top of page

Search Results

172 results found with an empty search

  • GoAnywhere V7.7 released – with Fortra Threat Brain protection | GSA

    < News GoAnywhere V7.7 released – with Fortra Threat Brain protection 13 Dec 2024 Great news for our GoAnywhere MFT customers, with your software now able to leverage insights from Fortra Threat Brain to further protect your managed file transfers. Fortra Threat Brain is a comprehensive cyber security information hub, fed by telemetry from the Fortra’s expansive portfolio of products as well as insights from across the dark web, social media, and law enforcement. It brings together a team of threat intelligence analysts and partners, an expansive portfolio of AI-enabled cybersecurity products, and a vast array of intelligence sources, to provide even stronger protection for your valuable data. The up-to-date threat intelligence from Fortra Threat Brain enables GoAnywhere to reject HTTP/S service connections flagged as malicious. That includes connections to GoAnywhere’s Web Client, AS2, AS4, and any other endpoints that run on the HTTPS service. Extended file transfer protection is just one of many enhancements available in GoAnywhere Version 7.7, now released to customers for download. (And if you’d like our help with upgrading, be sure to check out our GSA Annual Upgrade & Health Check Service .) Previous Next

  • DATASHEET GA GATEWAY | GSA

    GoAnywhere Gateway provides an additional layer of security when exchanging data with your trading partners, enabling you to keep file sharing services and documents safely in your private/internal network. This datasheet summarises its key technical features. View Report RESOURCES HOME

  • New Security Standards for NZ Government Agencies | GSA

    < News New Security Standards for NZ Government Agencies 24 June 2025 New Zealand's National Cyber Security Centre (NCSC) has drafted Cyber Security Standards which government agencies will be required to adopt and implement later this year. The new standards outline the minimum cybersecurity practices that agencies must adopt for their business-critical and external-facing systems. In general terms, they require that cyber security policies, capabilities, controls, and practices must be well-formed and repeatable. The Standards 10 draft Standards are currently being discussed with agencies and industry partners as part of pre-implementation consultation and feedback gathering. They are: 1. Security Awareness 2. Risk Management 3. Assets and their Importance 4. Secure Software Configuration 5. Patching 6. Multi-factor Authentication 7. Detect Unusual Behaviour 8. Least Privilege 9. Data Recovery 10. Response Planning Maturity Model The draft Standards feature a built-in Capability Maturity Model (CMM) to help agencies standardise how they measure, track and improve their cyber risk management over time. CMM1 “Informal”: Security capability may be ad-hoc, unmanaged or unpredictable. Success may rely on individuals rather than institutional capability. CMM2 “Planned and Tracked”: Security capability is well formed in designated business units. The security policies, capabilities, control and practices are in place and repeatable. They are designed to meet the organisation’s core security requirements. CMM3 “Standardised”: Security capability is standardised, integrated, understood and followed consistently across the enterprise. Security is well-governed and managed at an enterprise level. CMM4 “Quantitatively Controlled”: Security capability and performance is measured, monitored and objectively and quantitively controlled. Security measures are hardened in response to performance alerts. Security is a strategic focus for the organisation. CMM5 “Optimising”: Security capability adapts to a dynamic, high risk operating environment. Practices are generally recognised as world-leading and have near real-time measurement and response mechanisms. Agencies will be required to meet at least Capability Maturity Model level two (CMM2) for their business-critical and external-facing systems. Consultation Phase underway The NCSC began consulting with affected agencies and industry partners on 16 June. Discussions will continue until 4 July 2025, with final Standards planned for publication in October 2025. Agencies will be required to report on their implementation of the standards as part of Protective Security Requirements reporting process (a framework for managing security within NZ government organisations) in April 2026. The initial draft of the NCSC’s Minimum Cyber Security Standards are available for download from the NCSC website . MFT as a Baseline Protection Tactic NZ organisations seeking to step up to the new minimum standards should carefully consider installing a Managed File Transfer (MFT) solution as an initial step. This relatively simple enhancement to IT systems puts organisations miles ahead of businesses still using risky and outdated FTP (File Transfer Protocol) or email to transfer files. MFT centralises data transfer and - more importantly - applies policies to data to protect it from threats such as inbound malware and employees sending files via ad hoc platforms outside the defensive perimeter (e.g. Google Drive and Dropbox). MFT has the built-in advantage of “forcing” the application of policies designed to better protect data such as encryption, monitoring, and auditing. Expertise Close at Hand No-one better understands local MFT needs and best practices than Generic Systems Australia. Our team has decades of experience helping organisations implement the world’s leading MFT solution. Our Migration Service makes the transition even easier for busy agencies who would rather focus on their core mission than their IT systems. If you’d like a no-cost, no-obligation discussion about how we could help you simply and affordably adopt an advanced MFT solution, please feel welcome to get in touch. At Generic Systems Australia, we’re your local experts in Secure Managed File Transfer. Previous Next

