Resources

Blog

PCI DSS 4.0 - What to Expect, What's Coming, How to Comply

  Image Get ready for more stringent PCI DSS compliance requirements. The PCI Security Standards Council (PCI SSC) updated its version 4.0 requirements in March 2022, in large part to address increasingly sophisticated cybercriminal threats. Rapidly growing contactless and cloud-based card usage also helped nudge an update to PCI DSS...
Case Study

Dayton Parts Automates Data Movement and Distribution with Managed File Transfer

Industry: Manufacturing Dayton Parts knows that sending personalized price sheets to their valued customers on a regular basis is good business. This detailed personal attention continues to produce new and loyal customers. As the customer base grew, the amount of effort to create and distribute personalized price sheets began to affect productivity. Dayton Parts realized they...
Case Study

AnMed Health Improves File Transfer Stability and Enjoys Significant Cost Savings Thanks to MFT

Industry: Healthcare As legacy FTP processes start to degrade, they slowly consume more and more IT resources. Most companies don't recognize the true enormity of the problem until it comes to a head. AnMed Health (Anderson Area Medical Center) recognized the inefficiency and risk of their file transfer operations and set out to find a replacement: GoAnywhere MFT. Reducing...
Blog

Are SSH and SFTP the Same?

Image Are SSH and SFTP the Same? SSH and SFTP are a classic pair. They intertwine when it comes to securing communication, and while they have similar capabilities, they are not the same thing. So, what’s the difference between them? Read on to find out.   What is SSH? Secure Shell (SSH) is a transport layer that is used...
Guide

Why Automating Encryption and Decryption Makes Good Cybersecurity Sense

Not every message or piece of data is for everyone’s eyes. That’s the basic premise of why organizations need encryption. But how does it work? Do you need different types of encryption for different situations? Can encryption be integrated with your existing business technologies? Our guide, Why Automating Encryption and Decryption Makes Good Cybersecurity Sense, offers a...
Guide

The GoAnywhere Book of Secure File Transfer Project Examples

IT and cybersecurity teams frequently envision, create, and implement innovative uses for their secure file transfer software. These unique applications allow them to solve critical industry and organizational needs without using a secondary solution or tool! In "The GoAnywhere Book of Secure File Transfer Project Examples," you'll discover countless ways your peers use MFT in...