Posts Tagged Managed File Transfer

Taking Managed File Transfer On the Road

Posted by on Tuesday, 22 October, 2013

The Linoma Software team is back on the industry tradeshow tour, helping more and more IT shops solve their data security headaches with our enterprise software solutions.  We’ve been in Atlanta and Minneapolis already this month, and are now exhibiting at the IBM Systems Conference in Orlando (Booth #118) and the VMUG Conference in Chicago (Table #17).

Next month we’ll be in Kansas City and Virginia to talk about the benefits of managed file transfer (MFT) and data encryption for anyone tasked with meeting compliance regulations like HIPAA, PCI DSS, SOX, GLBA, FISMA and state privacy laws.

If you attend any IT conferences this fall, be sure to look for the Linoma Software booth.  We’ve got delicious chocolate to share, and even more valuable solutions to your biggest file transfer and data encryption problems.

IBM Systems Fall 2013

Susan Baird

Susan is the Marketing Manager at Linoma Software, helping promote our secure file transfer and encryption solutions. Her specialty is content creation and social media marketing.

More Posts - Website - Twitter - Facebook - LinkedIn - Pinterest - Google Plus

Computing Security Magazine Reviews GoAnywhere

Posted by on Monday, 18 February, 2013

As you probably know, GoAnywhere is not the only managed file transfer product on the market.  A handful of vendors offer their versions of a product to help streamline the file transfer process with features that are designed to keep that data secure.

Many of the people we talk to are researching several companies trying to decide which product will best serve their needs, and naturally, all of the vendors believe theirs is the best fit.

We’ve been developing resources over the last few years to help define what sets GoAnywhere apart, and as a result, we’ve built a bigger library of case studies, added a growing collection of customer success videos, and continued to marvel at the growing list of comments that our customers make about our products on LinkedIn.

We’ve also built an MFT Checklist that provides a list of features and considerations organizations should investigate when talking with competing vendors.

The latest evidence we have to support the fact that GoAnywhere is a comprehensive, flexible, well-supported and easy-to-implement solution that can help any industry automate, simplify and encrypt their file transfers is a product review in Computing Security Magazine.

GoAnywhere Product ReviewHighlights of the review include these:

“There are plenty of MFT (managed file transfer) solutions on the market, and Linoma’s GoAnywhere is one of the most versatile and secure we’ve seen so far.”

“The enhanced file transfer interface is very simple to use, and provides drag-and-drop facilities between the client and their assigned directory on the GoAnywhere host.”

“We created a project to securely transfer a large folder, using FTPS from our domain controller to the GoAnywhere host system in minutes.”

To read the entire review, you can download it here.

 

 

Susan Baird

Susan is the Marketing Manager at Linoma Software, helping promote our secure file transfer and encryption solutions. Her specialty is content creation and social media marketing.

More Posts - Website - Twitter - Facebook - LinkedIn - Pinterest - Google Plus

Managed File Transfer is Focus of IT Jungle Coverage

Posted by on Tuesday, 13 November, 2012

Following a webinar we did last week called “Automating and Securing File Transfers,” industry reporter Dan Burger with IT Jungle spent time talking with Linoma Software’s Chief Architect Bob Luebbe to get his take on the challenges involved in maintaining secure and efficient file transfer processes.

Bob said that he’s seeing a growing number of companies who are looking for solutions that not only manage secure file transfers with trading partners, but also can facilitate database integration and ad-hoc file transfers.

“For one thing,” Luebbe said, “(organizations) want employees to initiate transfers, but with managed and audit capabilities and within an authorized and manageable FTP environment that avoids security exposure. Companies are trying to lock down email to prevent file sharing and there is an emphasis to block the use of free file-sharing sites.”

Check out IT Jungle’s article entitled “Managed File Transfer More Than Meets the Eye” to read more of Bob’s observations, and if you’d like to learn how GoAnywhere addresses the challenges of ad-hoc file transfer security specifically, you’ll want to register for this week’s webinar, “Ad-Hoc File Transfer: Easy and Secure.”

Susan Baird

Susan is the Marketing Manager at Linoma Software, helping promote our secure file transfer and encryption solutions. Her specialty is content creation and social media marketing.

