top of page

Search Results

131 results found with an empty search

  • NEW CYBER LAWS PASSED | GSA

    New Cyber Laws Passed – What Australian Businesses Need to Know and Do Earlier this week, the Australian Parliament passed a suite of legislative reforms designed to enhance Australia’s cyber security. The reforms include a raft of new requirements and obligations on Australian businesses. About the Legislation Based on recommendations by the Parliamentary Joint Committee on Intelligence and Security, the new legislation addresses a number of proposals initially set out in Australia’s 2023 – 2030 Cyber Security Strategy, and spans three separate Acts: the Cyber Security Act 2024 (Cyber Security Act); the Intelligence Services and Other Legislation Amendment (Cyber Security) Act 2024; and the Security of Critical Infrastructure and Other Legislation Amendment (Enhanced Response and Prevention) Act 2024 (SOCI Amendment Act). Mandatory reporting of ransom payments, and the introduction of a new voluntary information sharing regime, will have the most immediate impact on organisations. Mandatory reporting of ransomware payments Ransomware attacks are rife across Australia. The Australian Signals Directorate (ASD) reported that this form of cyber extortion accounted for 11% of all cyber incidents to it in 2023-2024, up from 8% in the previous year. The Government had previously pursued a ban on ransom payments. However, its position has since moderated somewhat. The Cyber Security Act only requires organisations to report ransomware payments to the Department of Home Affairs and the ASD. This new reporting obligation will commence at latest six months after the Act receives royal assent (potentially earlier by proclamation) and applies broadly to: organisations which are a responsible entity for a critical infrastructure asset; and other private sector organisations which conduct business in Australia with an annual turnover exceeding a threshold (to be specified - likely to be A$3M). Ransomware reports are required to be made within 72 hours of making a payment (not the receipt of a demand or the discovery of a ransomware attack). Difficult Decisions The requirement to report payments will need to be taken into account by Boards when considering whether to pay a ransom. The Government’s general view on ransoms continues to be that organisations should not pay them. It reasons that payments don’t guarantee the recovery or confidentiality of stolen data, but do encourage cyber attacks to proliferate. Organisations in receipt of ransom demands are left to ponder several competing considerations… Paying a ransom could potentially contravene sanctions (such as the one imposed on Aleksandr Ermakov, the individual responsible for the 2022 Medibank data breach) or anti-money laundering laws. Company Directors fulfilling the duty of care to act in the best interests of their organisation will need to balance the risks of payment - commercial damage, incentive to re-target, uncertainty of data recovery – against the risks of not paying - loss of systems data, reputational damage, third party claims, lost customers and business disruption. If a ransom payment is made, then the new mandatory reporting obligation will be in addition to other applicable reporting requirements an organisation is subject to. These could include the Privacy Act 1988, the SOCI Act, and continuous disclosure obligations under the ASX Listing Rules and CPS 234. In fact, it’s important that Cyber Incident Response plans developed by organisations specifically address these overlapping requirements, taking into account the various regulators and timeframes of each. Be aware that, for any entities regulated under the SOCI Act, it’s also conceivable that the Government could use its directions power to direct an entity to pay - or not pay - a ransom. An organisation which fails to comply with mandatory ransom reporting will incur a civil penalty of 60 penalty units (currently A$93,900). Voluntary reporting regime A new National Cyber Security Coordinator (NCSC) is being established under the Cyber Security Act to lead a whole-of-government response to significant cyber security incidents. The Act provides a framework for the voluntary disclosure of information by any organisation operating in Australia, or any responsible entity under the SOCI Act, to the NCSC relating to cyber security incidents. However, it imposes various limitations on how the NCSC may further use and disclose information voluntarily provided by entities, depending on the significance of the incident. Non-significant cyber security incidents: Information can be used for limited purposes such as directing the reporting entity to assistance services, coordinating a government response, and informing Ministers. Significant cyber security incidents: Information can be used for broader ‘Permitted Cyber Security Purposes’. These include preventing or mitigating risks to critical infrastructure or national security, and supporting intelligence or enforcement agencies. A cyber security incident is deemed “significant” if: there is a material risk that the incident has seriously prejudiced, is seriously prejudicing or could reasonably be expected to prejudice the social or economic stability of Australia or its people, the defence of Australia or national security; or the incident is, or could reasonably be expected to be, of serious concern to the Australian people. Information voluntarily provided by organisations to the NCSC is subject to limited use protections similar to those which apply to information disclosed as part of a ransomware payment report. The new voluntary reporting regime and corresponding limited use protection has come into immediate effect. Limited use protection The Cyber Security Act outlines how businesses should work with the NCSC and other government agencies to obtain assistance and guidance when responding to cyber incidents. It also provides businesses with certain limited use protections when collaborating with the government’s cyber security agencies - a legislative foundation for the CISA Traffic Light Protocol government agencies have recently offered when assisting organisations. Such protections were requested by business lobby groups. They provided feedback during the public