Resources

Datasheet

SFT Threat Protection

Fortra offers seamless threat protection within our secure file transfer solutions to ensure every file transfer crossing your MFT platform has been inspected and cleared to continue.
Blog

A Beginners Guide to Protecting Your Data

In this blog, Steph Charbonneau, Senior Director of Industry Strategy at Fortra, talks you through some of the most valuable aspects of data protection and how to measure success of your organizational programs.
On-Demand Webinar

10 Ways to Make IBM i File Transfers Easier

Thank you for interest in this on-demand webinar. If you have questions following the webinar, please contact us. You can also download the presentation slides here. ...
Blog

Open PGP for IBM i (iSeries)

GoAnywhere MFT for IBM i (iSeries) includes native commands for performing PGP encryption and decryption functions directly on the IBM i (formerly known as and often still called AS/400). These commands can be placed in CL programs, the job scheduler or run from IBM i menus. With GoAnywhere MFT, files can additionally be digitally signed with a private key on the IBM i. In turn, you can verify...
Blog

10 Ways GoAnywhere MFT can Improve Your Efficiency on the IBM i

  Are you using homegrown processes in your organization to send files on the IBM i? Between the knowledge required to write and maintain file transfer scripts, the time spent on creating user profiles for every file recipient, and the hassle of solving connection problems so data is always delivered successfully, manual IBM i transfers can be...
Datasheet

Fortra Cybersecurity

Chances are, your team is struggling to keep up with the ever-growing workload, increasing security threats, and shifting priorities that have become hallmarks of today’s IT environment. Instead of proactively building your security posture, you’re forced to be reactive, always fighting the biggest fire first. You need a better way. It’s time to protect your organization with proactive, automated...
Blog

Data Classification Best Practices

Data classification tools not only help organizations to protect their data, they also help users understand how to treat different types of data with different levels of sensitivity. Automation plays a central role in data governance and helps to maintain the required balance between technology and people-focused training to achieve an inclusive security culture.