Resources

Blog

What is a TFTP Server?

What is a TFTP Server? TFTP, or Trivial File Transfer Protocol lives up to its name as it is a lightweight, simple protocol used to send files across a network. The server of this “trivial” protocol allows computers in and out of an organization’s network to exchange files using TFTP. As a lightweight protocol, there is less complexity, and therefore reduced overhead. It works quite simply: A...
Blog

What We Learned in Our Inaugural State of Cybersecurity Survey

No one knows the challenges of securing an organization like the professionals who carry that responsibility daily. We set out to better understand the things they deal with and what they plan to focus on in our inaugural 2024 Fortra State of Cybersecurity Survey. Here are five key takeaways from the survey. 81% Call Phishing and Smishing Top Security Risk for 2024 Both phishing and smishing (SMS...
Blog

Sharing Financial Files: Benefits of MFT

Financial file matters matter. Not only are these files a top priority to the banks and financial institutions that handle millions of transactions daily, they also matter to the industry’s compliance regulators, and to the public trusting that their financial information is secured. How organizational and personal financial data is handled and secured is a heavy responsibility, most often landing...
Blog

Transferring Government Files: MFT Addresses Biggest Challenges

Whether big government or small, assuring the security of files in the public sector is of utmost importance for security, as well as assuring any information from citizens is protected. According to 2021 US Census data, there are 90,000 government entities . Protecting the data these agencies handle is admittedly a big lift. Not only are government agencies, military departments, or contractors...
Blog

Considerations for Cloud File Transfers

Whether your organization is debating on moving your file transfer process entirely to the cloud, adopting a hybrid environment, or using a hosted SaaS solution, review the considerations below to help better clarify and get the organizational support needed for a cloud-based file transfer solution. There are no absolute right or wrong answers to the questions that may arise as you check out your...
Blog

Collaboration Tools Like Box.com vs. MFT: What Do You Really Need?

Collaboration tools like Box.com and managed file transfer (MFT) tools like GoAnywhere MFT, are not the same. Both, however, have unique advantages, depending on your organization’s requirements around data. Box is a cloud-based tool for organizational teams to collaborate, manage, and store content. GoAnywhere MFT is a secure managed file transfer solution used by organizations to secure...
Blog

Why is it Smart to Bundle Cybersecurity Solutions?

When it comes to cybersecurity, joining the individual strengths of separate solutions to defend against cybersecurity threats is just smart business. What are Some Recommended File Security Pairings? There’s no question that cybersecurity worries are at the top of the list for many organizations and their IT teams. As this Canalys Newsroom article reveals, cybersecurity spending is outpacing the...
Blog

Why Automate Encryption and Decryption for File Transfers?

Automating the encryption and decryption of the data you send out and receive can serve as a first line of defense against cybersecurity threats. And there are more benefits that can further reduce the pressure on your IT staff and administrators and increase security around the files you send and receive each day. How Can Organizations Benefit from Automated File Encryption and Decryption? First...
Case Study

SFT Threat Protection Helps Credit Card Company Securely Transfer Files

For Mercury® Financial, the largest non-bank credit card company in the U.S., a secure file transfer solution is essential. As a current user of Fortra’s GoAnywhere Managed File Transfer (MFT), they rely on the security and flexibility of solutions to transfer files securely and efficiently. Fortra’s Clearswift Secure ICAP Gateway (SIG) was the perfect pairing to add threat protection to their...
Guide

Taking File Transfer Security to Another Level

As companies move to adopt zero trust architecture, securing files and the confidential information they contain is top of mind, especially as sharing data has never been easier. Read our white paper, which covers: How to secure sensitive files and streamline the file transfer process How to protect transferred files wherever they may travel Industry-specific challenges in transferring mission...
Blog

The Encryption Prescription For Healthcare

“Trust me, I’m a doctor.” The saying is overused, but there’s a ring of truth to it. We do trust doctors – with our health, the delivery of our babies, the care of our parents, and the diagnosis of our illnesses. And a lot of information in between. It’s no wonder then that this information – private, sensitive, vulnerable, valuable – is protected by law. However, laws don’t always deter cyber...
Blog

How to Identify Cybersecurity Needs for File Transfers

Cybersecurity. The word or concept seems to arise at some point in nearly every news feed lately. Its prominence has risen over the past few years as the impact of inadequate cybersecurity and very determined cybercriminals is so substantial – whether you’re a small business or a large, sprawling enterprise. Before we dive into how to identify your cybersecurity needs, let’s first define...
Press Release

Scammers Access 50% of Compromised Accounts Within 12 Hours According to New Research

FOSTER CITY, Calif. and LONDON (June 8, 2021) — Fortra's Agari , the market share leader in phishing defense for the enterprise, unveiled today the results of an investigation into the anatomy of compromised email accounts. The threat intelligence brief, titled Anatomy of a Compromised Account , is the first research of its kind, showcasing how threat actors use credential phishing sites to gather...
Blog

How MFT Can Offset the Rising Cost of Data Breaches in 2022 

There’s plenty to be concerned about when it comes to data breaches . At top of mind, there’s always the information that’s stolen, be it customer data, personal emails, confidential files, or any other number of company secrets that are supposed to remain within the company. Then there’s the monetary cost of the data breach – the amount of dollars your company must pay to repair the damage and...
On-Demand Webinar

Manage, Sanitise and Secure your File Transfers

About the Webinar Anti-virus engines are good. But not good enough. Did you know: 24% to 47% of malware attacks are missed by AV engines All of Australia’s major cyber incidents have involved malware not being detected by AV engines All files you receive from external sources, yes, even those trusted partners can be a potential source of malicious code infection. Watch this webinar to learn how...
On-Demand Webinar

Keep Your Data Secure with Clearswift and GoAnywhere MFT

About the Webinar Many organizations have secure file transfer requirements. However, encrypting the transmission of content is not always enough. The areas which often need to be fine-tuned are: Data loss prevention controls Granual rules for specific people, as opposed to givign everyone similar controls Restricting access to sensitive content Enhanced decision-making If you have secure file...