GoAnywhere.com has a whole new look!

Monday, April 8, 2013 Posted by

While some of our team is enjoying the COMMON Users Group conference in Austin this week, we’re excited to announce that we’ve completely revamped our website at GoAnywhere.com to make it even easier for visitors to find what they need.

It’s now easy to search by solution, by product, or by industry, and quick access to videos and other resources makes researching much quicker.

GoAnywhere.com website design

GoAnywhere.com internal website page

Whether you’re discovering GoAnywhere for the first time, or are a happy customer, we hope you’ll check out our new website, and let us know what you think!

Hold the Phone! Your Cloud-Storage Files May Be Vulnerable

Friday, March 22, 2013 Posted by

The cloud storage services market has seen tremendous growth in just the last two years. Reports indicate a growth from 300 million cloud storage subscriptions in 2011 to over 500 million in 2012. The popularity and convenience of mobile devices have fueled this growth, with cloud services presenting a way for companies and their employees to share files anytime and from anywhere.

dangers of mobile file transfers in the cloudThe ability to access virtually any type of document from your smartphone has been both a great tool, and a potentially serious risk.   Sharing files in the cloud allows your traveling sales representatives to access their latest sales report from their tablet, and lets the exec review accounting figures from their phones. Once the files are viewed, the users can delete them and assume everything is safe.

While cloud storage services may be convenient, they also present many security vulnerabilities. One of those vulnerabilities is that unauthorized users may be able to gain access to your files stored in the cloud through your mobile phones.

A recent article published in InfoWorld details the findings of a new report that focused on the security risks of using cloud storage services like Dropbox, Box and SugarSync. It described how researchers were able to recover a variety of different files from multiple mobile devices including iPhones and Android devices, even after they had been deleted from the cloud.  In addition, data about the cloud service user was also accessible via the phones.

Given how many mobile devices are lost and stolen every day, if you or your employees use a cloud storage solution to transfer sensitive data, it’s possible that someone with the right expertise could access those files using your mobile device.

Two important precautions companies can take to minimize risk are to train employees to follow established security policies, and give them easy access to a secure and convenient way to share and store files.

Secure managed file transfer solutions are an excellent alternative to the cloud storage services, providing the ability to transfer files – both batch and ad-hoc — without risk of unauthorized access. It puts the control for data security back into the hands of the IT team without compromising the workflow for employees.

Managed file transfer solutions offer many features not typically included in cloud based storage solutions like encrypted file transfer protocols, error reporting, audit trails, and support for SFTP, FTPS, and HTTPS – all important to maintain the utmost level of security.

 

 

RSA Conference kicks off in San Francisco

Tuesday, February 26, 2013 Posted by

RSA data security, GoAnywhere

Linoma begins our busy trade show season with an exhibit at the RSA Conference in San Francisco this week.  Our team, including (pictured left to right) Brian Pick, T. J. Rickert and Steve Luebbe, is ready to talk to attendees about how easily they can automate, simplify, and encrypt their data transfers with GoAnywhere.

If you’re in the neighborhood, stop by Booth #242 and register to win a Google Nexus 7 tablet and pick up a free flash drive.  For more information about other trade shows we’ll be attending, check out this post on the Linoma Software blog.

Computing Security Magazine Reviews GoAnywhere

Monday, February 18, 2013 Posted by

As you probably know, GoAnywhere is not the only managed file transfer product on the market.  A handful of vendors offer their versions of a product to help streamline the file transfer process with features that are designed to keep that data secure.

Many of the people we talk to are researching several companies trying to decide which product will best serve their needs, and naturally, all of the vendors believe theirs is the best fit.

We’ve been developing resources over the last few years to help define what sets GoAnywhere apart, and as a result, we’ve built a bigger library of case studies, added a growing collection of customer success videos, and continued to marvel at the growing list of comments that our customers make about our products on LinkedIn.

We’ve also built an MFT Checklist that provides a list of features and considerations organizations should investigate when talking with competing vendors.

The latest evidence we have to support the fact that GoAnywhere is a comprehensive, flexible, well-supported and easy-to-implement solution that can help any industry automate, simplify and encrypt their file transfers is a product review in Computing Security Magazine.

GoAnywhere Product ReviewHighlights of the review include these:

“There are plenty of MFT (managed file transfer) solutions on the market, and Linoma’s GoAnywhere is one of the most versatile and secure we’ve seen so far.”

“The enhanced file transfer interface is very simple to use, and provides drag-and-drop facilities between the client and their assigned directory on the GoAnywhere host.”

“We created a project to securely transfer a large folder, using FTPS from our domain controller to the GoAnywhere host system in minutes.”

To read the entire review, you can download it here.

 

 

Retailers Struggle to Protect Against Data Breach

Tuesday, February 12, 2013 Posted by

data breach, data securityAs thousands of harried spouses and romantically entangled Americans scramble to find the right Valentine’s Day gifts this week, many are pulling out the credit cards and ordering online or over the phone or waiting in line to swipe their debit cards at the florist or candy store.  That’s a lot of personal data zooming through cyberspace, which can make the perfect gift for hackers.

One of the compliance regulations that controls how merchants and others handle credit card data is PCI DSS, established to prevent, detect and react to unauthorized access to personal payment information.  The standards are strict and penalties can be stiff.

The challenge comes when retailers, overwhelmed with busy shopping seasons and lines of customers, have so many things to manage that their vigilance protecting customer data can lose priority.  And yet, it just takes one misstep to open the doors to a data breach.

That’s why it’s critical that retailers and other organizations who handle credit card information regularly assess their data protection policies and processes, and implement effective encryption and data transfer tools that can automate the process of keeping data secure so they can focus on keeping their customers happy.

Check out this story in today’s Omaha World Herald about the challenges businesses of all sizes face when trying to avoid a costly data breach.  And for more information about how Linoma Software can help keep your data safe at rest and in motion, email Solutions@LinomaSoftware.com.