  • Build Better Solutions by Incorporating MFT | GSA

    < News Build Better Solutions by Incorporating MFT 22 July 2025 Solutions Architects play the critical role of translating complex business requirements into scalable, maintainable technology solutions. Their holistic view of their organisation’s information systems ensures that individual components — from databases and integration layers to user interfaces — work together seamlessly. However, amid the complex considerations for developing sophisticated new software solutions, it can be easy to overlook simple opportunities to also improve an organisation’s fundamental IT processes. For example: file exchange. Any solution which still relies on insecure scripts, ad-hoc FTP servers or email attachments is inherently less efficient and more risky than a solution which leverages Managed File Transfer (MFT) technology. Outdated file transfer approaches expose an organisation to data breaches, compliance violations, and painful troubleshooting cycles. A minimal incremental investment in MFT could transform those weak links into a strategic asset, delivering automated, auditable, and secure data flows that align perfectly with modern architecture patterns. Hidden Risks of Traditional File Transfer Legacy file-sharing methods carry hidden dangers: Unencrypted channels leave sensitive data exposed. Manual processes introduce human error and delays. Absence of centralised visibility hinders troubleshooting and governance. Ignoring these pitfalls increases operational overhead and jeopardises client trust. As a Solutions Architect, you hold the blueprint for resilient systems. And when it comes to security and reliability, file transfer can’t be an afterthought. Why MFT Deserves a Place in Your Architecture Integrating MFT early in your design delivers: Enhanced Security: End-to-end encryption, role-based access, and non-repudiation. Regulatory Compliance: Built-in audit trails, detailed reporting, and retention policies. Automated Workflows: Trigger-based transfers, retries, and notifications eliminate manual handoffs. Centralised Visibility: Dashboards and logs surface issues before they escalate. Seamless Scaling: Cloud or on-prem deployment adapts to seasonal or unpredictable load. By codifying file transfers as robust services, you unlock consistent performance and reduce risk across every project. Tips for Practical Integration Enhancing your solution with MFT is relatively straightforward. Define Requirements: Catalogue data types, transfer volumes, and compliance mandates. Evaluate Vendors: Compare security features, deployment models, and API support. Run a Pilot: Validate connectivity, throughput, and automation capabilities with sample workflows. Embed in CI/CD: Treat transfer jobs like code—version, test, and deploy with your pipeline. Train Stakeholders: Empower developers and operators with clear documentation and dashboards. Essential With hacking and data theft rampant across the globe, MFT is no longer a “nice-to-have” — it’s essential infrastructure. Weaving MFT into your solution blueprints elevates security, streamlines operations, and future-proofs data exchange. By baking MFT into your next project, your organisation’s architecture — and stakeholders — will thank you. Expert Local Help There’s no need to go it alone – or rely on overseas resources - when building MFT into your local solution. At Generic Systems Australia , we have many years of practical experience helping Australian and New Zealand IT teams simply and easily integrate MFT with their many and varied solutions. Please feel welcome to contact me to learn more. I’m always happy to have an obligation-free discussion. At Generic Systems Australia, we’re your local experts in Managed File Transfer. Previous Next

