Resources

Blog

The Top 15 MFT Blog Posts You Need to Read

There’s always something fresh and exciting to learn on the next page in the book of GoAnywhere MFT. Learn more by exploring 15 of our top blogs.
Blog

How's Your File Transfer Process Running?

Is it time to upgrade your ride? If you’re still trying to drive file transfers in an outdated clunker, GoAnywhere MFT can get you back on the right track with a high-octane tune-up.
Blog

How Does the DMZ Impact Security?

The DMZ can be a good tool to add to your arsenal, but are you aware how it can impact your security negatively?
Blog

What Are the Top File Transfer Protocols?

Before implementing the secure MFT solution of your choice, make sure you understand the basic file transfer protocols out there. Check out the top ones here.
Article

The 2020 MFT Data Quadrant Report is Here

With a new year brings a new Info-Tech Managed File Transfer Data Quadrant Report. Find out about our ranking here.
On-Demand Webinar

Robot Schedule for Beginners

Watch this webinar to learn what every beginner should know about Robot Schedule batch process management and workload automation software for IBM i (AS/400, iSeries).
Blog

How to Evaluate MFT Vendors

Choosing a robust MFT solution requires careful consideration of your business file transfer needs. Evaluate possible solutions with an eye towards performance, features, service and ROI.
Blog

Why You Need a Content Collaboration Platform

Working with your team isn’t always a breeze, but a content collaboration platform – a centralized tool that gives users secure access to files and folders – can simplify your processes.
Blog

Why Should I Automate My IBM i?

Automation means more than efficiency, accuracy, and ROI. It has a real impact on the people who love and work with the platform every day, as well as those who will fill their shoes in days to come.
Blog

Top 3 IT Strategies for Optimizing Productivity

IT professionals today encounter more challenges than just convincing upper management to increase the budget. Read on to learn how your peers overcome everyday obstacles in the workplace and optimize their productivity – even as new fires pop up around them.
Article

IBM i Cloud Security Considerations

As you consider taking your IBM i to the cloud, cybersecurity will no doubt top your list of concerns. And for good reason. It’s important to remember that the cloud is kind of a lie. Your sensitive data is simply being sent to someone else’s server, and that server has a physical location somewhere. Just like on-prem cybersecurity, IBM i cloud security can be divided into two parts: ...
Blog

The Evolution of Cybersecurity Solutions for Organizations

In the early days of the internet, cybersecurity was fairly straightforward, with all solutions and strategies geared toward prevention. While prevention remains critical, cybersecurity has also had to evolve, with businesses layering their defenses and regularly evaluating the status of their safeguards to adapt to change—whether those be organizational or within the wider cybersecurity sphere.
On-Demand Webinar

How to Upgrade to IBM i 7.4

It’s more work to plan an upgrade than to make the upgrade itself. Darren Anderson and IBM Champion Tom Huntington help you discover what you need to upgrade to IBM i 7.4.
Blog

How Encryption Works: Everything You Need to Know

Encrypting files helps defend against cybersecurity threats. Learn more about how it works and what method, combined with GoAnywhere MFT, is recommended depending on your specific needs.