Grocery Outlet Uses GoAnywhere to Automate File Transfers

Tuesday, December 10, 2013 Posted by

When your network of retail locations expands, how do you keep up with all the data that needs to be exchanged between stores, vendors, and other trading partners? At some point, the only solution becomes to automate file transfers. See how Grocery Outlet made the transition with GoAnywhere.

Read the transcript

Grocery Outlet is a family-owned company established to provide inexpensive groceries to its customers.  It’s now the largest deep-discount grocery store chain in America, with more than 200 stores in seven states.  Many of these stores are owned and operated by local families to serve their neighborhood’s needs, and the company keeps growing.

Between sharing data with store owners and communicating with vendors, Grocery Outlet exchanges more than 30,000 files every day.  Steve Tuscher, the Director of IT, realized that having his staff write manual scripts for these file exchanges was time consuming enough, but tracking down and fixing problems when files didn’t arrive at their intended destinations was the last straw.

He began looking for a solution that would automate file transfers and provide better error reporting, and after discovering some high-priced options, he decided to take a look at GoAnywhere.

GoAnywhere helps Grocery Outlet automate file transfers“We quickly replaced all of our internal FTP scripts and within a couple of months, we’d transformed our data delivery across all of our business partners and all our internal systems with GoAnywhere,” Tuscher said. “We were surprised that we were able to do that as quickly and easily as we did.”

To hear more about Grocery Outlet’s success with GoAnywhere, and to find out which feature the team found most valuable in transforming the way they managed their workflows, be sure to watch the video.  You can also read the transcript here.

 

 

How To Build a Data Breach Response Plan:
5 Great Resources

Thursday, November 14, 2013 Posted by

What is a data breach?

The definition seems obvious for any organization.  A data breach occurs when data that was supposed to be protected from unauthorized access is exposed.

What may not be as clear cut is all of the ways that sensitive data can be compromised.  These include malicious attacks, accidental mistakes, and employee incompetence.  Confidential information can fall into the wrong hands during electronic file transfers, accessing lost or stolen devices, or as a result of hackers’ infiltration into a company’s servers.  Even sending an unsecure email could qualify as a data breach, depending on the information it contained.

five resources for developing a data breach response planWhat is your data breach response plan?

As complex as the causes of data breaches can be, the steps for responding are fairly straightforward, though time-consuming, stressful, and expensive.  Dealing with the breach will be monumentally more challenging if you don’t already have a data breach response plan in place.

Generally agreed upon steps include

  • thorough, extensive documentation of events leading up to and immediately following the discovery of the breach
  • clear and immediate communication with everyone in the company about what happened, and how they should respond to any external inquiries
  • immediate notification and activation of the designated response team, especially legal counsel, to determine whether law enforcement and/or other regulatory agencies need to be involved
  • identification of the cause of the breach and implementation of whatever steps are necessary to fix the problem
  • development of messaging and deployment schedule for notifying those whose data was compromised, based on counsel from lawyers who will review state laws, compliance regulations, and other mandates affecting what the messaging must say and how soon notification must occur, as well as what compensation to affected victims should be provided

5 Important Resources

If your company does not yet have a data breach plan in place, or if you’ve been thinking it might be time to update your current policy, here are five great resources that you’ll want to review.

Data Breach Response Guide (Experian Data Breach Resolution Team)

Here is a comprehensive 30-page PDF that includes how to handle each step of the response process, as well as information about specific kinds of breaches such as healthcare breaches.  It even includes an audit tool for you to use to check your current plan to make sure it’s as updated as it needs to be.

Security Breach Response Plan Toolkit (International Association of Privacy Professionals (IAPP))

Use this questionnaire to guide the development of your incident response plan.  Involve your executive and IT team so everyone can better understand all facets of the process.

BBB Data Security Guide (Better Business Bureau)

Specifically designed for small businesses, the BBB provides a series of articles and resources to help companies understand the issues surrounding data security, as well as how to build a response plan.

Model Data Security Breach Preparedness Guide (American Bar Association)

For those with limited access to legal counsel, this PDF provides an overview from the legal perspective of how to prepare for a data breach.  It obviously isn’t a substitute for seeking advice from a lawyer who knows or can learn the details of your specific situation as well as the laws that apply in your state and industry.  However, it does provide some good general information that could help you launch a discussion with your legal team.

