Resources

Case Study

Large Supply Chain Organization Implements GoAnywhere MFT to Replace Scripting and Pricey Integration Platforms

A leading supply chain and logistics solutions provider had their file transfer process spread across multiple integration platforms and Perl scripts that were difficult to manage effectively. With outdated scripting, pricey licensing, and a decentralized file transfer process, they sought a file transfer solution able to meet their needs for a more robust, modern data exchange solution that could replace their scripts and costly platform integrations, while offering predictable pricing, better centralization of processes, and more transparency.
Product Video

Secure ICAP Gateway: Enhancing Performance In Content Scanning Engine

Learn about the centralized threat intelligence feature now in GoAnywhere, as well as how to make modifications to enhance the content scanning engine’s performance, configuring worker threads, optimizing system performance, address default configurations, stress and performance testing, and more. Also discover how to modify policy configurations, apply configuration changes, run the script, and observe thread utilization in the Secure ICAP Gateway.
Product Video

Large File Support with Secure ICAP Gateway

Learn how you can increase the maximum file size from the 16 gig default size in GoAnywhere MFT within the ICAP gateway when transferring your files for content scanning. We’ll also cover malware detection, virus protection and DLP controls in the ICAP gateway.
Product Video

Create a Web User via GoAnywhere Rest API

Learn how to use the API functionality within GoAnywhere MFT to create a web user. This two-minute video will show you how to use web user templates, execute API commands with Curl, edit user details, and more.
Blog

MFT as Middleware Streamlines Enterprise Processes

Right now, we’re seeing a trend in the marketplace. Large enterprise customers want some sort of middleware to allow them to secure and streamline the connection between their internal systems and their vast external ones (think cloud-based resources and third-party services). In fact, the global managed file transfer market was valued at USD 2 billion in 2023 and is expected to grow to USD 4.9...
Live Event
It’s time to take back control of your most valuable asset – your data. Business-critical and sensitive data are vulnerable to cybercrime as well as simple human error when it’s being exchanged and transferred.Join the experts from Fortra’s GoAnywhere MFT as they head to Washington DC on March 6th for an informative, timely cybersecurity session. Not only will food be provided,...
Blog

Stop IP Addresses with Bad Reputations Before They Enter Your Environment

Like a triple-locked door or a guard dog on patrol, stopping bad actors before they enter your environment is a critical, proactive step to take to protect what’s yours. Protecting the often-sensitive information entrusted to organizations requires this same approach to security to help avoid data breaches or the mishandling of data and the resulting financial and reputational fallout.Proactive...
On-Demand Webinar

Rethink How You Use Cloud File Sharing

The popularity of cloud-based file sharing services such as AWS, Dropbox, and OneDrive is undeniable. However, these user-friendly solutions come with some critical security drawbacks.Join Scott Messick, Lead Solutions Engineer, as he discusses the pros and cons of cloud file sharing and introduce the advantages secure, managed file transfer (MFT) offers for both ease-of-use and security to...
Blog

How to Securely Integrate Established OT with New IT Networks

There is a lot of hype out there about the dangers of mixing operational technology (OT) with information technology (IT), and a lot of it is true. With both technology environments designed to address different requirements, it’s only natural for these environments to each bring their own unique challenges when it comes to integration and potentially introduce risk.As this study revealed: Nearly...
Blog

FTP vs FTPS: Which Protocol Meets Your File Transfer Needs?

Deciding Factors for Choosing a File Transfer ProtocolDetermining which file transfer protocol to choose to transfer your organization’s business-critical files is a matter of determining what requirements the task needs or requires. Let’s take a look at how to make the decision between FTP and FTPS.First, here’s the basics:FTP, or File Transfer Protocol, is used to exchange files over a...
On-Demand Webinar

GoAnywhere Customer Summit

Join GoAnywhere’s leadership team for a packed hour covering:Preview of GoAnywhere 2025 releasesWhat’s new in GoAnywhere from the second half of this yearA look at Fortra Threat Brain (a multi-vector hub of verified threat intelligence)Answers to your most common GoAnywhere questions...
On-Demand Webinar

Secure integration of OT and IT networks

Operational Technologies (OT) are central to almost every facet of our lives: CT machines, industrial robots, CNC milling machines and even washing machines. It encompasses anything that includes a computer chip and a program inside that is not traditionally “owned” by IT.However, operational technologies may use obsolete software that is vulnerable to threats because they have not had to be...
Blog

Lean Into Security: Take the Next Step toward Securing Your Organization

Lean into Security: Take the Next Step toward Securing Your Organization Learn how a forward-leaning security approach can enhance your security maturity level, reduce risks, and empower cybersecurity leadership.  For any security leader, evolving the cybersecurity strategy is key to advancing your organization’s maturity level. The primary motivation is often risk reduction, but there are other...
Product Video

Conquer Email Limitations

Learn how GoAnywhere's Secure Mail solution addresses common email limitations such as size and type, how data remains protected and encrypted while in transit, and how you can meet stringent regulatory requirements around how information is exchanged.
Product Video

PGP Encryption and SFTP Push Overview for IBM i

GoAnywhere MFT's user-friendly dashboards makes it easy to encrypt, decrypt, and automate file transfers and focuses on PGP encryption and SFTP pushing of files. Discover how you can quickly create workflows and projects to automate file transfers and other business processes, with built-in templates, a scheduler as well as built-in monitoring to streamline and goof-proof repetitive tasks.
Product Video

How GoAnywhere Gateway Keeps Files Out of the DMZ

Gateway helps keep sensitive files out of the DMZ, while protecting the private network and can help organizations meet compliance requirements for HIPAA, PCI DSS, SOX, GLBA, or applicable privacy laws. Learn more about connectivity and configuring and testing the Gateway through the admin console.
Product Video

GoAnywhere Authentication Options Overview

Learn about the options included in the GoAnywhere authentication solution such as LDAP, SAML, logins over SFTP, password, public key, two-factor authentication and more. Discover how GoAnywhere also includes support for simultaneous use of different login methods. Plus, GoAnywhere features a built-in key vault in the application for easy management and storage.
Blog

Securing Global E-Invoicing Initiatives with Robust MFT

Like many countries, France is spearheading its digital transformation through an initiative that mandates the centralized management of electronic invoices (e-invoices) via the Public Billing Portal (PPF). This initiative, in line with broader European Union (EU) efforts toward digitization, is designed to enhance transparency, prevent fraud, and simplify tax reporting. The time to prepare is now...
Blog

Rethink Security of Your Cloud File Transfer Platform

Sharing files via cloud-based options such as AWS, Box, OneDrive, Dropbox, ShareFile, Google Cloud, and others is the no-brainer option chosen by many organizations. And that choice is made for plenty of good reasons – accessibility, real-time collaboration, scalability, and cost effectiveness, along with version control and less need for hardware.However, despite the user advantages of these...
Blog

iPerf Test Throughput with UDP for Accurate Results

If you want to see how different protocols such as TCP or UDP perform when it comes to maximizing your network capacity, it’s important to test network throughput appropriately and with the correct mode engaged.TCP (Transmission Control Protocol) is a reliable protocol used most often for emails and web traffic. UDP (User Datagram Protocol) is the protocol most organizations rely upon when speed...