Resources

Blog

Building Strong Software Through Third-Party and Internal Testing

In my last post I wrote about protecting the supply chain and how strong bricks make strong walls, referencing how creating software with strong internal components and securely crafted code adds strength to the enterprises using that software. When considering any component being added into an environment, evaluating its security posture and attack...
On-Demand Webinar

FTP, FTPS, & SFTP: Which Protocol You Should Use and When?

FTP, FTPS, and SFTP are three key file transfer protocols, but do you know which protocol is best for securing your organization’s sensitive data?  This webinar explores the differences between these protocols to help you determine which is best for your organization’s data transfer needs.  
Blog

On-Premises vs. Cloud: Which File Transfer Method is Best for You?

If your organization is debating between on-premises and cloud deployment for your business-critical file transfer needs, there are a few considerations around compliance, resources, and infrastructure to help you determine which option makes the most sense for your organization. “If you’re already using an on-premises solution, any discussion of a...
Blog

How MFT Solves Email Attachment Problems

Managed File Transfer (MFT) future-proofs an organization’s ability to send files at the speed of business and break free of the limiting constraints of email attachments.
Blog

MFT Security Champions: First Responders for Solution Security

What is a Security Champion? Software users have expectations that the solution they choose to execute key business functions is continually being assessed for security, among other attributes. One role within security-conscious organizations that helps proactively meet those expectations is that of Security Champion. According to industry...
Case Study

Healthcare Company Boosts File Transfer Security with Scanning Solution

A private, nonprofit health company and one of the largest healthcare organizations in the southern United States takes advantage of the security, automation, encryption, and ease of use of their managed file transfer solution, Fortra’s GoAnywhere MFT. However, they had no reliable way to scan the personal and sensitive patient files they transferred daily for threats as those files moved in and out of their network.
On-Demand Webinar

Strengthen Your Defense: Updated GoAnywhere Hardening Best Practices

Strengthen your security defenses. Our Strengthen Your Defense: Updated GoAnywhere Best Practices customer webinar on zeroes in on GoAnywhere’s updated hardening and architecture guides, which details the best practices and configurations to help you further boost the security of your GoAnywhere environment.Fortra’s Chris Spargen, Senior Manager, Solutions Engineering, covers:Updates to the most...
Blog

Sharing Financial Files: Benefits of MFT

Financial file matters matter. Not only are these files a top priority to the banks and financial institutions that handle millions of transactions daily, they also matter to the industry’s compliance regulators, and to the public trusting that their financial information is secured. How organizational and personal financial data is handled and...
Blog

Protecting the Supply Chain: Strong Bricks Make Strong Walls

When I was young, we had toy bricks made of cardboard that were great for tiny hands. They were lightweight and easy to stack, and we created many walls, forts, and towers. As wonderful as these were, they would do little to protect against an attacking army. For that, we’d need strong material and sound construction for defense. Quarried stone and...
Blog

MFT Software Demos: Maximize Your Time

When it comes to selecting software that can have a major impact on how your organization conducts business and secures its most valuable data, you can look at the process much like you do when considering a new vehicle.While a test drive of that shiny new ride can help confirm your expectations for speed and performance, a one-on-one demonstration by...
Blog

Transferring Government Files: MFT Addresses Biggest Challenges

Whether big government or small, assuring the security of files in the public sector is of utmost importance for security, as well as assuring any information from citizens is protected. According to 2021 US Census data, there are 90,000 government entities. Protecting the data these agencies handle is admittedly a big lift.Not only are government...
Blog

FTP vs. SFTP: Considerations for Secure File Transfer

Businesses today rely on the safe transfer of data to operate securely in today’s digital economy. There are several protocols that can be used for this purpose, and each offers a different benefit to your organization. File Transfer Protocol (FTP) has been around longest and is the default file transfer method for many companies with legacy...
On-Demand Webinar

Take the Risk Out of Email with Secure Mail

One “Oh, crud” moment. That’s all it takes for sensitive information like social security numbers or credit card data to fall into the wrong hands. Maybe an employee used unsecure email to send a confidential file to a trading partner, or an email was sent to individuals not authorized to receive the files attached. Now your organization is vulnerable to the possibility of a data breach.
Blog

Secure Cloud File Transfers: Best Practices for Organizations

In today's data-driven world, organizations increasingly rely on the cloud to transfer files securely and efficiently. Whether you are working in a pure cloud environment, a hybrid setup, or leveraging Managed File Transfer as a Service (MFTaaS), ensuring the security of your file transfers is paramount. In this blog, we'll explore the best...
Blog

Considerations for Cloud File Transfers

Whether your organization is debating on moving your file transfer process entirely to the cloud, adopting a hybrid environment, or using a hosted SaaS solution, review the considerations below to help better clarify and get the organizational support needed for a cloud-based file transfer solution. There are no absolute right or wrong answers to...
Blog

Fast File Transfer: Obstacles and Options

Fast, faster, and fastest. With technology comes the benefit of speed to get through tasks easier and yes, faster. Transferring files is no exception. Organizations want and need files to get to their destination quickly and reliably. What Might Slow Down a File Transfer? Getting that business-critical file where it needs to be can sometimes be...
Blog

11 Popular File Transfer Protocols Explained

Edited on 5/8/2024Check out the brief video below, which quickly covers these 11 file transfer protocols, their uses, and the security that comes along with them: 1.FTP7.TCP2.FTPS8.AS23.SFTP9.AS34.SCP10.AS45HTTP11.PeSIT6.HTTPS As organizations have become more cloud-based, connected, and remote what was once easily done – transferring files securely – has become...
Blog

Info-Tech Rates GoAnywhere Highly

GoAnywhere is an industry leader according to the well-respected Info-Tech Research Group. Read on to download the MFT Category Report and learn what goes into this rating.
Blog

Top 10 Takeaways: Verizon 2023 Data Breach Investigations Report

A good look at one of the industry’s most trusted annual cybersecurity reports will tell you attackers are stepping up their game — and leaning into what works. The Verizon 2023 Data Breach Investigations Report analyzed 16,312 security incidents and 5,199 breaches this year, crunching the numbers to find the patterns. From the soaring cost of ransomware to a staggering trend towards financially...
On-Demand Webinar

How to Further Protect Your MFT Server Identity

Securing your important files in transit and at rest is vital to protecting your data. There are, however, additional methods that can guard your GoAnywhere MFT server identity and keep your documents safely in your private network. The GoAnywhere Gateway provides the following security, performance and load balancing benefits: Forward and reverse proxy capabilities Help with meeting your...