Resources

Blog

How Encryption Works: Everything You Need to Know

Image   What is Data Encryption? Encryption is a method of encoding data (messages or files) so that only authorized parties can read or access that data. Encryption software uses complex algorithms to scramble the data being sent. Once received, the data can be decrypted using a key provided by the originator of the message. The...
Blog

Why You Should Integrate Your DLP with MFT

  Image Why Integrating DLP with MFT Enhances Data Security Like Calvin and Hobbes, Sherlock and Watson, or even Ben and Jerry, a good partnership combines the best of both worlds – and creates a whole that is greater than the sum of its parts. Joining complimentary software solutions can do the same, opening up a new world of data...
Blog

How to Revamp Your Organization's Cybersecurity Program

  Image When cyberattacks and data breaches make the news, it’s usually because they’re at large companies like Facebook or healthcare organizations. But every organization, large or small, needs to be concerned about cybersecurity; hackers have begun to understand that, while smaller companies may have less data on hand, they may...
Article

10 Ways to Improve Your Processes with Advanced Workflows

Image   Whether you’re already using Advanced Workflows, in search of some tips and tricks, or haven’t explored this feature yet but are interested in learning more, you’ve come to the right place. Workflows, also known as Projects, expand and unlock superior automation for your file transfers. This module helps to enhance...
Blog

5 Projects You Could Tackle with a GoAnywhere Trial

  Image It's happened to us all – you start a free software trial, only to get stuck at step 2: what to do first? Plotting a plan of attack before your first login can help you get the most out of your limited time with the product (and might even help you down the line when you're making the case for adoption to your internal...
Blog

Open PGP and GoAnywhere MFT: What You Need to Know

  Image       Which Solution is Right for You? Open PGP vs. GoAnywhere MFT If you have sensitive files that need to get from point A to Point B securely, you may have considered utilizing Open PGP or a managed file transfer solution, like GoAnywhere MFT. Do you know which option is the best fit for your organization? What is...
Blog

5 Benefits of PGP Decryption Using Managed File Transfer

  Image If your trading partners or vendors require you to PGP encrypt or decrypt the files you exchange, you may be on the search for an affordable, trust-worthy PGP software to implement in your organization. The software you’re looking for may also need to support more than basic PGP decrypt and encrypt functionality. You may want...
Blog

How to Encrypt Files in Linux

  Image If your organization uses Linux operating systems to run key business processes, it’s important to implement tried-and-tested Linux security practices that support critical files as they transfer from one system to another. One requirement that pops up frequently for Linux users is file encryption. Linux files need to be...
Blog

GoAnywhere MFT Not Affected by EFAIL Vulnerabilities

  Image Ashland, NE, May 16, 2018 In light of the recent Open PGP & S/MIME warning (EFAIL), GoAnywhere has performed a software security review of its managed file transfer solution to ensure customers and their encrypted emails are not affected by this vulnerability. The review was positive and demonstrates that GoAnywhere MFT is...
Press Release

Free Open PGP Encryption Tool Now Available

Omaha, Neb - March 25, 2013 Linoma Software [now Fortra] is pleased to announce the release of a free encryption tool for the desktop that uses the popular Open PGP standard. Image   This unrestricted freeware, named GoAnywhere Open PGP Studio, can encrypt sensitive documents on a variety of operating systems including Windows,...
Blog

How to Solve 4 Common Email Security Challenges

  Image Yes. Emailing someone is still one of the easiest ways to share data. However, there are some important caveats to sharing files this way that can put your organization’s file transfers at risk. Email File Transfer Challenges These are the four big challenges that organizations should be aware of when transmitting files via...
Blog

Meeting Compliance Regulations and Privacy Laws for Sensitive Data Transfers

  Image Comply with Data Security Requirements Highly sensitive data is exchanged between organizations on a constant basis making data security compliance more vital than ever to keep communication flowing. For instance, if a business routinely transmits financial information to their bank including payroll direct deposits and...