consultation period that disclosing information about a data breach could risk exposing an organisation to further regulatory or enforcement action, adverse publicity and litigation. Further, if disclosing a cyber incident was determined to be against an organisation’s best interests, its directors could potentially be in breach of their duties in approving the disclosure. That could in turn expose directors to enforcement action from ASIC. Counterweighing these concerns, the Government believes that sharing information on current threats and incidents can help other organisations avoid similar incidents. In balancing these competing interests, the Cyber Security Act limits the purposes for which information contained in a ransomware payment report or voluntarily report provided to the NCSC can be used or disclosed. The NCSC (and any Government agency it coordinates with) cannot record, use or disclose the information provided for the purposes of investigating or enforcing or assisting in the investigation or enforcement of any contravention of a Commonwealth, State or Territory law. An important exemption from the limited use protections are that crimes and breaches of the limited use protections created by the Act. In this way, the protections stop short of being a full “safe harbour”. Information provided under these protections isn’t admissible in evidence against the disclosing entity, including criminal, civil penalty and civil proceedings (including a breach of the common law). And, the provision of information to the NSCS does not affect any claim of legal professional privilege over the information contained in that information. These limited use protections will be of value to organisations disclosing information to the Government about cyber incidents. However, directors should bear in mind the notable gaps in the protection they provide. For example: Information provided can’t be used or disclosed for the purposes of investigating or enforcing any contravention by the reporting entity of another law (whether federal, state or territory), other than a law that imposes a penalty or sanction for a criminal offence. This means that if the ransomware report indicates that a payment was made in breach of relevant sanctions laws, then the limited use protection will not prevent the use of the report in a subsequent investigation or enforcement action. While information provided to the NCSC cannot be obtained from the NSCS by regulators or government agencies, the protection offered under this Act does not prevent regulators from obtaining the underlying information through other means, including via regulatory investigatory powers or where provided under other mandatory reporting regimes, such as those in the Privacy Act 1988, the SOCI Act, the Telecommunications Act 1997 and the ASX Listing Rules continuous disclosure obligations. So, cyber incident notifications provided to the ACSC under the SOCI Act are not captured by the limited use protection, even if that information is also voluntarily provided to the NCSC or detailed in a mandatory ransomware report. A similar limited use protection has been introduced via the Intelligence Services and Other Legislation Amendment (Cyber Security) Act 2024 for cyber incident information voluntarily shared with the ASD. Other Inclusions in the Legislation This article has focused on developments within the new Cyber Security legislative reforms which will most impact companies and organisations. However, in the interests of completeness, here is a brief overview of other key developments covered in the legislation: Mandated Security Standards for Internet of Things (IOT) Devices. These standards will be detailed in legislative rules, with suppliers required to provide a statement of compliance for devices supplied to the Australian market. New Cyber Incident Review Board. This independent advisory body will be empowered to conduct no-fault, post-incident reviews of significant cyber security incidents and provide recommendations and information to both the private and public sector. It will have the power to compel entities to provide information about significant cyber security incidents. Critical Infrastructure definition expanded. Data storage systems which hold business critical data have been added to the definition of critical infrastructure assets. This closes a gap in the regulations which became apparent in the aftermath of the Optus and Medibank data breaches. Expanded Incident Response Powers. The Government will now have the power to direct an entity to take, or not take a specific action, in the event of a cyber incident affecting critical infrastructure. Security and incident notification obligations moved from the Telecommunications Act 1997 to the SOCI Act, consolidating the cyber obligations of telecommunication carriers and carriage service providers under a single piece of legislation. What Organisations Should Do Cyber security response plans should now be reassessed and upgraded to ensure they align to the new mandatory ransomware reporting requirements. Playbooks and procedures should take account of how an organisation plans to engage with cyber security authorities, bearing in mind the extent - and limitations - of the defined limited use protections. Focus on preventing cyber incidents - not just responding to them. A Managed File Transfer (MFT) solution such as GoAnywhere MFT can encrypt data at rest and in transit, complying with the highest data security standards. It manages inbound and outbound file transfers across an organisation, using industry-standard file transfer protocols and encryption to protect your data. Advanced Threat Protection and Adaptive Loss Prevention add a further layer of defence. SFT Threat Protection facilitates safe collaboration with external parties, helping to prevent malware from entering an organisation, and reducing the risk of employees losing or mishandling sensitive data. Finally, organisations should seek professional legal counsel in determining and responding to their obligations and responsibilities under the new Cyber Security legislative reforms. The information provided in this article has been general in nature, and the interpretations and advice outlined above should not be interpreted as professional legal advice.

