Resources

On-Demand Webinar

FTP, FTPS, & SFTP: Which Protocol Should You Use and When?

FTP, FTPS, and SFTP are three of the key protocols for transferring files, but do you know which one is the best way to secure your organization’s sensitive data during the transfer process? Our webinar is here to help you learn the differences between the protocols, how to determine which is the most optimal for your organization, and more. Join Chris Spargen, Sr. Manager of...
On-Demand Webinar

Enhance GoAnywhere MFT for Better Data Security

You already know GoAnywhere MFT is the secure, streamlined way to protect sensitive data as it moves in and out of your organization. But did you know GoAnywhere can be paired with other trusted Fortra solutions to enhance your organization’s data security stance? Discover three key solution pairings that can deliver the data security you need in today’s cybersecurity...
On-Demand Webinar

How to Centralize and Secure File Transfers Organization-Wide

Costly data breaches can occur when individuals and departments use file sharing applications that aren’t centralized or secure and they don’t recognize the risks these actions pose. MFT can deliver a more secure, centralized file transfer process if your organization faces the following: During this session, our presenter Scott Messick will feature these integrations and how...
On-Demand Webinar

Are You Avoiding These Top 10 File Transfer Risks?

About the Webinar You know what good cybersecurity practices look like; maybe you even set them up in your organization. Files are encrypted in transit, workstations and servers are protected with strong password policies, firewalls and blacklists secure the internal network from intruders, and employees are well versed in what a phishing attack looks like. Everything is...
On-Demand Webinar

10 Ways to Make File Transfers Easier, Automated and Secure

Thank you for your interest in this on-demand webinar. Selecting a Managed File Transfer solution for your organization is an important step toward simplifying and securing your mission critical file transfers. There are, however, some important considerations when researching the best MFT solution. Watch this webinar recording to hear Chief Architect Bob Luebbe explain how...
Blog

Are SSH and SFTP the Same?

Image Are SSH and SFTP the Same? SSH and SFTP are a classic pair. They intertwine when it comes to securing communication, and while they have similar capabilities, they are not the same thing. So, what’s the difference between them? Read on to find out.   What is SSH? Secure Shell (SSH) is a transport layer that is used...
Case Study

Meliá Hotels International Gains File Transfer Stability and Confidence with GoAnywhere MFT

Adding GoAnywhere MFT to their IT environment for secure file transfers was the remedy Melia needed. GoAnywhere allowed Meliá Hotels International to integrate these third-party exchanges into the same tool as the rest of their transfers, without making any protocol changes, and with added security through its built-in SFTP and Secure Forms capabilities.
Guide

Beyond FTP: Securing and Managing File Transfers

FTP made its first appearance in 1971, and it hasn’t changed much over the years. Although it has become the standard for business-to-business file transfers, poor FTP implementation practices have left many businesses with severe security and management issues. There’s a better way. Download the white paper to learn how to bring your FTP implementation into a more modern,...
Blog

Security Risks of File Transfers and How to Reduce Them

  Image Transferring files between customers and trading partners, especially files containing sensitive data without appropriate data security protection solutions applied, involves at least some level of risk. You might accidentally send files to the wrong recipient. Or your latest email attachment was sent with an unsecure File...
Blog

How to Secure Your Data Exchanges

  Image Exchanging Data Securely Requires Stepped Up Data Transfer Methods Exchanging data is easy, right? Just grab a file, attach it, and hit “send.” Then sit back and relax. Not so fast! If you want to securely exchange data and protect any sensitive data your files may contain, you need to send them with a secure file transfer...
Blog

This Month in Cybersecurity: The Weather is Heating Up and So Are Cyberattacks

  Image At the time of writing, much of Europe and the U.S. is in the midst of a major heatwave, delivering record temperatures and concerns about climate change. Just as the heat is rising, so is the threat of cyberattacks. New data has emerged that reveals 2022 is looking like it could be the worst year ever for cybersecurity in...
Blog

4 Ways You Can Use Your Digital Rights Management Tool

  Image   In an increasingly collaborative work environment, it’s more important now than ever before that your organization has the highest level of visibility and control possible over its data. While knowing how to choose the right data security solutions such as managed file transfer, data classification, and more is a...
Blog

Largest Data Breaches in Last 10 Years

  Image Bigger is often better. A bigger slice of pizza or a bigger paycheck sounds pretty nice. An extra-large data breach, not so much. Listing out the biggest data breaches of all time can be challenging, as the next big one could be right around the corner. At the time of this writing, reports are out that the Personally...
Blog

Lessons Learned from the REvil Ransomware Attack of 2021

  Image Fireworks lighting up the sky, the smell of backyard grills cranking out delicious food, and organizations reeling from massive global cyberattacks. Aaah….those not-so-sweet memories of that first weekend in July 2021, when hundreds of businesses were smacked with the financial, logistical, and reputational ramifications of...
Blog

This Month in Cybersecurity: Summer is Here, but There’s No Vacation From Cyberattacks

  Image June generally marks the start of summer, although anyone thinking the cyber criminals will take a few months off should probably think again. Not only has one of most sacred of summer institutions – Wimbledon – been subject to a threat, but fresh attacks and threats emerged all over the world. It’s clear that organizations...