  • Cyber Security to be Top Investment for 2025: CIOs | GSA

    < News Cyber Security to be Top Investment for 2025: CIOs 17 Sept 2024 Australian and New Zealand CIOs are planning to invest significantly in improved cyber security in 2025, according to a recent survey by analysts Gartner. Some 88% of the region’s CIOs and technology executives said they would invest in heightened cyber security measures. 82% said it would be their top investment priority. More Attacks, More Regulation Gartner attributes this focus to greater government regulation, coupled with some of the largest cyberattacks seen in ANZ so far. Speaking at the 2025 Gartner IT Symposium/Xpo on the Gold Coast, Gartner VP Brian Ferreira said “Organisations face greater scrutiny as they batten down the hatches to avoid becoming the next target or breaching stewardship. This continues to drive significant focus and investment towards cybersecurity and legal compliance into next year.” The uncertain economic climate businesses have operated in recently has increased executive and board scrutiny on technology investments, he said. Gartner’s survey found that increased focus on cyber security will attract investment away from previous ANZ CIO priorities of legacy infrastructure (43% of respondents), augmented reality, virtual reality and immersive technologies (17%) and next-generation compute technology (11%). Heightened Focus Consistent with their focus on cyber security, Gartner’s survey found that ANZ CIOs have a significantly heightened focus on ensuring compliance and minimising risks (92% - up from 57% last year). “As Australian regulatory landscapes continue to evolve, ANZ CIOs are also facing more stringent laws to increase stewardship obligations,” Ferreira said. “It’s incumbent upon CIOs to steer their organisations towards a future marked by digital stewardship, responsible innovation, stringent compliance and active participation in shaping regulatory norms.” Help for ANZ CIOs Generic Systems Australia has many years of experience helping ANZ CIOs and IT teams protect their valuable data with class-leading Managed File Transfer solutions. From the initial scoping of companies’ legacy data transfer approaches, through zero-cost Proof of Concepts and hassle-free Migration Services , we help ANZ companies stay focused on running their business without disruption as we transition them to more secure approaches. If you’d like a to discuss how your organisation’s cyber security can be boosted by a cost effective Managed File Transfer solution, please feel welcome to contact me . I’m always happy to have an obligation-free discussion. At Generic Systems Australia , we’re your local experts in Secure Managed File Transfer. Previous Next

  • $21T at stake as Medibank pursued over cyber breaches | GSA

    < News $21T at stake as Medibank pursued over cyber breaches 6 June 2024 Australia’s privacy watchdog has announced it will take legal action against Medibank Private for allegedly failing to protect the medical details of 9.7 million Australians. Russian cybercriminals hacked and then sold the deeply personal medical details of some Australians in 2022. The Office of the Australian Information Commissioner alleges Medibank “failed to take reasonable steps to protect personal information it held given its size, resources, the nature and volume of the sensitive and personal information it handled, and the risk of serious harm for an individual in the case of a breach.” Contraventions of section 13G of the Privacy Act for each of Medibank’s 9.7 million customers could attract a maximum civil penalty of up to $2,220,000 each – that’s $21 trillion in total. Medibank has said it will defend the proceedings. The potential size of the claim shows the watchdog’s intention to warn other companies about their responsibility to protect citizens’ data they collect. “Organisations that collect, use and store personal information have a considerable responsibility to ensure that data is held safely and securely. That is particularly the case when it comes to sensitive data,” Privacy Commissioner Carly Kind said. “This case should serve as a wake-up call to Australian organisations to invest in their digital defences to meet the challenges of an evolving cyber landscape. Organisations have an ethical as well as legal duty to protect the personal information they are entrusted with and a responsibility to keep it safe.” If you’d rather prevent cybertheft than defend it in court, consider how a Managed File Transfer solution can help protect your data in transit, at rest, and in the cloud. Our free resources are a good starting point, and our Business Manager Bradley Copson is always happy to have an obligation-free discussion and provide a free Proof of Concept. Previous Next

  • Contact Us | GSA

    We're Happy to Help Generic Systems Australia are your local experts in Secure Managed File Transfer, servicing Australia and the Asia-Pacific region. We're always happy to answer your questions, or offer you an obligation-free discussion and zero-cost Proof of Concept. Address Generic Systems Australia Level 25, 100 Mount Street North Sydney NSW 2060 Australia Phone +61-2-9959-2239 Email mktg@gensys.com.au Social Media First Name Last Name Email Phone Number (optional) Message Enquiry Type Learn More Send Thank for your message! You will receive an email shortly! We respect your privacy! We won't share your details with third parties or AI. Your enquiry will be handled personally by a member of our technical team. And we won't spam you.