  • LOCAL BUYERS GUIDE | GSA

    MFT Local Buyer's Guide Finding the right Managed File Transfer solution for your organisation may not be easy... with dozens of factors to consider - including industry and government compliance requirements, cloud vs on-prem solutions, critical cybersecurity protections, pricing models and more. In this Asia and Pacific Region MFT Local Buyer’s Guide, you’ll find the key considerations, the questions you need to ask vendors, and a wealth of other advice to help you successfully evaluate MFT solutions. To receive our Local Buyers' Guide, simply submit your email address below: First name Last name Enter your email address Phone You'll receive the Buyers' Guide shortly! RESOURCES Receive Report HOME

  • DATASHEET THREAT BRAIN | GSA

    GoAnywhere MFT is the world’s leading Managed File Transfer solution. This datasheet summarises its key technical features. Review product datasheet below: RESOURCES HOME

  • Resources | GSA

    RESOURCES INDEX "MFT's Role in Business: IT Leaders Weigh In" eBook In this eBook, nine leading IT and security professionals share their real-world experiences of leveraging GoAnywhere's many capabilities in their businesses. Read More New Cyber Laws Passed - What Australian Businesses Need to Know and Do What Australian organisations need to know - and do - to meet their new obligations under the nation’s new Cyber Security legislation. Read More Use APIs to Accelerate Your MFT's ROI How to boost the ROI of your MFT solution - and scale its deployment - by pairing it with APIs. Enhance automation, integration, and customisation. Read More MFT Local Buyer's Guide Ask the right questions, and consider the key issues, to identify the right Managed File Transfer solution for your organisation. Read More Independent Info-Tech MFT Quadrant Report (2024) Once again, respected tech analysts Info-Tech have evaluated the most popular MFT software and vendors, and found that GoAnywhere is the top MFT solution. Here’s their 2024 independent report. Read More 2024 Cybersecurity Insiders Survey Fortra's "2024 State of Cybersecurity Survey" shares the invaluable insights of more than 400 cybersecurity professionals from across the globe, including many in Australia, New Zealand and the Asia-Pacific region. Read More Best Practices for Cloud MFT Most modern organisations rely to an extent on the Cloud as they transfer files between employees, trading partners, and customers. Here are best practices for safeguarding your data on its way to, from and in, the Cloud. Read More Meeting CDR Requirements Australia’s Consumer Data Right (CDR) requires businesses to carefully plan how they handle, store and disclose the consumer data they collect. This primer explains your obligations, the breaches that can occur, and a strategy to avoid them. Read More Secure Your Cloud Data with MFT How a robust Managed File Transfer (MFT) solution helps protect your data transfers – in transit and at rest – without compromising the convenience or cost-effectiveness of moving your business to a cloud-based environment. Read More Why Automating Encryption and Decryption Makes Good Cybersecurity Sense How does encryption and decryption work? This handy primer explains. Read More Think Like a Hacker To win the fight against cybercriminals, it helps to think like a hacker. Read More Annual Upgrade and Health Check Service Take the time, effort and risk out of ensuring your GoAnywhere environment is up to date and running smoothly! Read More GoAnywhere Product Datasheet GoAnywhere MFT is the world’s leading Managed File Transfer solution. This datasheet summarises its key technical features. Read More Advanced Threat Protection Product Datasheet GoAnywhere MFT is the world’s leading Managed File Transfer solution. This datasheet summarises its key technical features. Read More GoAnywhere Gateway Product Datasheet GoAnywhere Gateway provides an additional layer of security when exchanging data with your trading partners, enabling you to keep file sharing services and documents safely in your private/internal network. Read More GA Modules for Licencing Product Datasheet GoAnywhere is a robust and complete managed file transfer solution. Modules are available that can satisfy a wide array of file transfer requirements –– you can choose to license only the modules you currently need, and easily unlock additional modules if necessary. Read More Threat Brain Product Datasheet “Threat Brain” is a unique and innovative addition to GoAnywhere MFT which keeps the world’s leading Managed File Transfer solution a step ahead of cyber thieves and competing MFT solutions. Read More Compliance Product Datasheet Every organisation needs to meet stringent industry, state and federal data and privacy laws and regulations. GoAnywhere is the secure file transfer solution built to satisfy these demanding Compliance requirements. Read More 'An Introduction to GoAnywhere' (video) In this brief video, our Business Manager Bradley Copson overviews GoAnywhere's key features and benefits. Read More 'Secure MFT Threat Protection Bundle' (video) Our Secure MFT Threat Protection Bundle can automatically catch and kill email threats before they enter or leave your organisation. This brief video shows how. Read More Independent Info-Tech MFT Quadrant Report (2022) Respected tech analysts Info-Tech evaluated the most popular MFT software and vendors. Read More

