Resources

Blog

How Does the DMZ Impact Security?

Your Secret Weapon for Data SecurityWhen weapons and military forces have been removed from active duty, this is referred to as “demilitarization.” On the internet, the demilitarized zone, or the DMZ, is a similar situation.What is the DMZ?The DMZ is the neutral network that resides between the Internet and your organization’s private network. It’s...
Blog

What is NIST?

NIST, the National Institute of Standards and Technology, is a lab and non-regulatory federal agency of the U.S. Department of Commerce. Founded in 1901 as a tool to boost the U.S.'s global competitiveness, NIST fosters efforts to create standards across technology systems. Today, NIST continues to push for innovation in a variety of industries and...
Blog

7 Unique Ways to Use MFT for Manufacturing

While the manufacturing industry is often thought of as primarily centered around physical processes and tangible output, it also requires that electronic data files be exchanged between your trading partners, departments and government entities. These transfers, along with other key business processes, don’t have to entail hundreds of hours that...
Blog

4 Benefits of On-premises Enterprise File Sync and Sharing

The value of mission-critical business documents can't be overstated — but lax or renegade employees or trading partners can put your sensitive data at risk with reckless storage or sharing practices. Luckily, knowing that your data hasn't been exposed is as easy as implementing a secure Enterprise File Sync and Share (EFSS) solution. There are...
Blog

User Sharing and Collaboration: Security Concerns, Risks, and How to Securely Collaborate

Collaboration in the WorkspaceSecure collaboration tools that permit the sharing of sensitive data between users are quickly gaining momentum in the world of technology and file transfer.Although there are many benefits to utilizing these tools in the workspace, with user sharing and secure collaboration comes security concerns and a variety of...
Blog

How GoAnywhere MFT Can Help You Transition to the Cloud

Doing business via the cloud is the new normal for many organizations, so it’s important to consider how you’ll manage the transition to the cloud when you’re ready to make the move – either entirely or simply for a few key business processes. Without a secure cloud file transfer solution in place, your valuable data could be at risk.The cloud...
Blog

What are the Secure Messaging Standards in Australia?

Secure Messaging in HealthcareHealthcare is essential to live a healthy life, but it shouldn’t come at the expense of your privacy.Healthcare is an industry that will always be growing, which means that if your situation transitions to a place where you need to see a new doctor or a specialist, your very private and personal health records will need...
Blog

What is Wrong With Free File Transfer?

Free time! Free food! Free kittens! All great concepts, right? Free file transfers! Ummmm, not so much. The old adage, “If it sounds too good to be true, it probably is…” definitely holds when it comes to file transfers. After all, the data you send to third-parties, vendors, customers and even internal staff is priceless and, in the wrong hands...
Blog

How Advanced Workflows Goes Beyond the Surface

Imagine taking one of your monstrous, days-long tasks and condensing it into just a few clicks. With Advanced Workflows, you can do just that: set up a task once and let GoAnywhere MFT do the rest. The full scope of Advanced Workflows is vast; dive deep into this popular Project-builder that helps you automate and manipulate data movement throughout...
Blog

What's the Difference Between AS2, AS3, and AS4?

If you think these three protocols are simply sequential updates from the 1990s’ AS1 protocol you’d be mistaken. Each protocol brings its own distinct features to the data transmission table. Here’s a few key differences between them.What is AS2?AS2 (Applicability Statement 2) is a protocol specification used to transmit sensitive data securely and...
Blog

Going Beyond File Transfer

Intergalactic – or at least global – organizations of all sizes use GoAnywhere MFT to securely transfer data while saving time, money, and valuable resources. But moving files from one place to another is just the start of the GoAnywhere adventure.GoAnywhere MFT has built-in elements that anyone can access from their first login alongside pick-and...
Blog

Get Acquainted with Our Glossary

Meet Our GlossaryTech terminology is always expanding and growing, and it’s not slowing down any time soon as the world becomes more reliant on technology in the workforce and beyond.Finding the right outlet for exploring and learning technical terms can be a hit or miss, but GoAnywhere’s glossary is a knockout.Why a Glossary?As the endless amounts of...
Blog

What is the California Consumer Privacy Act?

The California Consumer Privacy Act (CCPA), the latest data privacy law in the Golden State, went into effect on January 1st, 2020. Some have compared it to the UK’s GDPR (General Data Protection Regulation), and they’re not far off – like the GDPR, the CCPA is intended to protect individuals’ private data by making data collection and usage more...
Blog

How to Evaluate MFT Vendors

How to Evaluate MFT VendorsYou know you want one – a powerful managed file transfer (MFT) solution – that enterprise solution that’ll make life easier, support multiple secure protocols, help you meet compliance regulations, alert you when transfers fail, restart them, and more. But, how do you know which MFT solution is right for you and your...
Blog

How Are Your Peers Utilizing Automation in GoAnywhere?

The Uses are EndlessIt’s no secret that automation is a great way to boost your business. It can save time, money, and important resources. But how is it being used by your peers on a day-to-day basis? Read on for some examples straight from your peers’ own personal experiences automating their file transfer processes.Adams County, ColoradoAdams...
Blog

5 Projects You Could Tackle with a GoAnywhere Trial

It's happened to us all – you start a free software trial, only to get stuck at step 2: what to do first? Plotting a plan of attack before your first login can help you get the most out of your limited time with the product (and might even help you down the line when you're making the case for adoption to your internal stakeholders). Whether you...
Blog

Is Automation All It’s Cracked Up to Be?

Automation is KeyWe’ve all had our moments of being skeptical when something sounds too good to be true. However, automation is no joking matter. Automation is a great way to boost your business by saving time, money, and important resources. What is Automation?Automation is the use of electronics and/or computer...
On-Demand Webinar

FileCatalyst Workflow 5.1: An Introduction

Summary Our team has been hard at work bringing new updates and features to FileCatalyst Workflow, and our Co-Founder & President, John Tkaczewski, hosted a webinar on January 9th to share what’s new with this version. What’s New Some of the new features include: Added: “Request Files Here” feature, allows File Area users to Request files from outside users to upload into a chosen folder in...
Blog

Top Data Breaches of 2019: How You Can Minimize Your Risks

Top Data Breaches of 2019: How You Can Minimize Your RiskYour organization made the headlines! That’s great, right? Not if it’s because you had sensitive data breached. A data breach can wreak financial and logistical havoc for you, your customers, patients, employees, and others. More importantly, it can severely impact the reputation you’ve so...
Blog

Resolve to Make Files More Secure in the New Year

Make Resolutions - AND Keep ThemResolutions. Every year you make them. Every year you break them. Make 2020 the year you finally resolve to make your file transfers more secure. Do it — even if you’re a stranger to the gym, you still sport those extra 10 pounds and haven’t called your mom in a week.Don’t wait until mid-January to feel guilty about...