Resources

Article

Encryption & Decryption Within a Workflow

This guide will walk through the process of a Project (workflow) that encrypts and decrypts a set of files. Typically, these are not actions that would be done in the same Project, but for the sake of this demonstration, both encryption and decryption will be done in one Project. Getting Started...
Article

Docker

Obtain a quick introduction into the tool Docker.
Article

Configuring Web User Accounts to Receive AS2 Messages

In this tutorial, you will learn how to configure Web User accounts in GoAnywhere MFT to send you messages using AS2. Once you have configured the AS2 Service, you’re ready to configure your AS2 trading partner Web User accounts. Each AS2 trading partner must be setup as a Web User in GoAnywhere. In order to provide AS2 file transfer services with your trading partners, you...
Article

Automating Project Workflows

Learn the three fastest ways to automate Project workflows in GoAnywhere MFT using Schedules, Monitors and Triggers.
Blog

How to Find a File Transfer Solution for Your Cybersecurity Needs

Image   If your organization has already gone through an assessment or a reevaluation of your cybersecurity processes, policies, and tools, chances are you confirmed a need to ensure that the mission-critical and sensitive data you exchange every day must be secured both at rest and in transit. File transfer security is a...
Article

How Secure Forms Work

Secure Forms allow end users to fill out customized forms with one or more input values and optionally upload files. Users can access Secure Forms through the HTTPS Web Client in GoAnywhere or submit forms by making SOAP or REST requests from custom-built applications. When a form is submitted, a Project in GoAnywhere is executed to automatically process the submitted values...
Article

Getting Started with your GoAnywhere MFTaaS Trial

GoAnywhere MFT can be deployed in the cloud for both evaluation and production usage. This is a SaaS (software as a service) model in which Fortra will manage the software updates, platform, storage, and backups. This tutorial will step you through the process of creating your GoAnywhere MFT cloud hosted environment for evaluation purposes. ...
Article

Introduction to Clustering

Clustering is the ability to have two or more instances of GoAnywhere Managed File Transfer (MFT) working together. This is a common setup to increase the power and stability of your environment. First, we will cover the features and benefits of clustering with MFT, then we will go over the requirements for its implementation. ...
Article

Activating a Trial License

Learn how to easily download and activate a GoAnywhere MFT Trial License with the on-screen tutorial provided for you and unlock all of the functionality GoAnywhere MFT has to offer.
Blog

Problems Secure File Transfer Solves in Financial Services

  Image   Nowhere is trust more important than in the financial services industry. People operate on trust when they invest their life savings in a bank account, build their 401K, take out a life insurance policy, transfer their stocks, or make an online payment. The transactions just work, and – we take for granted – the money is...
Blog

How to Identify Cybersecurity Needs for File Transfers

  Image   Cybersecurity. The word or concept seems to arise at some point in nearly every news feed lately. Its prominence has risen over the past few years as the impact of inadequate cybersecurity and very determined cybercriminals is so substantial – whether you’re a small business or a large, sprawling enterprise.   Before we...
Blog

This Month in Cybersecurity: GTA 6 and Uber Hit with Leaks

  Image   It seems that bad actors aren’t just related to Hollywood. As technology increases, and organizations invest more in cybersecurity strategies, hackers elevate their own tactics as well. Even major corporations aren’t immune, which only goes to show the importance of pushing for strong solutions to protect your data like...
Article

How to Query a Database and Write the Data to JSON

Connect to and query a wide variety of database servers including MySQL, Microsoft SQL Server, PostgreSQL, Derby, Oracle, and DB2. Then, write data to the JSON file format.
Blog

What Your Organization Needs to Know About Secure File Transfer

  Image It’s safe to say that the last few years have significantly increased the demand for Secure File Transfer (SFT) solutions such as GoAnywhere MFT. When the pandemic made vast numbers of the working population work from home almost overnight, there was a sudden spike in the requirement for robust and effective SFT. People...
Blog

Secure Government Files with a Managed File Transfer Solution

  Image If government IT departments were to debate on key cybersecurity issues, one that likely keeps people up at night is how to help ensure their sensitive, often top-secret, data is secure when being sent in and out of their network. While there may be several candidates in the running to address this cybersecurity issue, a...
Blog

SOX Compliance: What You Need to Know

  Image   What is SOX or Sarbanes-Oxley Act?   SOX, or the Sarbanes-Oxley Act, was enacted by Congress in 2002 to help provide better security for the general public and consumers. It was structured to improve corporate governance and accountability and to better shield the public from malicious or unintentional misuse of...
Blog

Overcome the Limits of Email Attachments with FileCatalyst

“Email too large.” That dreaded bounceback message you get after sending an important email with a large attachment can be avoided.  Most email systems impose a strict 25 MB size limitation on attachments. That just doesn’t cut it today, with hundreds of data-rich large files, videos, and more needing to be exchanged throughout the day. There is a way to ensure that your large...
Blog

How MFT Can Offset the Rising Cost of Data Breaches in 2022 

  Image There’s plenty to be concerned about when it comes to data breaches. At top of mind, there’s always the information that’s stolen, be it customer data, personal emails, confidential files, or any other number of company secrets that are supposed to remain within the company. Then there’s the monetary cost of the data breach –...