  • MFT'S ROLE IN BUISNESS : EBOOK | GSA

    “MFT's Role in Business: IT Leaders Weigh In” eBook A good way to learn the value of a Managed File Transfer (MFT) solution is to hear about it from those who use one. In Fortra’s eBook “MFT's Role in Business: IT Leaders Weigh In”, nine IT and security professionals share their experiences using Fortra’s GoAnywhere MFT. To receive a complimentary copy of the eBook, simply send us your email address below: First name Last name Enter your email address Phone You'll receive the "MFT's Role in Business: IT Leaders Weigh In" eBook RESOURCES Receive Report HOME

  • THINK LIKE A HACKER | GSA

    THINK LIKE A HACKER To win the fight against cybercriminals, it helps to think like a hacker. In this guide, we explain the terminology and techniques used by cyber thieves, and share seven important strategies for protecting your valuable data. To receive our Guide, please submit your email address below: First name Last name Enter your email address Phone You'll receive the 'Think Like a Hacker' Guide shortly! RESOURCES Receive Report HOME

  • New “Threat Brain” keeps Cyber Security Briefed and Vigilant | GSA

    < News New “Threat Brain” keeps Cyber Security Briefed and Vigilant 10 June 2025 What if your enterprise IT systems were constantly informed of the latest emerging cyber threats, so they could proactively protect your precious data from cyber thieves? That’s what Fortra’s new Threat Brain does for GoAnywhere , the world’s leading Managed File Transfer (MFT) solution. Threat Brain provides a unique threat intelligence advantage over other MFT solutions. It aggregates indicators from a deep portfolio of cybersecurity solutions to continuously identify and block IPs with bad reputation or malicious intent before those threats enter your organisation. Other MFTs can only react to cyber threats. GoAnywhere proactively avoids them. Threat Intelligence With access to data from Fortra’s deep portfolio of cybersecurity products and vast customer network, Threat Brain continually aggregates, in real-time, risk information across all attack vectors so that GoAnywhere MFT. Generic Systems Australia is a long-term distributor of GoAnywhere across the Asia-Pacific region. Threat Brain’s enhancements to GoAnywhere enable our customers to benefit from: · Consistent re-verification : With lesser MFTs, once an IP address has been allowed, there’s no ongoing monitoring. With GoAnywhere however, IP reputations are checked with every new session to ensure they remain safe. GoAnywhere is the only solution in the marketplace that makes this proactive and consistent security feature available to all customers within the solution. · Massive threat intelligence database : Threat Brain continually aggregates threat intelligence from Fortra’s broad cybersecurity portfolio and its vast, worldwide (anonymised) customer database. No other MFT vendor offers such integrated cybersecurity tools capable of tapping into this collected threat data. · Layered protection : Fortra’s deep portfolio of cybersecurity intelligence and protection adds an additional layer of protection to customers’ sensitive data. Combined with Advanced Threat Protection , GoAnywhere sets the bar for protecting sensitive data in motion and at rest. Proactive Security GoAnywhere taps Threat Brain to perform on-demand IP reputation checks for incoming HTTP/S connections, AS2, and AS4 protocols. These checks are executed on the GoAnywhere Web Client and via API and API endpoints. GoAnywhere automatically blocks IPs with low reputation scores. This IP blocking can be fine-tuned through adjustable sensitivity settings, while provisioning allows for exceptions in case of false positives. When an IP address has been blocked due to low reputation, a system administrator can add an exception to permit the IP address to be accessed. Whenever GoAnywhere takes action to protect your systems and data, it’s recorded in an audit log detailing what was blocked and the reason it intervened. Stay in the Know When it comes to cyber security, it’s critical to be proactive vs reactive. While Brute Force or Denial-of-Service attacks may be detected automatically by traditional MFTs, this happens only after the system has been attacked. Local Expertise at the Ready If you’d like help tapping GoAnywhere’s proactive capabilities for your organisation, please feel welcome to contact me . I have decades of experience as a long term distributor of GoAnywhere in Australia and New Zealand, and I’m always happy to have an obligation-free discussion and demonstrate its impressive capabilities. At Generic Systems Australia , we’re your local experts in secure Managed File Transfer. Previous Next

