Case Study
AnMed Health Improves File Transfer Stability and Enjoys Significant Cost Savings Thanks to MFT
Industry: Healthcare
As legacy FTP processes start to degrade, they slowly consume more and more IT resources. Most companies don't recognize the true enormity of the problem until it comes to a head.
AnMed Health (Anderson Area Medical Center) recognized the inefficiency and risk of their file transfer operations and set out to find a replacement: GoAnywhere MFT.
Reducing Staffing Resources...
Blog
7 Scenarios in Which to Use Encryption Software
By Heath Kath on Thu, 08/26/2021
Not sure what encryption software is used for – or maybe just when to use each type? Discover common file transfer scenarios and which data encryption protocol best fits your needs.
What is Data Encryption Software?
Data encryption software, also called file encryption software, solutions come in various forms: free or paid, robust or...
Blog
What is PGP Encryption and How to Use It
By Chris Spargen on Tue, 08/03/2021
Encryption is key to securing organizational data in the short term and long. However, there are a few different types of encryption that organizations can use to achieve the optimal level of security. GnuPG is one of the most notable. However, today we’ll break down how PGP encryption works and how to use it to maintain the safety of your files.
...
Blog
PGP vs. Open PGP: What’s the Difference?
By Chris Spargen on Tue, 05/04/2021
Encryption standards become more and more important every day. With the rise of data breaches, it’s critical now more than ever for organizations to raise the level at which they protect their information. Partly, educating employees has presented itself as an easy way to make data safer. However, taking the time to choose the right method of...
Blog
Should You Use PGP or GPG Encryption?
By Heath Kath on Thu, 04/01/2021
Not every piece of information is meant for every pair of eyes. That’s why organizations count on encryption technology – to lock down their sensitive data from malicious acquisition or even human error. And, when it comes to those encryption protocols, you’ve got options. One choice you or your IT team might need to make is whether to use PGP or GPG...
Blog
What is GPG?
By Heath Kath on Tue, 02/23/2021
What is GPG?
GPG, also known as GNU Privacy Guard (GnuPG), is a different adaption, but popular implementation of the Open PGP standard as defined by RFC 4880.
GPG in Depth
GPG is an open-source standard and strong alternative to the official PGP software owned by Symantec. It was developed by Werner Koch and released in 1999 as an alternative to...
Blog
How a Remote Workforce Impacts Your Data Security
By Heath Kath on Thu, 01/07/2021
You did it. Many months ago, you sent your employees home armed with their laptops, a few passwords, and a couple of Zoom invites. Now, hunkered down in their stretchy, comfy clothes, thankful for not having to commute, they’re carrying on the day-to-day business responsibilities for your organization.
But is it really business as usual? Or is your...
Blog
Why You Should Use File Encryption Software
By Heath Kath on Thu, 08/27/2020
File Encryption Software is “Key”
What is the key to keeping your data safe? One word: Encryption. There’s no question that encrypting sensitive data at rest and in motion is essential when it comes to guarding against cyber threats and complying with local, national, or industry-standard requirements.
However, if you’re still on the fence...
Blog
How Encryption Works: Everything You Need to Know
By Heath Kath on Thu, 05/14/2020
What is Data Encryption?
Encryption is a method of encoding data (messages or files) so that only authorized parties can read or access that data. Encryption software uses complex algorithms to scramble the data being sent. Once received, the data can be decrypted using a key provided by the originator of the message. The effectiveness of...
Blog
5 Projects You Could Tackle with a GoAnywhere Trial
By Andrew Woosley on Tue, 01/14/2020
It's happened to us all – you start a free software trial, only to get stuck at step 2: what to do first? Plotting a plan of attack before your first login can help you get the most out of your limited time with the product (and might even help you down the line when you're making the case for adoption to your internal stakeholders).
Whether you don...
Blog
Open PGP and GoAnywhere MFT: What You Need to Know
By Heath Kath on Fri, 10/04/2019
Which Solution is Right for You? Open PGP vs. GoAnywhere MFT
If you have sensitive files that need to get from point A to Point B securely, you may have considered utilizing Open PGP or a managed file transfer solution, like GoAnywhere MFT. Do you know which option is the best fit for your organization?
What is Open PGP?
Open PGP is an...
Blog
5 Benefits of PGP Decryption Using Managed File Transfer
By Heath Kath on Fri, 05/24/2019
If your trading partners or vendors require you to PGP encrypt or decrypt the files you exchange, you may be on the search for an affordable, trust-worthy PGP software to implement in your organization. The software you’re looking for may also need to support more than basic PGP decrypt and encrypt functionality. You may want it to include a key...
Blog
How to Encrypt Files in Linux
By Heath Kath on Thu, 05/16/2019
If your organization uses Linux operating systems to run key business processes, it’s important to implement tried-and-tested Linux security practices that support critical files as they transfer from one system to another. One requirement that pops up frequently for Linux users is file encryption. Linux files need to be encrypted seamlessly and...
Blog
GoAnywhere MFT Not Affected by EFAIL Vulnerabilities
By Brian Pick on Wed, 05/16/2018
Ashland, NE, May 16, 2018
In light of the recent Open PGP & S/MIME warning (EFAIL), GoAnywhere has performed a software security review of its managed file transfer solution to ensure customers and their encrypted emails are not affected by this vulnerability. The review was positive and demonstrates that GoAnywhere MFT is already protected from...
Blog
How to Solve 4 Common Email Security Challenges
By Brian Pick on Mon, 10/29/2012
Yes. Emailing someone is still one of the easiest ways to share data. However, there are some important caveats to sharing files this way that can put your organization’s file transfers at risk.
Email File Transfer Challenges
These are the four big challenges that organizations should be aware of when transmitting files via email.
Email is sent ...