Data Breach Charts (Baker Hostetler law firm)

If your company does business in more than one state, this is a great starting point to review how different states’ data breach laws compare.  Again, it doesn’t take the place of your legal team, but it’s a helpful overview.

What other resources do you know about that should be included in this list?  Let us know in the comments!

 

Taking Managed File Transfer On the Road

Tuesday, October 22, 2013 Posted by

The Linoma Software team is back on the industry tradeshow tour, helping more and more IT shops solve their data security headaches with our enterprise software solutions.  We’ve been in Atlanta and Minneapolis already this month, and are now exhibiting at the IBM Systems Conference in Orlando (Booth #118) and the VMUG Conference in Chicago (Table #17).

Next month we’ll be in Kansas City and Virginia to talk about the benefits of managed file transfer (MFT) and data encryption for anyone tasked with meeting compliance regulations like HIPAA, PCI DSS, SOX, GLBA, FISMA and state privacy laws.

If you attend any IT conferences this fall, be sure to look for the Linoma Software booth.  We’ve got delicious chocolate to share, and even more valuable solutions to your biggest file transfer and data encryption problems.

IBM Systems Fall 2013

Why Bother Upgrading Beyond Standard FTP?

Thursday, September 26, 2013 Posted by

Right out of the box, most operating systems come with a built-in File Transfer Protocol (FTP) tool that makes it possible to transfer large files between people, computers and servers.  It accomplishes the key goal, which is to deliver the file from one place to another.  However, too many organizations’ philosophy has been that as long as the files were getting where they needed to go, standard FTP was good enough. That was especially true when they were transferring files internally.

The truth is that FTP alone has never been good enough, because too much information (file data, user names, passwords, etc.) is vulnerable to hackers and it only takes fairly rudimentary hacking skills to steal it.  Now with increased pressure to protect sensitive data coming from regulators and consumers, it’s urgent that companies implement a more secure file transfer method.

Take a look at this short video to hear Bob Luebbe, Linoma Software’s Chief Architect, talk about the dangers of standard FTP.

 

At the end of this video, Bob mentions the value of clustering and load balancing to promote high active-active availability. Since this video was produced, we’ve also added these features to both GoAnywhere Services and GoAnywhere Director.

In fact, Bob just delivered a free webinar on the latest updates to GoAnywhere, and you can view a recorded version here.

Updates for GoAnywhere Include Clustering, Disk Quotas, and More

Wednesday, August 21, 2013 Posted by

In response to customer requests, especially from larger organizations, Linoma Software has released new enhancements such as clustering and disk quotas for GoAnywhere Director and GoAnywhere Services.  These updates to the GoAnywhere Managed File Transfer suite provide even more robust administrative control, and add automatic failover protection in the event of a server failure.

GoAnywhere Director 4.5.0 adds clustering

The new release of GoAnywhere Director 4.5.0 got a big boost when developers added clustering, a feature they added to GoAnywhere Services earlier this year.  Clustering, also know as “active-active” high availability, means that multiple installations of GoAnywhere Director can be in operation simultaneously, communicating with each other at all times.

GoAnywhere Director Clustering for High Availability

There are several advantages to clustering.  It provides assurance for users and trading partners that if something were to go wrong with one of the servers, the additional installations would automatically take over so availability would not be affected.  It also allows for load balancing, which is especially helpful for organizations with high volumes of file transfers.  Finally, it makes it easy for organizations to manage growth because they can easily incorporate additional servers to their managed file transfer environment.

GoAnywhere Services 3.3.0 adds disk quotas, bandwidth throttling

GoAnywhere Services 3.3.0 offers administrators even greater control over how users interact with their secure FTP servers.

One key enhancement is the addition of disk quotas, which allows admins to determine how much storage space to give to each trading partner and user to better manage storage device resources.

Bandwidth throttling, also new to GoAnywhere Services 3.3.0, lets administrators put limits on the amount of network resources a user can consume when transferring files.  With this feature, controls can be enforced on file uploads, downloads and even on which days or times of day are available to specific users.

With more than 50 updates in this round of enhancements, GoAnywhere continues to respond to the needs of its ever-growing consumer base.  GoAnywhere customers will be notified within their product screens that an update is available, and those who are not yet customers can contact us to get a free demo, or can download a fully-functional free trial.

For more information about the features included in the new releases, check out our news page.