Archive for category General

Do Your Homework When Choosing a Managed File Transfer Solution

Posted by on Thursday, 13 August, 2015

Linoma Software emerged as an early pioneer in MFT (managed file transfer).  Starting in 2002 with a solution for automating and managing file transfers, capabilities soon expanded to support encryption standards to help organizations protect sensitive and confidential data.

Companies of all sizes quickly recognized how MFT could help them establish centralized control over file access, streamline file transfer processes, and simplify compliance through detailed audit logs and reporting.  This has led to a surge in providers, each with their own flavor of MFT.

This increasingly crowded marketplace has made it difficult for IT security professionals to research and recommend the best MFT solution to meet their organization’s particular needs.  That’s why Linoma Software’s chief architect Bob Luebbe believes so highly in the value of quality research like the recent report on the vendor landscape for MFT by Info-Tech Research Group.

research mft - info-tech-slides-stacked

The Info-Tech report entitled “Select and Implement a Managed File Transfer Solution” gives you the tools to fully explore your organization’s requirements for MFT.

“Managed file transfer software is frequently purchased to meet the requirements of one initiative,” states Luebbe, “but companies quickly discover the advantages of implementing MFT across all areas of file management.”  Proper planning allows you to ‘secure file transfers today and avoid worrying about tomorrow’.

Assembling a thorough assessment of system-to-system and ad-hoc file transfers across every department allows you to match current and future demands to MFT providers identified as leaders in those particular areas.

Choosing an MFT solution is an investment of both money and time.  “If you’re not 100% confident in the software’s ability to communicate with your existing systems and perform to your expectations, that should be reason for concern,” Luebbe cautions.

“Install fully functional trial software on your own system, request a personalized demo where you can see the software in action and have the ability to ask specific questions, and always ask for references from customers using the software in a similar fashion.”

Luebbe concludes, “Linoma Software believes in MFT’s ability to help an organization achieve regulatory compliance, increase security and streamline processes.  It’s important to us that everyone has a positive experience with this transformative technology.”

Read the entire Info-Tech Research Group report on the MFT vendor landscape for yourself at http://go.linomasoftware.com/infotech2015.

GoAnywhere MFT™ Enters the Drummond AS2 Certification Queue

Posted by on Friday, 31 July, 2015

Drummond Group logo - Drummond AS2 Certification
This spring, Linoma Software started the extensive process of reviewing and testing its AS2 automation features against the world’s highest standards, as set by the Drummond Group, LLC. Drummond Certified™ products are compliant and interoperable to make sure they truly interface with the systems of customers and partners.

GoAnywhere MFT™ recently completed the first phase of testing, the results of which confirmed compatibility with RFC 4130.  The testing also verified GoAnywhere’s compliance with optional profiles for:

  • FN (Filename Preservation)
  • MA (Multiple Attachments)
  • FN-MA (Filename Preservation with Multiple Attachments)
  • CTE (Chunked Transfer Encoding)
  • SHA2 hash algorithms supporting SHA256, SHA384 and SHA512

GoAnywhere MFT was added to the Drummond AS2 Certification Queue where it will be tested against all AS2 Drummond Certified products. Linoma Software anticipates certification for GoAnywhere MFT this fall.

10 Ways to Make File Transfers Easier, Automated and Secure

Posted by on Thursday, 28 May, 2015

If you’re still managing file transfer processes using traditional methods that include complicated scripts and legacy programs, the potential risks are great. In addition to being a drain on your time, they could also be putting critical data at risk.

10 Ways to Make File Transfers Easier, Automated and SecureIn a recent webinar, “10 Ways to Make File Transfers Easier, Automated and Secure“, Linoma Software chief architect Bob Luebbe talked about key issues and how they are easily addressed using a modern Managed File Transfer (MFT) solution.

The challenges covered included:

  • old technology still in use
  • time consuming manual processes
  • a lack of error alerts or audit logs to meet compliance rules
  • employees sending files unchecked through email, cloud-sharing and portable storage devices

Luebbe went on to introduce the advantages of MFT, and offered the top three considerations when evaluating an MFT solution:

  1. ease of use
  2. centralized security and control
  3. auditing and alerts

Following Bob’s presentation, software development manager Steve Luebbe gave a tour of Linoma Software’s GoAnywhereMFT Suite and demonstrated how it can help users to simplify, automate and secure file transfers.

The webinar ended with a summary of the 10 ways MFT helps in the areas of secure file transfer, full feature data translation and time-saving automation.

This free on-demand webinar is recommended for anyone managing mission-critical file transfers, organizations with individuals sending sensitive file attachments through email and cloud storage (i.e., Dropbox), and IT professionals faced with increasing regulatory and compliance requirements.

