Case Study
AnMed Health Improves File Transfer Stability and Enjoys Significant Cost Savings Thanks to MFT
Industry: Healthcare
As legacy FTP processes start to degrade, they slowly consume more and more IT resources. Most companies don't recognize the true enormity of the problem until it comes to a head.
AnMed Health (Anderson Area Medical Center) recognized the inefficiency and risk of their file transfer operations and set out to find a replacement: GoAnywhere MFT.
Reducing...
Blog
7 Scenarios in Which to Use Encryption Software
By Heath Kath on Thu, 08/26/2021
Image
Not sure what encryption software is used for – or maybe just when to use each type? Discover common file transfer scenarios and which data encryption protocol best fits your needs.
What is Data Encryption Software?
Data encryption software, also called file encryption software, solutions come in various forms: free or...
Blog
What is PGP Encryption and How to Use It
By Chris Spargen on Tue, 08/03/2021
Image
Encryption is key to securing organizational data in the short term and long. However, there are a few different types of encryption that organizations can use to achieve the optimal level of security. GnuPG is one of the most notable. However, today we’ll break down how PGP encryption works and how to use it to maintain the...
Blog
PGP vs. Open PGP: What’s the Difference?
By Chris Spargen on Tue, 05/04/2021
Image
Encryption standards become more and more important every day. With the rise of data breaches, it’s critical now more than ever for organizations to raise the level at which they protect their information. Partly, educating employees has presented itself as an easy way to make data safer. However, taking the time to choose...
Blog
Should You Use PGP or GPG Encryption?
By Heath Kath on Thu, 04/01/2021
Image
Not every piece of information is meant for every pair of eyes. That’s why organizations count on encryption technology – to lock down their sensitive data from malicious acquisition or even human error. And, when it comes to those encryption protocols, you’ve got options. One choice you or your IT team might need to make is...
Blog
What is GPG?
By Heath Kath on Tue, 02/23/2021
Image
What is GPG?
GPG, also known as GNU Privacy Guard (GnuPG), is a different adaption, but popular implementation of the Open PGP standard as defined by RFC 4880.
GPG in Depth
GPG is an open-source standard and strong alternative to the official PGP software owned by Symantec. It was developed by Werner Koch and released in...
Blog
How a Remote Workforce Impacts Your Data Security
By Heath Kath on Thu, 01/07/2021
Image
You did it. Many months ago, you sent your employees home armed with their laptops, a few passwords, and a couple of Zoom invites. Now, hunkered down in their stretchy, comfy clothes, thankful for not having to commute, they’re carrying on the day-to-day business responsibilities for your organization.
But is it really...
Blog
Why You Should Use File Encryption Software
By Heath Kath on Thu, 08/27/2020
Image
File Encryption Software is “Key”
What is the key to keeping your data safe? One word: Encryption. There’s no question that encrypting sensitive data at rest and in motion is essential when it comes to guarding against cyber threats and complying with local, national, or industry-standard requirements.
However, if you...
Blog
How Encryption Works: Everything You Need to Know
By Heath Kath on Thu, 05/14/2020
Image
What is Data Encryption?
Encryption is a method of encoding data (messages or files) so that only authorized parties can read or access that data. Encryption software uses complex algorithms to scramble the data being sent. Once received, the data can be decrypted using a key provided by the originator of the message. The...
Article
10 Ways to Improve Your Processes with Advanced Workflows
By Chris Spargen on Thu, 03/12/2020
Image
Whether you’re already using Advanced Workflows, in search of some tips and tricks, or haven’t explored this feature yet but are interested in learning more, you’ve come to the right place.
Workflows, also known as Projects, expand and unlock superior automation for your file transfers. This module helps to enhance...
Blog
5 Projects You Could Tackle with a GoAnywhere Trial
By Andrew Woosley on Tue, 01/14/2020
Image
It's happened to us all – you start a free software trial, only to get stuck at step 2: what to do first? Plotting a plan of attack before your first login can help you get the most out of your limited time with the product (and might even help you down the line when you're making the case for adoption to your internal...
Blog
Open PGP and GoAnywhere MFT: What You Need to Know
By Heath Kath on Fri, 10/04/2019
Image
Which Solution is Right for You? Open PGP vs. GoAnywhere MFT
If you have sensitive files that need to get from point A to Point B securely, you may have considered utilizing Open PGP or a managed file transfer solution, like GoAnywhere MFT. Do you know which option is the best fit for your organization?
What is...
Blog
5 Benefits of PGP Decryption Using Managed File Transfer
By Heath Kath on Fri, 05/24/2019
Image
If your trading partners or vendors require you to PGP encrypt or decrypt the files you exchange, you may be on the search for an affordable, trust-worthy PGP software to implement in your organization. The software you’re looking for may also need to support more than basic PGP decrypt and encrypt functionality. You may want...
Blog
How to Encrypt Files in Linux
By Heath Kath on Thu, 05/16/2019
Image
If your organization uses Linux operating systems to run key business processes, it’s important to implement tried-and-tested Linux security practices that support critical files as they transfer from one system to another. One requirement that pops up frequently for Linux users is file encryption. Linux files need to be...
Blog
GoAnywhere MFT Not Affected by EFAIL Vulnerabilities
By Brian Pick on Wed, 05/16/2018
Image
Ashland, NE, May 16, 2018
In light of the recent Open PGP & S/MIME warning (EFAIL), GoAnywhere has performed a software security review of its managed file transfer solution to ensure customers and their encrypted emails are not affected by this vulnerability. The review was positive and demonstrates that GoAnywhere MFT is...
Blog
How to Solve 4 Common Email Security Challenges
By Brian Pick on Mon, 10/29/2012
Image
Yes. Emailing someone is still one of the easiest ways to share data. However, there are some important caveats to sharing files this way that can put your organization’s file transfers at risk.
Email File Transfer Challenges
These are the four big challenges that organizations should be aware of when transmitting files via...