  • Surge in Scanning Suggests Targeted Hack Attack Imminent | GSA

    < News Surge in Scanning Suggests Targeted Hack Attack Imminent 8 July 2025 A recently detected increase in attempts to hack MOVEit Managed File Transfer underlines the importance of promptly patching your enterprise software. Threat intelligence Firm GreyNoise has warned of a “notable surge” in hackers scanning MOVEit MFT systems. Scanning Surge GreyNoise said that the surge in attacks started on May 27. Since then, the volume of scanners has remained between 200 and 300 per day - a 20-30 times increase over usual levels. They suggested attackers may be probing for unpatched systems or possibly preparing a coordinated mass attack. The Australian Signals Directorate – Australia’s premier cyber crime combatants – advises that applying patches to applications is critical to ensuring the security of systems. “Once a vulnerability in an application is made public, it can be expected that malicious code will be developed by malicious actors within 48 hours, sometimes within 24 hours,” they said. Obviously, applying multiple patches in a production environment may not only be time consuming, it may well impact production system uptime and even create greater potential for compounded problems during the process. Alternatives Some organisations have been completely replacing their existing Managed File Transfer (MFT) systems with the MFT independently recommended as the world’s most advanced – Fortra’s GoAnywhere. GoAnywhere offers two key security advantages over lesser Managed File Transfer solutions. Firstly, it includes an advanced Threat Brain . This aggregates security intelligence from across Fortra’s deep portfolio of cybersecurity solutions and external providers to continuously identify and block IPs with malicious intent. Threat Brain enables GoAnywhere to quickly and proactively block threats before they infiltrate your organisation. Secondly, rather than merely patching its software, Fortra frequently releases complete updated versions. Upgrading the software to a new version is as simple as downloading the latest version from the Fortra customer portal, briefly stopping your existing version, and then installing it. Local Expertise Available At Generic Systems Australia we’ve helped dozens of Australian and New Zealand organisations transition to GoAnywhere quickly, simply and inexpensively. If you’d like to discuss how we can help you, please feel welcome to contact me . I’m always happy to have an obligation-free chat and even provide an obligation-free proof of concept. At Generic Systems Australia we’re your local experts in secure Managed File Transfer. Previous Next

