GoAnywhere MFT for IBM i (iSeries) includes native commands for performing PGP encryption and decryption functions directly on the IBM i (formerly known as and often still called AS/400). These commands can be placed in CL programs, the job scheduler or run from IBM i menus. With GoAnywhere MFT, files can additionally be digitally signed with a private key on the IBM i. In turn, you can verify...
GoAnywhere MFT will automate and secure file transfers on the IBM i platform using Secure FTP, Open PGP and other popular protocols and encryption standards. GoAnywhere's IBM MFT can be installed on IBM iSeries - version 7.1 and higher on IBM Power Systems, as well as many other operating systems. Automates and secures file transfers with trading partners, customers and internal servers Provides...
Industry: Banking and Finance About a year ago, Think Mutual Bank, a bank located in the Midwest, was searching for a way to transfer data between disparate banking systems. Although Think Bank’s core system is the IBM i, the business banking segment runs on MS SQL. Getting all the data into one place (the IBM i), then copying updated files back to the MS SQL system was a challenge that had to be...
Maryland’s Department of Labor, Licensing, and Regulation (DLLR) must transfer sensitive data in a secure and reliable fashion. Besides the challenge of ensuring information is protected in transit, each DLLR trading partner requires information to be sent in different file formats, such as fixed width, Excel, CSV, or XML. The DLLR chose GoAnywhere to meet their growing file transfer needs and...
“AS/400 is built to be safe and reliable.” “No one makes viruses for the IBM i. There are no known cases of malware, either.” “IBM has amazing IBM i server security, so we don’t have to worry about vulnerabilities.” Do these statements sound familiar? Perhaps you’ve come across these claims in the industry, heard someone say something similar at an event, or maybe even said it yourself. Whether it...
Discover three key areas where network monitoring and identity governance strategies go hand-in-hand, and work collaboratively to improve and enhance security within organizations today.
While every network faces different challenges, we’ve identified three key areas that are currently seeing the most change for organizations needing to grow their network infrastructure.
As an IT professional, your initiatives are always changing, especially when it comes to keeping a close eye on your network. One top-of-mind priority is how to proactively manage network issues before they affect users and customers. A Tech Update gives you access to expert guidance to ensure you have a complete view of your network infrastructure. Here’s what to expect: We’ll call you to...
Canada’s data privacy laws may soon be changing. Brush up on what’s expected to change and how your organization can comply with stronger security safeguards.
Are you using homegrown processes in your organization to send files on the IBM i? Between the knowledge required to write and maintain file transfer scripts, the time spent on creating user profiles for every file recipient, and the hassle of solving connection problems so data is always delivered successfully, manual IBM i transfers can be exceedingly complicated. But they don’t have to be—as...
Chances are, your team is struggling to keep up with the ever-growing workload, increasing security threats, and shifting priorities that have become hallmarks of today’s IT environment. Instead of proactively building your security posture, you’re forced to be reactive, always fighting the biggest fire first. You need a better way. It’s time to protect your organization with proactive, automated...
What does the growing Internet of Things mean for your network admins? Learn key challenges as well as our top tips for monitoring your network during this ever-changing time.
On May 12, 2021, President Biden issued an executive order designed to improve the nation’s cybersecurity and to better protect federal government networks. Learn more about the executive order in our blog.
The widespread use and distribution of information makes securing data a significant challenge. In this blog post, we take a detailed look at how Data Security Solutions help solve this problem.
Data security is hard. We’re not going to sugarcoat it. In this 60-minute webinar we'll: Discuss the best practices for protecting your data throughout its lifecycle Introduce our full data security suite, which provides protection from creation to publication, and sharing of your sensitive data. Explore some common use cases that our suite helps address And more! If you are curious about our...