Resources

On-Demand Webinar

Remote Data Replication for disaster recovery

Summary When working across global networks, getting files from office to another across continental distances can be a very slow, and costly task to accomplish. Whether making off-site disaster recovery backups, mirroring data across multiple offices, FTP limits the possibilities of creating global content distribution networks. What & How In this webinar FileCatalyst Co...
On-Demand Webinar

Overcoming the Limits of Email Attachments with FileCatalyst

Summary We all use email on a daily basis; millions are sent every minute, making it “the way” we communicate at work. As handy as emails are, they still have limitations that hold back their content sharing potential. One critical setback is the strict size limitations placed on attachments, at a mere 25 MB. In this webinar, FileCatalyst’s Co-Founder and President, John...
Case Study

FileCatalyst & MMTV

Before deploying FileCatalyst, MM TV reporters shipped their media assets to headquarters either physically via physical storage or electronically via email, FTP and TCP. The time it took to deliver content became a major bottleneck in their workflow and significantly hindered their overall productivity. Read on to learn how FileCatalyst was utilized to fix this bottleneck.
Case Study

FileCatalyst & Evirx

While each failed file transfer method had its issues, Evirx encountered similar problems with each assessment: video uploads were slow and unreliable, files were often too large to transfer, user interfaces were unintuitive and difficult to navigate, and the solutions couldn’t integrate into Evirx’s existing web-based solution. Read on to learn how FileCatalyst Direct was deployed to help solve these problems.
Case Study

FileCatalyst & NICE Software

Learn how, using FileCatalyst, EnginFrame’s client organizations were able to recoup lost time by gaining rapid access to their valuable data, applications, and resources.
Case Study

FileCatalyst & NBC Sports Group at Sochi 2014

Learn how, with the help of FileCatalyst, NBC Sports Group broke new ground in live sports production by overcoming the limits of concurrent transfers and solving the problems associated with dynamically changing MXF files.
Blog

GoAnywhere MFT Not Affected by EFAIL Vulnerabilities

  Image Ashland, NE, May 16, 2018 In light of the recent Open PGP & S/MIME warning (EFAIL), GoAnywhere has performed a software security review of its managed file transfer solution to ensure customers and their encrypted emails are not affected by this vulnerability. The review was positive and demonstrates that GoAnywhere MFT is...
Blog

The Square Kilometer Array (SKA) & The Mind Blowing Big Data It Will Produce

I’ve been looking into projects that are generating large amounts of data or big data in other words, and one project I came across that really peaked my interest was the Square Kilometer Array (SKA) Project. This a long term project (currently phase 5 of 7) is working to answer some of science’s hardest, and mankind’s oldest, questions to better understand the origins of the...
Blog

IT Pros in Healthcare: How to Choose a Secure File Transfer Solution

  Image Every healthcare provider wants to avoid being the next data breach headline—and unfortunately, we have seen many incidents and their consequences in 2018 so far. The causes of these data breaches range from wrongly configured databases to successful malware attacks and unauthorized user access. For those looking to avoid...
Blog

3 Ways Your Peers are Using Secure Forms

  Image If you exchange any amount of sensitive information as paper documents, electronic PDFs, images, or spreadsheets, you know keeping track of data and ensuring it gets where it needs to go can be a challenge. And if you work with multiple parties to receive this information, like employees, vendors, clients, stakeholders, and...
Blog

On-Premises and the Cloud: A Comparison of Two Unique Environments

On-premises. The cloud. Hybrid environments. As technology evolves and business needs grow, organizations are rapidly trying to make sense of their options. What are the benefits of running their software and data on-premises? What concerns should IT and security teams be aware of when implementing their processes in the cloud? Can they do a bit of both and go hybrid? There...
Blog

15 Ways to Avoid Document Chaos with Secure Forms

  Image Vendors, employees, customers, and trading partners exchange an abundance of files every day, often by a variety of means including mail, email, telecomm apps like Skype, shared file storage like Dropbox or Google Drive, and sometimes even SMS. While documents are an inescapable reality for busy organizations, keeping track...
Blog

2018 Cybersecurity Concerns in Healthcare and How to Address Them

Image The first few weeks of January always seem to be accompanied by an influx of new cybersecurity trends, forecasts, and concerns. As expected, 2018 has followed this pattern—and with the need for secure patient information growing ever more critical and the arrival of GDPR in May, it’s no surprise that healthcare experts are deep...
Blog

The GDPR is Coming… What’s it Mean to You?

There is a new wave of regulation coming in the form of the European Union Data Protection Regulation (EU GDPR). These provisions and regulations have been in development over the last four years, and starting May 25th, 2018; it will begin to be enforced. After that date, substantial fines will be imposed on those who don’t comply with new regulations. Before we dive into what...
Blog

10 Essential Tips for Securing FTP and SFTP Servers

  Image Most organizations use FTP or SFTP servers to exchange files and other critical business documents with their trading partners. Unfortunately, these servers have become a primary target for hackers, putting your FTP or SFTP server at risk of a costly data breach. Bob Luebbe, GoAnywhere Chief Architect at Fortra, hosted a...
Blog

Is Your Data REALLY Safe on the IBM i (AS/400)?

  Image “AS/400 is built to be safe and reliable.” “No one makes viruses for the IBM i. There are no known cases of malware, either.” “IBM has amazing IBM i server security, so we don’t have to worry about vulnerabilities.” Do these statements sound familiar? Perhaps you’ve come across these claims in the industry, heard someone...