What GoAnywhere Customers Should Know About LogJam

Posted by on Tuesday, 26 May, 2015

Logjam“LogJam Computer Bug Could Wreak Havoc”USA Today

“A Frightening New Vulnerability Could Let Hackers Bypass The One Thing That Keeps Us Safe Online”Business Insider

“FREAK-like LogJam Attack Undermines TLS Security” Infosecurity Magazine

“Enterprise, Cloud Services Exposed as Vulnerable to LogJam”ZDnet

With frightening headlines appearing last week in various news outlets around the world, it’s no wonder people are paying attention to the Diffie-Hellman key exchange attack also known as LogJam. The extremely popular Diffie-Hellman key exchange algorithm allows Internet protocols to negotiate secure connections using shared keys and is integral to protocols such as HTTPS, SMTPS, IPsec and those reliant on TLS.  LogJam exploits a flaw that could allow eavesdropping and data manipulation on affected HTTPS websites.

GoAnywhere Not Vulnerable to LogJam Attack on SSL/TLS.
GoAnywhere Services relies on the JSSE provider for handling SSL/TLS handshake operations. If configured properly, GoAnywhere is not vulnerable to the SSL/TLS Diffie Hellman key exchange attack known as LogJam.

To avoid this attack in GoAnywhere, configure your HTTPS/AS2, FTP, and FTPS Services to only enable cipher suites that utilize the Elliptic Curve DH key exchange algorithms.

For any GoAnywhere customers who have concerns or need assistance in ensuring their system is configured properly, our dedicated Support Team is always available to help. There are several convenient ways to connect with us. You can learn more on our Customer Support page at GoAnywhere.com.

RSA Conference 2015 Recap

Posted by on Friday, 8 May, 2015

RSA Conference 2015 Moscone Center South HallAfter an influx of high-profile data breaches, it was no surprise that the RSA Conference saw a record crowd this year of 33,000 attendees. The Moscone Center in San Francisco is a great venue and packed with attendees, over 500 vendors, 290 sessions and 700 speakers, there was no disputing the fact that if you were interested in anything related to information security, this was the place to be.

Walking amidst the sea of vendors in the North and South Halls it was easy to be simply overwhelmed by the sheer volume of displays, gimmicks and swag tactics. As this was my first RSA Conference, I was very excited to see and experience the myriad of phenomenon that comes standard with any conference of this size. Some of the booth displays are seriously impressive, huge LED screens, Oculus Rift interactive displays, flashy lights and celebrity look-alikes were everywhere. The great thing about it is that every single person or vendor at the conference was working toward the same goal in some form or fashion…securing information. If you were on a mission to find a product or person to help you achieve a higher level of security for your company’s specific needs, chances are you would find it here once you took the time to look. With so much going on, after a while everything starts to look the same, so you really have to pay attention or engage in conversations to figure out what most of the vendors at RSA Conference are representing.

RSA Conference 2015Sharing Files, Sharing Conversations

The GoAnywhere Booth at RSA 2015In the slightly quieter South Hall, our booth saw significant and steady traffic throughout the conference. It was great talking to people and getting firsthand feedback on the challenges they face and the concerns they had about security for their organizations. One thing I found to be a recurring theme in these conversations was the desire for file sharing solutions that were not cloud-based. I thought that was interesting as it seemed there were 10 cloud vendors for every non-cloud vendor with a display at RSA 2015.

With the sheer volume of cloud products represented, it was nice seeing the looks on people’s faces when they learned that GoAnywhere is an on-premise Managed File Transfer (MFT) product. I wish I had a dollar for every time someone said, “Not in the cloud? Oh good, better security.” I think as more people come to realize that they are responsible for the security of their data no matter where it is stored, being able to encrypt, control and monitor that data in your own local environment becomes paramount for many.

RSA Conference 2015I like analogies and when it comes to cloud vs on-premise, I personally tend to think of it in terms of storage. I can store my belongings in my home or I can pay for a space at a public storage facility. If my belongings were in a public storage facility, all it takes is someone with a lock cutter to gain access and chances are with all the traffic going in and out, it wouldn’t be noticed until it’s too late. RSA Conference 2015Personally, I prefer storing things in my basement or attic simply because I am diligent (perhaps overly so) about my home security. Sure, there are risks in any situation, but I prefer having my belongings and risk in an environment I can completely control. If I want to add Fort Knox level security measures to make it difficult for an intruder to get in, there’s nothing stopping me from doing that, it’s my home after all. Given the many conversations had and overheard at this year’s RSA Conference, I’m not alone in my thinking. It’s astonishing how many people seemed more comfortable with the idea of their digital data staying on premise, not in the cloud. When they learn that GoAnywhere can give them the ability to send, collaborate, secure and automate data transfers on premise, it’s like watching kids at a candy store. Those conversations are what makes attending these conferences so worthwhile, there is so much you can learn.

My RSA 2015 #SecSelfieOverall, the conference was a great experience, especially for a first timer. I chatted with several people who had wonderful things to say about the sessions, networking and things that they learned and the various speakers who presented. While it might be information overload to some extent with such a big crowd and so many sessions, speakers and vendors, I thought it was a friendly,energetic and informative atmosphere. I met a ton of great people, got to chat with some customers and really learned a lot about how people can/do use our software and which features truly make their work easier. One thing is for sure, we are definitely looking forward to returning next year to the RSA Conference.