Resources

On-Demand Webinar

Strengthen Your Defense: Updated GoAnywhere Hardening Best Practices

Strengthen your security defenses. Our Strengthen Your Defense: Updated GoAnywhere Best Practices customer webinar zeroes in on GoAnywhere’s updated hardening and architecture guides, which details the best practices and configurations to help you further boost the security of your GoAnywhere environment. ...
Blog

What is a TFTP Server?

What is a TFTP Server? TFTP, or Trivial File Transfer Protocol lives up to its name as it is a lightweight, simple protocol used to send files across a network. The server of this “trivial” protocol allows computers in and out of an organization’s network to exchange files using TFTP. As a lightweight protocol, there is less complexity, and therefore...
Blog

What We Learned in Our Inaugural State of Cybersecurity Survey

No one knows the challenges of securing an organization like the professionals who carry that responsibility daily. We set out to better understand the things they deal with and what they plan to focus on in our inaugural 2024 Fortra State of Cybersecurity Survey. Here are five key takeaways from the survey. 81% Call Phishing and Smishing Top Security...
Guide

Secure Your Cloud Data

Whether you are already moving select pieces of your business to the cloud, just starting the cloud conversation, or are considering establishing a hybrid environment, you're in good company. Organizations move to the cloud in some fashion for its flexibility, scalability, and faster deployment. However, there is still hesitancy in adapting cloud technology due to security concerns as well as...
Guide

MFT’s Role in Business: IT Leaders Weigh in

As data needs to move beyond traditional business boundaries, organizations struggle to find ways to make that happen quickly, securely, and at scale. It’s no wonder many are turning to Managed File Transfer (MFT) solutions to do it. In this eBook, Fortra sits down with nine industry experts about the benefits of implementing MFT in their environments...
Guide

Streamlining Business Operations: Harnessing the Power of MFT

Say goodbye to data transfer headaches and embrace seamless connectivity with our exclusive whitepaper on Managed File Transfer (MFT). Despite FTP often the go-to for business-to-business file transfers, inadequate FTP implementations have plagued numerous businesses with major security and management challenges. Our white paper explores how to modernize and secure your FTP framework to enhance...
Blog

Building Strong Software Through Third-Party and Internal Testing

In my last post I wrote about protecting the supply chain and how strong bricks make strong walls, referencing how creating software with strong internal components and securely crafted code adds strength to the enterprises using that software. When considering any component being added into an environment, evaluating its security posture and attack...
On-Demand Webinar

FTP, FTPS, & SFTP: Which Protocol You Should Use and When?

FTP, FTPS, and SFTP are three key file transfer protocols, but do you know which protocol is best for securing your organization’s sensitive data?  This webinar explores the differences between these protocols to help you determine which is best for your organization’s data transfer needs.  
Blog

On-Premises vs. Cloud: Which File Transfer Method is Best for You?

If your organization is debating between on-premises and cloud deployment for your business-critical file transfer needs, there are a few considerations around compliance, resources, and infrastructure to help you determine which option makes the most sense for your organization. “If you’re already using an on-premises solution, any discussion of a...
Blog

How MFT Solves Email Attachment Problems

Managed File Transfer (MFT) future-proofs an organization’s ability to send files at the speed of business and break free of the limiting constraints of email attachments.
Blog

MFT Security Champions: First Responders for Solution Security

What is a Security Champion? Software users have expectations that the solution they choose to execute key business functions is continually being assessed for security, among other attributes. One role within security-conscious organizations that helps proactively meet those expectations is that of Security Champion. According to industry...
Product Video

Cloud Connectors Demo

Check out this demo of the Google Drive and Microsoft OneDrive connectors.
Case Study

Healthcare Company Boosts File Transfer Security with Scanning Solution

A private, nonprofit health company and one of the largest healthcare organizations in the southern United States takes advantage of the security, automation, encryption, and ease of use of their managed file transfer solution, Fortra’s GoAnywhere MFT. However, they had no reliable way to scan the personal and sensitive patient files they transferred daily for threats as those files moved in and out of their network.
On-Demand Webinar

Strengthen Your Defense: Updated GoAnywhere Hardening Best Practices

Strengthen your security defenses. Our Strengthen Your Defense: Updated GoAnywhere Best Practices customer webinar on zeroes in on GoAnywhere’s updated hardening and architecture guides, which details the best practices and configurations to help you further boost the security of your GoAnywhere environment.Fortra’s Chris Spargen, Senior Manager, Solutions Engineering, covers:Updates to the most...
Blog

Sharing Financial Files: Benefits of MFT

Financial file matters matter. Not only are these files a top priority to the banks and financial institutions that handle millions of transactions daily, they also matter to the industry’s compliance regulators, and to the public trusting that their financial information is secured. How organizational and personal financial data is handled and...
Blog

Protecting the Supply Chain: Strong Bricks Make Strong Walls

When I was young, we had toy bricks made of cardboard that were great for tiny hands. They were lightweight and easy to stack, and we created many walls, forts, and towers. As wonderful as these were, they would do little to protect against an attacking army. For that, we’d need strong material and sound construction for defense. Quarried stone and...