Resources

Blog

Reduce Virus Spread with QIBM_QP0L_SCAN_OPEN and QIBM_QPWFS_FILE_SERV

The data below is taken from the 2021 State of IBM i Security Study, which provides compelling insight into the security posture of 247 IBM i servers and partitions—systems that are often used for business-critical data, payment card data, and personally identifiable information (PII). The full study can be accessed here. ...
Blog

Are MSPs Right for Me?

Figure out if MSPs are right for your organization. What are the risks and rewards of managed service providers?
Blog

What Is NVMe?

NVMe is a communications interface plus high-performance protocol for accessing non-volatile memory. Learn more here.
Blog

Realize ROI with Robot

Robot has a reputation for providing high-quality systems management software and backing it up with great support. These additional benefits can help you justify the cost of automation at your company.
Blog

Five Steps for Successful IBM i Role Swaps

Your high availability solution is only as solid as your role swaps. You can’t be certain that your systems are switch-ready unless you test. Follow these steps to start testing your role swaps regularly.
Blog

How to Implement the Right Enterprise File Sharing Solution

Implementing the right enterprise file sharing solution for your organization can be a stressful task. Check our list of tips to help make the process of finding the right file sharing tool easier.
Blog

19 Ways to Transfer Big Files

Transferring big files doesn’t have to create big hassles when you look for software solutions, like MFT, that can handle large files with ease and security.
Blog

What is File Encryption Software?

File encryption software is a tool that encodes data for better security. Encryption is essential to both cybersecurity and compliance. Learn how file encryption software is used to safeguard data worldwide.
Blog

What is Electronic File Transfer?

Electronic file transfer solutions benefit organizations more than any other file transfer alternative available. Learn more about what it is and the benefits in our blog.
Blog

Why You Should Use Scheduled File Transfer Software

Scheduled file transfers make your life easier. Rather than manually executing task after redundant task, let file transfer software handle the nitty gritty – all while boosting your reliability, security, and scalability.
Blog

The ABC's of MFT

Does your tech terminology get twisted? Ours too. The good news? The GoAnywhere Glossary. It’s the perfect resource to learn about MFT and relevant tech jargon.
Blog

Why You Should Use File Encryption Software

Encryption is the “key” to keeping your data safe. File encryption software that secures sensitive files at rest and in motion is essential when it comes to guarding against cyber threats and complying with regulations.
Blog

Endpoint Antivirus Software: What It Is, and Why You Need It

The threat landscape can be a frightening scene when you look at the malicious attacks and ransomware infiltrating organizations around the globe. The good news: Endpoint antivirus applications are making enormous strides in their ability to protect enterprise-level equipment and data from attack. The bad news: Many companies overlook the need to secure non-Windows infrastructure and focus their...