Blog

Blog

Public Defender’s Office Reduces Manual Data Entry with Secure File Transfer Software

Every organization has legacy processes. Manual data entry, file cabinets full of paper records, sensitive documents sent across the organization by email, or even file transfers sent via homegrown scripts or FTP—all these processes can cause more headaches than their worth. Unfortunately, implementing a new strategy to replace a legacy one isn...
Blog

Five Secure File Transfer Alternatives to FTP

Last Updated: 05/02/2024The Need for Secure File Transfer Protocols“FTP (File Transfer Protocol) served its purpose for its day, but it was never designed to offer up the level of security today’s organizations require, whether for compliance or to help prevent the enormous fiscal and reputational costs a data breach can bring about,” said Chris...
Blog

Which is Better: Free SFTP Software vs. Enterprise-Level SFTP Software?

Free SFTP Software vs. Enterprise-Level SFTP Solutions In general, people like free things. Beverages, company lunches, swag at tradeshows and conferences, t-shirts and socks, those intriguing items in the “For Free” box at your local yard sale… You can’t go wrong with free, right? Well, coffee you don’t have to pay for is great, but the adage “There’s no such thing as a free lunch” exists for a...
Blog

What is Secure File Transfer?

Moving sensitive, often-proprietary files from one person—or organization—to another has become a complex aspect of the business world today. This complexity comes not only from the size and number of files that need to be shared, but also from the need to protect them at all points during their journey from sender to receiver.Even though there are...
Blog

9 Ways to Use GoAnywhere’s Cloud Connector Integrations

There are many benefits to having a managed file transfer solution that supports built-in cloud integrations. From trading important files with business partners in Dropbox to automatically updating billing information in Salesforce from a central location, web app integrations in an MFT solution can simplify your critical file transfer and business...
Blog

Why You Should Incorporate Managed File Transfer into Your Cybersecurity Strategy

Managed File Transfer: A New Cybersecurity Strategy for Sensitive FilesEarlier this month, independent news platform Patch reported that Neiman Marcus, a department store chain in the US, has finally agreed to a settlement for their 2014 data breach. They’ll need to "pay $1.5 million and adopt measures to prevent hacks," measures that include the...
Blog

10 Ways to Achieve Automatic File Transfers with GoAnywhere MFT

Here’s a fun fact: When it comes to streamlining file transfer processes, secure FTP automation software is the supporting sidekick to any IT or cybersecurity professional.Like Robin supports Batman and Hawkeye supports Marvel’s Avengers, automatic file transfer software can support your pursuit for top notch cybersecurity, compliance, and encryption...
Blog

Which is Better: Dropbox vs. MFT?

So you’re looking for a way to securely share files with your team. Great! There are plenty of tools you can use today to collaborate and share documents as projects arise. Some are on-premises and other in the cloud, meaning you’ll likely find a solution that meets your organization’s unique needs. But are these commercial file sharing tools right...
Blog

Data Breach and Incident Response Plans | 2019 Templates & Best Practices

Every year, organizations hope that statistics for data breaches will improve, that things will be better than the year before. And every year, they are dismayed to discover that even though they’re pulling in new cybersecurity tactics to thwart cyber attacks, so are hackers pulling in new methods to discover their organizations’ weakest...
Blog

What is FTPS?

Whether you’re looking to upgrade from your current FTP file transfers or have new requirements from a trading partner or customer, you might be wondering what FTPS is. You may ask: how does FTPS work, and does it differ from secure file transfer protocols like SFTP and AS2?Good questions. Let’s start by defining what FTPS is. ...
Blog

How 3 Financial Institutions Solve File Transfer Needs with MFT Software

On a scale of 1-10, how would you rate the efficiency of your file transfers right now?If you use manual scripts, legacy software, or a myriad of free tools to balance your encryption, automation, cybersecurity, reporting, and collaboration needs, it’s possible you’ll rate your efficiency low on the scale. After all, professionals in banking and...
Blog

High-Performance Computing (HPC) in Oil & Gas

When it comes to the digital oilfield, High-Performance Computing (HPC) is an asset to be relied upon. From upstream discovery and the mapping of ocean floors to production, optimization and design; powerful HPC systems are analyzing, interpreting and manipulating unfathomable amounts of data.FileCatalyst has been helping a number of natural resources companies accelerate their workflows by moving...
Blog

Which is Better: SFTP vs. MFT?

SFTP, or MFT: that is the question.Even though we’re not all famous poets like William Shakespeare, many IT professionals will ask this question at some point or another. Should they use an SFTP or managed file transfer (MFT) solution to transfer sensitive files securely—and why?It brings up an interesting choice. By nature, SFTP and MFT solutions...
Blog

The Best Cybersecurity Strategies for Banks and Financial Organizations

Banks and financial institutions, take note: though the year is almost over, no one is safe from a data breach. Industries across the board have seen 4.5 million records stolen so far in 2018—a staggering 133% increase over those compromised in 2017.As you create updated cybersecurity plans and data breach prevention strategies for the new year, it’s...
Blog

AI Across Industries – Where We Are, Where We’re Going

HAL 9000 might be closer, more useful and friendlier than we think. Artificial Intelligence (AI) might not be here in a fully realized form yet, but it’s already disrupting a lot of industries that we work in.As our customers discuss, question and evaluate the ways they can leverage AI to help streamline their workflows, I thought that I’d share some of the ways industry leaders leverage AI across...
Blog

IP-Based Workflows – The Paradigm is Shifting, are You on Board?

Since returning from IBC 2018, I have been thinking about IP-based workflows and the great discussions we had about this emerging trend at our booth. While IP-based workflows are seeing increased adoption and bringing new opportunities, there are also challenges ahead. IP-based workflows aren’t exactly new, but adoption has greatly increased in the media space as of late. Global companies with...
Blog

What is Managed File Transfer (MFT)?

As companies recognize a need for a solution that meets their file transfer, automation, and encryption needs, the question often arises: what is managed file transfer (MFT) and how is it different from my current file transfer processes?What "Managed File Transfer" MeansAt its core, managed file transfer (MFT) is a secure solution that meets all...
Blog

Why You Should Cluster Your File Transfer Systems

What’s the true cost of downtime for your organization? You may think of it in terms of lost revenue—according to studies released in the last couple years, the average cost of system-wide downtime is $100,000 an hour, and that’s on the low end (it can get up to $300,000 or more). But there are other factors involved in the price of downtime that can...
Blog

Chris Speaks at IABM: How Far Can We Go With The Cloud?

This year was another successful IBC for FileCatalyst, and we thank everyone who visited us. Our booth was bustling with activity; from people asking questions about how our fast file transfer solutions can fit in their workflow to people engaged with our in-depth demos that walked them through the user experience firsthand. Big thanks to every attendee that stopped by our booth, we are...
Blog

Which is Better: SFTP vs. FTPS?

How do you transfer sensitive files? Business requirements and security standards have increased in recent years across industries and continents, but many organizations have struggled to keep up. Manual scripts, legacy tools, and single-use software are still utilized by IT and security teams despite their risks, causing more problems than they solve...