  • How GoAnywhere Helps PMFresh Better Serve Customers & Partners | GSA

    < Case Studies How GoAnywhere Helps PMFresh Better Serve Customers & Partners PMFresh uses GoAnywhere MFT to handle its 20,000 weekly file transfers. They initially chose GoAnywhere as a solution to replace problematic custom-written and legacy programs to meet the requirements of their large customer, Domino’s Pizza. The robust solution has since proven itself with its flexibility, functionality, and ease of use both in and out of the organization. “GoAnywhere’s flexibility in being able to interact with the varied systems of our customers, allows us to effectively set up electronic trading partnerships with our customers,” noted Ashish Bhatt, IT Manager for PMFresh. “GoAnywhere is a flexible, secure file transfer tool that makes file transfers and other business processes easier.” “With four manufacturing plants and a small IT staff, GoAnywhere can straddle all the systems easily without specialized skill sets. By using more variable skill sets it’s been easier to manage file sending, receiving, and translating. GoAnywhere allows us to do more with less,” he added. Moving In-House Brought Reliability and Cost Savings Prior to installing GoAnywhere, PMFresh used a mixture of solutions, including a third-party provider, but experienced a lot of issues. “We were under a lot of pressure to bring the Domino’s ordering system and B2B communications inhouse to reduce the manual management needed for these processes. There were a lot of moving parts,” Ashish said. “Every time we wanted to interact with an external trading partner, we had to find a solution they were able to manage. When we started to work with Domino’s, we found our old process gave us lots of errors and our third party charged us considerably to receive those transfers,” noted Ashish. Simon Kuenstner, then a tech consultant to PMFresh, was tasked with finding a solution for PMFresh’s in-house system. “We were very satisfied with the options GoAnywhere MFT provided another customer in terms of reliability, logging, and encryption,” he said. “Since then, GoAnywhere has proved its flexibility and high reliability over many years. It is secure, very fast, and the scalability is great. It doesn’t matter what platform you need to connect to, it can easily communicate with whatever you or your partners have.” What used to take hours or even several days can now be accomplished in minutes or hours. And the Advanced Workflow engine gives PMFresh the ability to do everything from simple transfers to complex automation. Ashish said he also appreciates the logging and ability to integrate messaging and alerts into the file transfer process. “With GoAnywhere, we were able to get the set-up with Domino’s started over a weekend, had the ordering process automated on an FTP site, and that project is still running smoothly today.” A Mission-Critical Solution GoAnywhere is considered mission-critical for PMFresh and is now incorporated in all parts of the business from accounts, purchasing, production, and customer service. PMFresh has been able to reduce many of the manual tasks for processing electronic orders, invoices, business intelligence reporting, and more. “Without GoAnywhere receiving, moving, and translating files, the business would stop,” said Asish. “We are able to both reduce the hours needed for processes and save money. And with multiple systems, many trading partners in the industry, and a complex, distributed factory footprint, GoAnywhere allows us to be more flexible. It is the glue that connects our systems. “We continually look at our processes to see if GoAnywhere can help in any way. Our people – both in and out of the organisation – are very happy with what we have done so far, as it has saved them so much time. It’s a fast, productive environment, is stable, and integrates with all our systems,” he added. On-Premise Transferred Successfully to Azure Cloud In 2020, when increasing their cloud footprint, PMFresh migrated all their on-premises and data centre computer workloads to the Microsoft Azure cloud. Part of that migration included moving their six-year instance of GoAnywhere to Azure. With GoAnywhere implemented in Azure, PMFresh now hosts SFTP and AS2, (server and client) in the Cloud, to securely communicate with their external trading partners. They also run integrations between services hosted in Azure and on-premises, as well as their ERP systems which are also hosted. PMFresh utilizes virtual machines (VM) in Azure for their GoAnywhere instances and utilizes GoAnywhere’s Gateway within an Azure DMZ for optimal security with internet facing trading partners and systems. In addition, utilizing the Azure Cloud’s highly available architecture, backup options, and the ability to replicate the GoAnywhere environment into other regions, gives PMFresh infrastructure reliability that they did not have in their on-premises data centre. It enables PMFresh to serve their customers with reliable orders, invoices, and communications. “I’d highly recommend running GoAnywhere in the cloud if it is a critical component of your business, as it is for PMFresh,” Asish said. GoAnywhere MFT Helps PMFresh Deliver Service Excellence With GoAnywhere in place, PMFresh can process new orders in a timelier fashion and communicate more reliably with their partners. Said Asish: “The simplicity of the software enables us to onboard new customers and suppliers easily, saving us both a lot of time. The streamlined processes help partners as well. Some of our larger customers have large processing sites, and GoAnywhere enables us to align with their existing processes. “The solution’s flexibility gives us an advantage. We can say, ‘we can work with that’ and that flexibility has helped us a lot.” While already utilising many functions of GoAnywhere, SFTP, HTTPS, AS2, and GoAnywhere Gateway, Ashish anticipates adding process automation using Secure Forms. “We have plans to migrate some additional dated processes on old systems to GoAnywhere as well. We want to continue exploring its capabilities as it saves us time and money, and most importantly for our customers, it is highly reliable.” He added that, by using the Advanced Workflow engine, “Our only limitation is our imagination.” --- If you would like to explore how GoAnywhere MFT can help you better serve your customers and suppliers, please feel free to contact our Business Manager, Bradley Copson. He’s always happy to have an obligation-free discussion, explain how quickly and easily we can transition your organisation to the class-leading MFT solution, and offer you a zero-cost Proof of Concept. Previous Next