More Posts - Website - Twitter - Facebook - LinkedIn - Pinterest - Google Plus

Customer Success Story: United Security Life and Health

Posted by on Friday, 31 August, 2012

It’s Friday, heading into a long overdue holiday weekend, so we thought we’d share a video we recently posted that highlights how Lorraine Callahan, a senior programmer analyst with United Security Life and Health, has implemented GoAnywhere to improve workflow and save time.

 

GoAnywhere Success Story: United Security Insurance
YouTube - GoAnywhere Success Story: United Security Insurance

 

If you’d like to see other customer success stories, visit our website where you can find videos, testimonials, and case studies.

 

 

Susan Baird

Susan is the Marketing Manager at Linoma Software, helping promote our secure file transfer and encryption solutions. Her specialty is content creation and social media marketing.

More Posts - Website - Twitter - Facebook - LinkedIn - Pinterest - Google Plus

Is Your Company Letting Data Slipping Through the Cracks?

Posted by on Monday, 16 April, 2012

Many Americans have spent the last few days frantically searching for receipts and other documentation to finish their taxes before Tuesday, April 17.  No doubt some of those people thought they knew exactly where to find what they needed, and were dismayed to discover that their confidence — as well as their data — had been misplaced.data breach, managed file transfer

How about your confidence regarding your organization’s sensitive data? As managers, are you aware of all of the transactions going in and out of the company network? Who is sending and pulling files, and why? What’s the best way to manage all of these data exchanges? Isn’t there a more user-friendly solution than prohibiting all FTP communications except from specified computers or user profiles?

Efficient workflow requires efficient data flow

No doubt data security is critical.  So is the ability to exchange information to accomplish daily business goals.  Almost every department needs to exchange files with trading partners, customers, vendors, remote employees, and more.

Here are just a few examples of data your company may be exchanging every day:

Finance/Accounting/HR

  • Tax documents
  • Annual, quarterly monthly reports to shareholders, investors, banks, financial partners
  • Personnel reporting

Marketing/Sales

  • Art files to/from artists, printers, marketing partners
  • Video and other content for web, publishers, printers
  • PDF brochures, proposals, whitepapers to prospects, partners, customers

Information Technologies

  • Data files to/from system integration partners
  • Database exchanges with business networks
  • System updates
  • EDI file transaction exchanges
  • Update to HA and offsite systems

Customer Service

  • Customer update documents
  • Client reporting documents
  • Receipt of supporting documents

Production/Warehousing

  • Supplier data exchange
  • Customer data exchange
  • Inventory reporting

Research & Development

  • Product specifications to/from manufacturing partners
  • Large CAD/engineering data to/from development partners

How do you control the data flow?

Educate your employees

Each organization has developed rules and codes of conduct to maintain productivity, positive morale, and customer confidence.  Ideally, these policies are documented and part of employee training. It’s imperative that the rules governing data management are also included in the documented policies, and all employees regardless of their roles need to demonstrate their understanding of the data management policies. Clear directives regarding management’s expectations is the first line of defense against data breach.

Implement the appropriate technology solution

The right technology tools can also be a valuable part of the data control approach.  Most data exchanges can be performed through secure email, FTP and network communications. A combined implementation of firewall and managed FTP solutions will help secure and distribute the resource requirements as appropriate for every department’s needs.

Firewalls not only protect the company network from outside intruders, but can also help manage internal traffic.  A managed file transfer (MFT) system allows specific types of transfers based on users’ permissions or specified events so the inbound/outbound flow of data can be better managed and monitored. With an MFT system, audit logs are automatically kept of each data exchange, and files and emails can be encrypted and secured to ease worries that they might be sent to the wrong people.

The bottom line

Given the multitude of data files that need to be moved in and out of your organization, and the need to create efficient workflows that allow employees to do their jobs while maintaining strict vigilance about data security, few facets of your business are more important than controlling your data flow.  Getting information in the right hands and keeping sensitive data shielded from non-authorized access is an ongoing challenge, but education and the right tools are the keys to success.

Daniel Cheney

Daniel has been the IT Director at a healthcare company for the last 12 years and a longtime beneficiary of GoAnywhere Director and the IBM i platform. He is also a technical analyst and writer for various technical and social media projects with Humanized Communications.

More Posts - Website - Twitter - Facebook - LinkedIn - Google Plus - YouTube