Posts Tagged Managed File Transfer

Computing Security Magazine Reviews GoAnywhere

Posted by on Monday, 18 February, 2013

As you probably know, GoAnywhere is not the only managed file transfer product on the market.  A handful of vendors offer their versions of a product to help streamline the file transfer process with features that are designed to keep that data secure.

Many of the people we talk to are researching several companies trying to decide which product will best serve their needs, and naturally, all of the vendors believe theirs is the best fit.

We’ve been developing resources over the last few years to help define what sets GoAnywhere apart, and as a result, we’ve built a bigger library of case studies, added a growing collection of customer success videos, and continued to marvel at the growing list of comments that our customers make about our products on LinkedIn.

We’ve also built an MFT Checklist that provides a list of features and considerations organizations should investigate when talking with competing vendors.

The latest evidence we have to support the fact that GoAnywhere is a comprehensive, flexible, well-supported and easy-to-implement solution that can help any industry automate, simplify and encrypt their file transfers is a product review in Computing Security Magazine.

GoAnywhere Product ReviewHighlights of the review include these:

“There are plenty of MFT (managed file transfer) solutions on the market, and Linoma’s GoAnywhere is one of the most versatile and secure we’ve seen so far.”

“The enhanced file transfer interface is very simple to use, and provides drag-and-drop facilities between the client and their assigned directory on the GoAnywhere host.”

“We created a project to securely transfer a large folder, using FTPS from our domain controller to the GoAnywhere host system in minutes.”

To read the entire review, you can download it here.

 

 

Susan Baird

Susan is the Marketing Manager at Linoma Software, helping promote our secure file transfer and encryption solutions. Her specialty is content creation and social media marketing.

More Posts - Website - Twitter - Facebook - LinkedIn - Pinterest - Google Plus

Managed File Transfer is Focus of IT Jungle Coverage

Posted by on Tuesday, 13 November, 2012

Following a webinar we did last week called “Automating and Securing File Transfers,” industry reporter Dan Burger with IT Jungle spent time talking with Linoma Software’s Chief Architect Bob Luebbe to get his take on the challenges involved in maintaining secure and efficient file transfer processes.

Bob said that he’s seeing a growing number of companies who are looking for solutions that not only manage secure file transfers with trading partners, but also can facilitate database integration and ad-hoc file transfers.

“For one thing,” Luebbe said, “(organizations) want employees to initiate transfers, but with managed and audit capabilities and within an authorized and manageable FTP environment that avoids security exposure. Companies are trying to lock down email to prevent file sharing and there is an emphasis to block the use of free file-sharing sites.”

Check out IT Jungle’s article entitled “Managed File Transfer More Than Meets the Eye” to read more of Bob’s observations, and if you’d like to learn how GoAnywhere addresses the challenges of ad-hoc file transfer security specifically, you’ll want to register for this week’s webinar, “Ad-Hoc File Transfer: Easy and Secure.”

Susan Baird

Susan is the Marketing Manager at Linoma Software, helping promote our secure file transfer and encryption solutions. Her specialty is content creation and social media marketing.

More Posts - Website - Twitter - Facebook - LinkedIn - Pinterest - Google Plus

Customer Success Story: United Security Life and Health

Posted by on Friday, 31 August, 2012

It’s Friday, heading into a long overdue holiday weekend, so we thought we’d share a video we recently posted that highlights how Lorraine Callahan, a senior programmer analyst with United Security Life and Health, has implemented GoAnywhere to improve workflow and save time.

 

GoAnywhere Success Story: United Security Insurance
YouTube - GoAnywhere Success Story: United Security Insurance

 

If you’d like to see other customer success stories, visit our website where you can find videos, testimonials, and case studies.

 

 

Susan Baird

Susan is the Marketing Manager at Linoma Software, helping promote our secure file transfer and encryption solutions. Her specialty is content creation and social media marketing.

More Posts - Website - Twitter - Facebook - LinkedIn - Pinterest - Google Plus

Is Your Company Letting Data Slipping Through the Cracks?

Posted by on Monday, 16 April, 2012

Many Americans have spent the last few days frantically searching for receipts and other documentation to finish their taxes before Tuesday, April 17.  No doubt some of those people thought they knew exactly where to find what they needed, and were dismayed to discover that their confidence — as well as their data — had been misplaced.data breach, managed file transfer

How about your confidence regarding your organization’s sensitive data? As managers, are you aware of all of the transactions going in and out of the company network? Who is sending and pulling files, and why? What’s the best way to manage all of these data exchanges? Isn’t there a more user-friendly solution than prohibiting all FTP communications except from specified computers or user profiles?