  • MFT as Middleware…?! | GSA

    < News MFT as Middleware…?! 5 Feb 2025 Enterprise customers are increasingly seeking middleware that enables them to secure and streamline connections between their internal systems and external third-party services. Fortra’s GoAnywhere MFT helps fulfil that need. Integration without Security spells danger Most modern enterprises find themselves balancing the flow of information between complex internal systems and external cloud services. But on both sides of the corporate firewall, there is a shared need for corporate data to be transferred securely and efficiently. “Extract Transfer Load” (ETL) solutions process data and store data in a common internal warehouse. “Enterprise Service Buses” (ESBs) act as a hub providing overall visibility and control over the flow of data and services across different applications. However, neither of these tools specialise in security - an especially critical consideration when dealing with third parties. As security and integration are where current solutions fall flat or fail to provide a unified answer, enterprises are left to look for new models to bridge the gap. GoAnywhere steps up Fortra’s GoAnywhere MFT is not your traditional limited MFT solution. It operates as a lightweight ETL, a functional ESB, and as an efficient MFT platform. What sets GoAnywhere apart from other tools is its focus on security. And in that way, it’s one of the only tools on the market today that can fulfil enterprises’ nascent need for secure and efficient data flows within and outside their organisations. Secure Management, Integration, Automation GoAnywhere provides many of the same automation and integration features as ETL, ESB, and Enterprise Application Integration solutions, enabling enterprises to connect their internal resources with cloud resources and third parties such as: Banks and credit card providers Financial data providers Foreign exchange markets Retirement and pension systems If required, GoAnywhere MFT can perform a middleware role, integrating with an organisation’s existing ETL solution and acting as a managing solution which connects systems, secures communications and integrates. Enterprise-level Security Even when enterprises have dedicated ETL solutions in place, GoAnywhere can fit right in to boost the security of data file transfers. It provides a full range of security layers and controls to protect the exchanged data which no other integration solution can offer. A secure architecture is deployed thanks to a multi-tier solution, including the GoAnywhere Gateway as a reverse proxy on the DMZ, isolating exchanged data from threats on the internet. A Secure ICAP Gateway - a deep content inspection engine – can also be built in, a security tier preventing malicious content infiltrating through third-party interfaces. GoAnywhere’s proactive security has been further enhanced through integration with the Fortra Threat Brain , a massive threat intelligence database which continuously identifies and blocks incoming IPs with bad reputations or malicious intent befor e those threats can enter an organisation. Connect Cloud and On-Prem Applications A final differentiator that makes GoAnywhere a standout in the enterprise middleware space is its ability to connect both on-premises systems and cloud-based applications. GoAnywhere goes beyond what a typical SaaS middleware application can do. For instance, if you offer a middleware platform as a SaaS solution, a lot of organisations still have different on-prem applications in addition to their legacy systems, segmented networks, private and public cloud-based systems and external interfaces with their trading partners. Having yet another SaaS platform makes it challenging to interconnect all these on-prem and cloud data points. However, GoAnywhere can secure file transfers and centralise them across cloud, on-premises, hybrid, or SaaS environments. It isn’t confined to one or the other. Consolidate, downshift, simplify, and streamline For enterprises looking to boost their efficiency and streamline their operations (and that’s all enterprises!) the right middleware can make all the difference. GoAnywhere MT offers more than a typical MFT. With GoAnywhere, enterprises can create a flexible, scalable, high-performance middleware platform to securely: transfer at speeds up to 10 Gbps interface with a wide variety of systems, applications and cloud services protect files from malware get zero trust protection, no matter where files travel, and keep data out of the DMZ. GoAnywhere as Middleware Consistently declared to be the world’s leading MFT , GoAnywhere is renowned for its robust security features, flexibility, and ability to work where and how you need it. For enterprises, that’s becoming the space between all the moving parts. Local Expert Help At Generic Systems Australia , we have many years of experience helping Australian and New Zealand IT teams streamline their file transfers and protect their valuable data with GoAnywhere MFT. From the initial scoping of organisations’ legacy data transfer approaches, through zero-cost Proof of Concepts and hassle-free Migration Services , we help companies stay focused on running their business without disruption as we transition them to more secure approaches. Please feel welcome to contact me for an obligation-free discussion about how GoAnywhere can help your organisation. At Generic Systems Australia, we’re your local experts in Managed File Transfer. Previous Next

bottom of page