Resources

Blog

Why is it Smart to Bundle Cybersecurity Solutions?

Image When it comes to cybersecurity, joining the individual strengths of separate solutions to defend against cybersecurity threats is just smart business. What are Some Recommended File Security Pairings? There’s no question that cybersecurity worries are at the top of the list for many organizations and their IT teams. As this...
Blog

A Perfect Match: GoAnywhere MFT and Open PGP

Image As companies face increasing pressure to keep data safe, encryption protocols like Open PGP provide an increased level of security to do so. An open-source version of PGP (Pretty Good Protection), Open PGP delivers the same level of protection in a publicly available format. Because of its high availability, it enjoys widespread...
Blog

Exchanging Large Files: What You Need to Know

Image Sending large files to trading partners, vendors, or even within your own organization can pose security risks, delivery failures, and other problems. Exchanging those files with a user-friendly managed file transfer solution can help mitigate these issues, no matter the file size.  What’s the Problem with Sending Large Files? ...
Blog

Security and Automation Solutions for Proactive Cybersecurity

Image Fortra’s GoAnywhere MFT is an integral part of the company’s cybersecurity offerings. Rather than operating as a singular, standalone managed file transfer (MFT) solution, GoAnywhere delivers secure file exchanges under the larger umbrella of Fortra. Formerly known as HelpSystems, the rebranded Fortra presents a simpler,...
Article

Verify Files

Learn how to verify the Open PGP digital signature using a public Open PGP key created or imported to a key store.
Article

Sign Files

Learn how to use Open PGP to sign your files using your secret key to add an extra layer of security for sensitive data.
Article

Key Preferences

With PGP Key Preferences in GoAnywhere Open PGP Studio, learn how to quickly choose which algorithms you want to support with your keys.
Article

Key Manager

The Open PGP Key Manager is your first stop for organizing all your PGP keys. Learn more about the features that you can use.
Article

Microsoft Windows

Installing GoAnywhere Open PGP in Windows is a simple process. Follow these instructions to learn how to easily install GoAnywhere Open PGP Studio in Windows in minutes.
Article

Mac OS X

Easily install Open PGP Studio on a Mac with a few simple steps.
Article

Linux and Unix

Follow these easy instructions for installing GoAnywhere Open PGP Studio in a Linux or Unix-based operating system.
Article

How to Encrypt Files with PGP

File encryption is easy using any of the PGP keys in your Open PGP Studio key store. Learn the process of how to encrypt a file or folder within GoAnywhere.
Article

Encrypt and Sign Files

Text The Open PGP Encrypt and Sign option encrypts and authenticates the file. The file will be encrypted with the public key of the person to whom it is sent and it will be signed with your PGP digital signature created from your own secret key. This...
Article

Decrypt and Verify Files

Text The "Decrypt and Verify File(s)" option in Open PGP Studio allows you to decrypt a file and verify its signature with just a few steps. You will need the corresponding secret key of the PGP public key used to encrypt the files or folders to decrypt a...
Blog

How to Secure Your Data Exchanges

  Image Exchanging Data Securely Requires Stepped Up Data Transfer Methods Exchanging data is easy, right? Just grab a file, attach it, and hit “send.” Then sit back and relax. Not so fast! If you want to securely exchange data and protect any sensitive data your files may contain, you need to send them with a secure file transfer...
Blog

13 Essential MFT Blog Posts You Might Have Missed

  Image There’s a lot out there (and just on this website) about what MFT (managed file transfer) software is, why it’s a good FTP alternative, and how to choose the best file transfer software for your business. That’s why we’ve selected 13 of our top blogs that answer those exactly those questions – and more. And because questions...
Blog

MFT’s Role in Data-Centric Security

  Image What is Data-Centric Security and is MFT a Part of It? When an organization’s security focus encompasses the varied technology, approaches, and policies that zero in on protecting the actual data organizations are entrusted with, versus merely the infrastructure, that strategy is considered data centric. And yes, managed...