Efficient workflow requires efficient data flow

No doubt data security is critical.  So is the ability to exchange information to accomplish daily business goals.  Almost every department needs to exchange files with trading partners, customers, vendors, remote employees, and more.

Here are just a few examples of data your company may be exchanging every day:

Finance/Accounting/HR

  • Tax documents
  • Annual, quarterly monthly reports to shareholders, investors, banks, financial partners
  • Personnel reporting

Marketing/Sales

  • Art files to/from artists, printers, marketing partners
  • Video and other content for web, publishers, printers
  • PDF brochures, proposals, whitepapers to prospects, partners, customers

Information Technologies

  • Data files to/from system integration partners
  • Database exchanges with business networks
  • System updates
  • EDI file transaction exchanges
  • Update to HA and offsite systems

Customer Service

  • Customer update documents
  • Client reporting documents
  • Receipt of supporting documents

Production/Warehousing

  • Supplier data exchange
  • Customer data exchange
  • Inventory reporting

Research & Development

  • Product specifications to/from manufacturing partners
  • Large CAD/engineering data to/from development partners

How do you control the data flow?

Educate your employees

Each organization has developed rules and codes of conduct to maintain productivity, positive morale, and customer confidence.  Ideally, these policies are documented and part of employee training. It’s imperative that the rules governing data management are also included in the documented policies, and all employees regardless of their roles need to demonstrate their understanding of the data management policies. Clear directives regarding management’s expectations is the first line of defense against data breach.

Implement the appropriate technology solution

The right technology tools can also be a valuable part of the data control approach.  Most data exchanges can be performed through secure email, FTP and network communications. A combined implementation of firewall and managed FTP solutions will help secure and distribute the resource requirements as appropriate for every department’s needs.

Firewalls not only protect the company network from outside intruders, but can also help manage internal traffic.  A managed file transfer (MFT) system allows specific types of transfers based on users’ permissions or specified events so the inbound/outbound flow of data can be better managed and monitored. With an MFT system, audit logs are automatically kept of each data exchange, and files and emails can be encrypted and secured to ease worries that they might be sent to the wrong people.

The bottom line

Given the multitude of data files that need to be moved in and out of your organization, and the need to create efficient workflows that allow employees to do their jobs while maintaining strict vigilance about data security, few facets of your business are more important than controlling your data flow.  Getting information in the right hands and keeping sensitive data shielded from non-authorized access is an ongoing challenge, but education and the right tools are the keys to success.

Daniel Cheney

Daniel has been the IT Director at a healthcare company for the last 12 years and a longtime beneficiary of GoAnywhere Director and the IBM i platform. He is also a technical analyst and writer for various technical and social media projects with Humanized Communications.

More Posts - Website - Twitter - Facebook - LinkedIn - Google Plus - YouTube

How Important is Auditing Your File Transfers?

Posted by on Monday, 30 January, 2012

When you send someone a file via FTP, how do you know — and later prove — that it was successfully sent?

It might be possible to save a screen shot as long as the process was simple and you can see all the commands on a single screen.  But what if your commands start getting complex? And if you start sending quite a few files every day, how do you organize all these screen shots so that you can easily retrieve proof 2 1/2 weeks from now. What about 2 1/2 years from now?  Believe me, I’ve been there and it’s no picnic.

Why should you care what files you sent two-and-a-half years ago anyway?  To begin with,  it’s the law… for most of us anyway.  Most businesses are required by law to maintain an audit trail of any files that hold personally identifiable information in the data.  Still, we shouldn’t do it just because it is the law, we should do it because it’s is a good business practice to protect and track the movement of all business information.

How to Audit

The screen capture option is probably the worst-case scenario in maintaining an audit trail of all your FTP transactions.  It makes sense to look into better tools to manage your FTP processing that make it easier and safer to prove the files have been sent or received from the correct locations.

In most windows-based FTP tools, whether free or purchased, there are options to maintain a log of all your transactions.  Here’s an example of GoAnywhere Director’s job log that shows the status of your file transfers, and allows you to drill down further into each job to find out even more.

managed file transfer, secure file transfer, audit logs

Other FTP software solutions have similar settings.  Logging your transactions provides the audit trail you need to prove that you have done your part in sending or retrieving the files.  Managed file transfer solutions, in addition to providing necessary file transfer security, provide an even better audit trail by logging exactly who sent or received the files.

Bottom line: Your FTP audit logs should be easy to find and understand just in case you are audited 2 1/2  years from now.

Daniel Cheney

Daniel has been the IT Director at a healthcare company for the last 12 years and a longtime beneficiary of GoAnywhere Director and the IBM i platform. He is also a technical analyst and writer for various technical and social media projects with Humanized Communications.

More Posts - Website - Twitter - Facebook - LinkedIn - Google Plus - YouTube