In a new report released by Info-Tech Research Group, GoAnywhere, a Fortra solution for Managed File Transfer (MFT), received the highest scores from end users when considering product satisfaction and features along with vendor experience and capabilities.
Are you using legacy programs or unsecured processes to transfer files on the IBM i? Watch this webinar to learn how to streamline, secure, and audit your file transfers.
Fortra today announced that its GoAnywhere managed file transfer application, in concert with Clearswift’s ICAP and adaptive redaction product, was named a Security Solution of the Year finalist for the European IT & Software Excellence Awards 2019.
There are pros and cons to evaluate when it comes to relying on scripts. Scripting can definitely have some perks depending on its application. However, it’s important to weigh these against the benefits of a full managed file transfer (MFT) solution to make sure you’re making the best decision for your business over the long term.
Join cybersecurity experts Bob Erdman, Security Product Manager at Fortra, and Holger Schulze, CEO and Founder of Cybersecurity Insiders, as they discuss the continuing challenge of ransomware.
Your IBM i source and target systems may not be identical. But don’t panic! Robot HA has a Swap Audit feature that regularly checks your setup and confirms you’re ready to role swap at any time.
Today GoAnywhere Managed File Transfer received the 2019 InfoSec Award for Managed File Transfer from Cyber Defense Magazine (CDM), a leading information security publication.
Join Bob Erdman, Security Product Manager at Fortra, as he discusses the importance of focusing on every endpoint, and how endpoint antivirus software can serve a critical function in your AIX security profile.
Fortra today announced the latest release of its industry-leading managed file transfer solution, GoAnywhere MFT. This version has unveiled a new look for GoAnywhere: a modernized web interface that simplifies how users interact with others and share files in an increasingly-secure file transfer environment.
It's true that IBM i can't be infected by a PC virus. It's also true that the IFS can act as a host and spread malicious programs throughout your environment.
The days of being able to ignore cryptocurrency is over. Even if you don’t use it, you’re now at risk of being adversely affected by it through cryptomining malware, also known as cryptojacking. Read on to find out what cryptocurrency is, how cryptojacking is on the rise, and how you can protect your organization.