Resources

Blog

PGP vs. Open PGP: What’s the Difference?

Encryption standards become more and more important every day. With the rise of data breaches, it’s critical now more than ever for organizations to raise the level at which they protect their information. Partly, educating employees has presented itself as an easy way to make data safer. However, taking the time to choose the right method of...
Blog

Should You Use PGP or GPG Encryption?

Not every piece of information is meant for every pair of eyes. That’s why organizations count on encryption technology – to lock down their sensitive data from malicious acquisition or even human error. And, when it comes to those encryption protocols, you’ve got options. One choice you or your IT team might need to make is whether to use PGP or...
Blog

5 Reasons to Consolidate Your File Transfer Processes with MFT

There are many reasons organizations start using managed file transfer (MFT) solutions, but one of the most impactful is consolidation. MFT solutions are a great way to achieve and maintain data regulation compliance, automate new and ongoing file transfers, and gain greater insight into data movement and user access. Discover what makes MFT one...
Blog

What is GPG?

What is GPG? GPG, also known as GNU Privacy Guard (GnuPG), is a different adaption, but popular implementation of the Open PGP standard as defined by RFC 4880. GPG in Depth GPG is an open-source standard and strong alternative to the official PGP software owned by Symantec. It was developed by Werner Koch and released in 1999 as an alternative...
Blog

How a Remote Workforce Impacts Your Data Security

You did it. Many months ago, you sent your employees home armed with their laptops, a few passwords, and a couple of Zoom invites. Now, hunkered down in their stretchy, comfy clothes, thankful for not having to commute, they’re carrying on the day-to-day business responsibilities for your organization. But is it really business as usual? Or is...
Blog

SFTP and the Cloud: How to Transfer Your Data Securely

Is SFTP Cloud Based? SFTP, Secure File Transfer Protocol, is a protocol used to transfer files between your organization, trading partners, and enterprise servers. It helps to establish a secure data connection and protect files in transit. SFTP can be used for your cloud file transfer needs, but also for any on-premises file transfers you do. ...
Blog

How GoAnywhere MFT Helps Energy Companies

The Energy Industry is Moving at Light Speed Today’s energy and utility companies face a number of evergreen issues, from adhering to mandatory regulations and cybersecurity standards, to being at a higher risk of data breaches, the industry is constantly weathering a turbulent and rapidly accelerating environment. To combat these risks and...
Blog

How to Implement the Right Enterprise File Sharing Solution

Implementation 101 An enterprise file sharing solution is an important tool for organizations to have. The benefits are practically endless – from ensuring compliance with data regulations, to streamlining transfers with automation, to the auditing and reporting capabilities – implementing the right tool is key. However, the act of implementing...
Blog

iPaaS and MFT: What You Need to Know

Once upon a time, you carried an MP3 player to listen to music, a cell phone to text and make calls, and a book if you wanted to read. Video games and the internet? Best to use your preferred gaming device and home computer for those. Then came the smartphone – suddenly, everything is accessible from one location, and all you have to do is download the right app. Like a smartphone, iPaaS puts...
Blog

Why You Should Use File Encryption Software

File Encryption Software is “Key” What is the key to keeping your data safe? One word: Encryption. There’s no question that encrypting sensitive data at rest and in motion is essential when it comes to guarding against cyber threats and complying with local, national, or industry-standard requirements. However, if you’re still on the...
Press Release

Fortra Adds New MFTaaS Solution and Enhances Secure File Collaboration

MINNEAPOLIS June 10, 2020 – Fortra today announced a new release of its award-winning secure managed file transfer (MFT) software GoAnywhere MFT. The new version includes a release of the Fortra SaaS solution, as well as more robust collaboration via secure email and forms. With the release of its new MFTaaS offering, GoAnywhere MFT can now be deployed as a SaaS solution. This is a significant...
Blog

What to Consider When Choosing an MFT Solution

A managed file transfer (MFT) solution simplifies your data security, automation, server-to-sever file transfers, and more. Organizations move from other file transfer methods to MFT solutions for various reasons, but mostly for some combination of: Centralization Time and money savings Increased security Whether your organization is...
Blog

Why Businesses Need MFT

Why Businesses Need MFT Reputations can be built or ruined in a matter of a few keystrokes. Just ask any business victimized by a data breach – either malicious or due to human error. The loss of reputation, trust, money, and time can be nearly incalculable. But, it’s not only a data breach that can severely impact a business. Server downtime,...
Blog

7 Benefits of Using Managed File Transfer (MFT)

Moving beyond the scripts and programs you lovingly set up to carry your data around can be scary but, like pushing a baby bird out of the nest, it eventually becomes necessary. Instead of sending data “in the clear,” constantly fixing scripts, or mad dashes to pull together audit logs, switch to a secure file transfer method that handles the...
Blog

How Encryption Works: Everything You Need to Know

What is Data Encryption? Encryption is a method of encoding data (messages or files) so that only authorized parties can read or access that data. Encryption software uses complex algorithms to scramble the data being sent. Once received, the data can be decrypted using a key provided by the originator of the message. The effectiveness of...
Blog

How GoAnywhere MFT Can Support You During COVID-19

Virtual Hug Coming Your Way As workforces are now more remote than ever due to COVID-19, it’s not just lagging Wi-Fi you need to keep an eye on. Files containing your organization’s most sensitive data are being put to the test, most likely no longer within the safety of your company’s firewall and not secure enough to transfer without a second...
Article

10 Ways to Improve Your Processes with Advanced Workflows

Whether you’re already using Advanced Workflows, in search of some tips and tricks, or haven’t explored this feature yet but are interested in learning more, you’ve come to the right place. Workflows, also known as Projects, expand and unlock superior automation for your file transfers. This module helps to enhance encryption, strengthen...
Blog

How Does the DMZ Impact Security?

Your Secret Weapon for Data Security When weapons and military forces have been removed from active duty, this is referred to as “demilitarization.” On the internet, the demilitarized zone, or the DMZ, is a similar situation. What is the DMZ? The DMZ is the neutral network that resides between the Internet and your organization’s private...
Blog

User Sharing and Collaboration: Security Concerns, Risks, and How to Securely Collaborate

Collaboration in the Workspace Secure collaboration tools that permit the sharing of sensitive data between users are quickly gaining momentum in the world of technology and file transfer. Although there are many benefits to utilizing these tools in the workspace, with user sharing and secure collaboration comes security concerns and a variety...
Blog

5 Projects You Could Tackle with a GoAnywhere Trial

It's happened to us all – you start a free software trial, only to get stuck at step 2: what to do first? Plotting a plan of attack before your first login can help you get the most out of your limited time with the product (and might even help you down the line when you're making the case for adoption to your internal stakeholders). Whether you...