more, automation is a smart step for most businesses. The benefits are simple: automatic file transfers cut down on user errors, reduce or eliminate the need for scripts, free up manual time spent on creating and maintaining jobs,...
Blog

How to Prevent Data Breaches with MFT | Checklist and Plan

You know what a data breach looks like in the movies...A character’s computer is suddenly overtaken by lines of green code. Windows and browsers pop up at lightning speed, as if the PC is possessed and has its finger on the fast-forward button.The main characters give each other horrified looks. "We’re being hacked!" a side character shouts, and then...
Blog

The Pros and Cons of Open Source Managed File Transfer Software

There comes a day for many companies when it’s time to implement a managed file transfer (MFT) solution. Perhaps there are new compliance requirements to meet, new relationships with third parties and customers requiring advanced data exchange, or escalated internal needs among teams. Regardless of the reason, the option of using open source...
Blog

Which is Better: AS2 vs. SFTP?

Over the last several months, we’ve compared many different file transfer protocols, including SFTP vs. FTPS and SFTP vs. MFT, and MFT vs. Dropbox for secure file sharing.Today, we’re going to look at AS2 vs. SFTP. How do these popular file transfer protocols work? How do they differ? And most importantly, which one is better for your organization’s file exchange requirements?Let’s dive in.What is...
Blog

Who’s Leading the Managed File Transfer Data Quadrant?

Note from the Editor: This article shares highlights from the 2019 Info-Tech Category Report. Read our articles about the 2020 report, 2021 report, or download the latest copy. For most IT professionals, finding credible, third-party evaluations is critical when researching new software solutions. You want the most comprehensive, honest...
Blog

PGP vs. GPG: What's the Difference?

PGP, GPG, GnuPG, Open PGP. These terms file under the same category but refer to slightly different things. If you’re wondering what they mean or what the difference is between them, especially PGP vs. GPG, you’re not alone! Read this article to get a better feel for these standards and their nuances.PGP – Pretty Good PrivacyPGP stands for Pretty Good...
Blog

16 Surprising Facts about Managed File Transfer

Whether you’re already using a managed file transfer (MFT) product or are evaluating your options, the many features and capabilities of MFT software will likely surprise you—in a good way! As businesses find they increasingly need to share data internally and externally, a solution like GoAnywhere MFT offers an easy-to-use platform that protects...
Blog

FTP vs Cloud | Why You Should Never Use FTP to Transfer Cloud Files

What is FTP?File Transfer Protocol, or FTP, is a basic protocol used to transfer files between a client, (which initiates the connection), and a server on a network. FTP operates as a client-server model protocol and is considered an application layer protocol.With FTP, the end user’s computer is the local host; the second computer is called the...