Blog

Blog

How Encryption Works: Everything You Need to Know

Image   What is Data Encryption? Encryption is a method of encoding data (messages or files) so that only authorized parties can read or access that data. Encryption software uses complex algorithms to scramble the data being sent. Once received, the data can be decrypted using a key provided by the originator of the message. The...
Blog

Replace Your FTP Scripts to Increase Security

  Image One too many things has gone wrong: a file didn’t arrive at its destination and you’re not sure why; your developer is out of office and you need to make a small change to your file transfer script; you logged into five different tools to schedule a simple transfer. And suddenly you realize: the time has come to move away...
Blog

Benefits of Single Sign-on (SSO)

  Image More than one is usually a good thing. More french fries, more vacation days, more friends. More usernames and passwords? Not so much. Organizations are increasingly turning to single sign-on (SSO) to lessen the burden of employees needing to remember endless usernames and passwords to access all the applications, websites...
Blog

What’s the Difference Between the Cloud and SaaS?

  Image   The Cloud vs. SaaS The cloud and SaaS may seem interchangeable when you consider their similarities. However, these two terms refer to very different things, both with their own defining characteristics.   What is the Cloud? Although the cloud has skyrocketed in popularity over the last few years, it’s okay...
Blog

Why a SaaS Solution Can Benefit Your Company

  Image SaaS – or Software as a Service – is one of the most common uses of the cloud. Think your personal Gmail, where you can access your email but you don’t need to host the software on your personal machine or maintain the software – let alone the hardware hosting it. Simply connect to the cloud-based application over the...
Blog

How to Revamp Your Organization's Cybersecurity Program

  Image When cyberattacks and data breaches make the news, it’s usually because they’re at large companies like Facebook or healthcare organizations. But every organization, large or small, needs to be concerned about cybersecurity; hackers have begun to understand that, while smaller companies may have less data on hand, they may...
Blog

Benefits of a Content Collaboration Platform

  Image   Once upon a time, an organization’s valuable content lived in file drawers with neat little tabbed folders. It also lived on top of desks and on desktops. It lived in saved emails, cloud storage services, and even was embedded in texts. When it was time to share that content however, finding it, working with it, and...
Blog

4 Benefits of On-premises Enterprise File Sync and Sharing

  Image The value of mission-critical business documents can't be overstated — but lax or renegade employees or trading partners can put your sensitive data at risk with reckless storage or sharing practices. Luckily, knowing that your data hasn't been exposed is as easy as implementing a secure Enterprise File Sync and Share (EFSS)...
Blog

How GoAnywhere MFT Can Help You Transition to the Cloud

  Image Doing business via the cloud is the new normal for many organizations, so it’s important to consider how you’ll manage the transition to the cloud when you’re ready to make the move – either entirely or simply for a few key business processes. Without a secure cloud file transfer solution in place, your valuable data could be...
Blog

What is Wrong With Free File Transfer?

  Image Free time! Free food! Free kittens! All great concepts, right? Free file transfers! Ummmm, not so much. The old adage, “If it sounds too good to be true, it probably is…” definitely holds when it comes to file transfers. After all, the data you send to third-parties, vendors, customers and even internal staff is priceless...
Blog

How Advanced Workflows Goes Beyond the Surface

  Image Imagine taking one of your monstrous, days-long tasks and condensing it into just a few clicks. With Advanced Workflows, you can do just that: set up a task once and let GoAnywhere MFT do the rest. The full scope of Advanced Workflows is vast; dive deep into this popular Project-builder that helps you automate and manipulate...
Blog

Top Data Breaches of 2019: How You Can Minimize Your Risks

  Image   Top Data Breaches of 2019: How You Can Minimize Your Risk   Your organization made the headlines! That’s great, right? Not if it’s because you had sensitive data breached. A data breach can wreak financial and logistical havoc for you, your customers, patients, employees, and others. More importantly, it can severely...
Blog

7 Essential Resources on PCI DSS Security

  Image Note from the Editor: This article was originally published in February 2017. It has been updated with resources current to PCI DSS version 3.2.1. Did you know that 80% of organizations are not compliant with PCI DSS requirements? That means, if you’re reading this, there’s a pretty good chance your company needs to...
Blog

Need a Cloud-Based MFT Environment? Try a Hybrid Cloud Setup

  Image Cloud integration is growing in popularity, but committing 100% to the cloud isn’t always practical or secure for organizations. If you’re in the market for cloud-based solutions, read our quick overview below. For a more comprehensive exploration of when to choose a hybrid cloud and how keep your data encrypted through and...
Blog

What are SFTP Servers?

  Image   What are SFTP Servers? A typical file transfer server helps transfer files server-to-server or client-to-server, and SFTP servers are a more protected version: they encrypt data to keep sensitive information secure while moving files, and some have the added bonus of encrypting files at rest. SFTP servers use a single...
Blog

What Port Does SFTP Use?

  Image       Different Protocol, Different Port Ports, also known as channels, are an integral part of the successful delivery and communication process of secure files. Although the specific protocols that operate on these ports makes the most difference, are you aware of which actual port SFTP uses? What is SFTP? SFTP (SSH...
Blog

Open PGP and GoAnywhere MFT: What You Need to Know

  Image       Which Solution is Right for You? Open PGP vs. GoAnywhere MFT If you have sensitive files that need to get from point A to Point B securely, you may have considered utilizing Open PGP or a managed file transfer solution, like GoAnywhere MFT. Do you know which option is the best fit for your organization? What is...
Blog

Which is Better? - AS2 vs. AS4

  Image   AS2 vs. AS4   AS2 and AS4 are both popular file transfer protocols that allow businesses to exchange data securely with their business partners. However, what is the difference between them, and which of the two is better? What is AS2? AS2 (Applicability Statement 2) is a protocol specification that’s used to transmit...
Blog

Think Your Customer Data was Exposed? Follow These Steps

  Image When a prospect or customer shares personal data with a business, they expect their information will be stored securely, kept safe from vulnerabilities, and used only for the purposes with which it was collected. Whether this data is an email address, a birthday, a personal identifier, or credit card numbers, the weight of...
Blog

Are SFTP Files Encrypted?

    Image The definitive answer to "Are SFTP Files Encrypted," is yes! SFTP, short for Secure Shell (SSH) File Transfer Protocol is a network protocol that organizations use to secure and send file transfers. SFTP is firewall-friendly, supports key-based authentication, encrypts usernames and passwords, and implements strong...