  • MFT: Not Just Your First Line of Cyber Defence | GSA

    < News MFT: Not Just Your First Line of Cyber Defence 16 Sept 2025 Every organisation serious about protecting its data will likely come to view a Managed File Transfer (MFT) solution as one of their first lines of defence. Employing MFT as the standard when exchanging data puts organisations light years ahead of businesses still relying on risky File Transfer Protocol and email to transfer files. MFT platforms not only centralise – and therefore, control - data transfer, they also enable companies to apply comprehensive policies which protect data. Data can be insulated from threats as diverse as inbound malware to careless employees entrusting files to external platforms beyond an organisation’s direct control, such as Google Drive and Dropbox. Critical protection policies, such as those encompassing encryption, monitoring, and auditing capability, can be enforced. High Volume = High Exposure In 2024, businesses were responsible for generating around 30% of the world’s data—an astonishing ~44.1 zettabytes. That included data such as transaction records, CRM logs, ERP systems, IoT sensor data from manufacturing and logistics, internal communications, analytics, and cloud backups, AI training datasets and other enterprise software usage. But as the volume of data used and consumed by businesses grows, so too does the cost and impact of potentially losing that data. The high ransoms now regularly being paid to cyberthieves amply demonstrate just how valuable business data has become. Surely it makes more sense to invest in a relatively inexpensive protective technology like MFT, than to lose equivalent funding — or greater — in the form of ransoms paid to cyber thieves? Lessons from Bankers Banks, traditional repositories of valuables from cash, precious metals and sensitive documents, have learned a lot over the years about protecting assets. And their learnings are relevant to how we should be protecting our valuable data. Banks no longer store our valuables in a single bank vault. Nor for that matter do they store our digital currency on a single server. Rather, banks protect our precious assets — physical and digital — behind layers of security. Physical valuables sit behind physical barriers, multiple locks, access control systems, remote monitoring and security guards. Digital valuables are protected against threats such as malware, ransomware, accidental data loss, third-party exposure, and zero-day attacks by a broad array of technologies. Sitting beneath those technologies, ensuring they’re enforced and providing a sound bedrock of centralised control, surveillance and auditing, is MFT. Adding Layered Defence At Generic Systems Australia we’re adept at installing and maintaining the world’s leading MFT, GoAnywhere . And our Advanced Threat Protection (ATP) bundle significantly enhances GoAnywhere’s data protection capabilities by introducing a proactive, multilayered defence against both external threats and internal data leakage. While GoAnywhere already provides secure encryption, access controls, and audit trails for file transfers, the ATP bundle adds dynamic inspection and sanitisation that targets the content itself—not just the container. At the heart of this integration is the Clearswift Secure ICAP Gateway, which enables deep content inspection and adaptive Data Loss Prevention (DLP). This means every file transferred through GoAnywhere can be scanned for malware, embedded scripts, macros, and other active content that could compromise systems. Unlike traditional antivirus tools, ATP sanitises files in real time—removing only the malicious elements while allowing legitimate content to pass through uninterrupted. Limiting Exposure Beyond malware, the ATP Bundle also addresses sensitive data exposure. It can detect and block files containing personally identifiable information (PII), financial records, or confidential metadata before they’re shared externally. Policies can be set to redact sensitive text, strip geotags and even apply optical character recognition (OCR) to scanned documents to catch hidden data. This empowers organisations to enforce granular control over who can transmit sensitive content and under what conditions—adding a layer of governance that encryption alone cannot provide. In essence, the ATP Bundle transforms GoAnywhere from a secure conduit into an intelligent gatekeeper. It doesn’t just move data safely—it understands what’s inside, evaluates its risk, and ensures that only clean, compliant content reaches its destination. Modular Enhancements Augmenting GoAnywhere’s capabilities are Modules which can further protect an organisation from the inherent risks of legacy protocols such as SFTP/FTPS, email attachments and manual processes. SFTP Server can be upgraded to by GoAnywhere SFTP Server Module, enabling SSH-encrypted transfer with centralised access control, audit logging and integration with Active Directory. FTPS Server can be upgraded to FT Module, offering SSL/TLS encryption, customisable access, and DMZ-safe deployment via GoAnywhere Gateway. HTTPS Web Uploads can be replaced by the Secure Folders Module to create browser-based file access with HTTPS encryption and user authentication. AS2/AS4/PeSIT can be replaced by Certified Protocol Modules, providing Retail and banking-grade secure exchange with Drummond certification. These modules consolidate disparate protocols into a single, scalable platform—reducing complexity, improving visibility, and enforcing consistent security policies across all transfers. Making Email Secure Email is ubiquitous. However, it's also one of the least secure ways to transmit sensitive data. Fortra’s Secure Mail module in GoAnywhere transforms ad-hoc file sharing into a secure, trackable process without disrupting user workflows. Using Secure Mail, Users send files as secure encrypted packages via their browser or an Outlook plugin. Recipients receive a unique link to download via HTTPS — no files are sent directly via email. Senders can set expiration dates, download limits, and password protection, and all activity is logged for auditability and compliance. Secure Mail keeps files on your infrastructure until accessed, eliminating third-party hosting risks and ensuring full control over sensitive data. Strategic Defence By replacing legacy protocols and insecure email practices with GoAnywhere’s modular architecture, organisations gain: • Unified governance over all file transfers; • Reduced attack surface via DMZ-safe deployment; • Improved compliance with GDPR, HIPAA, PCI DSS; and • Streamlined user experience without sacrificing security. Here to Help At Generic Systems Australia we have decades of experience helping Australian and New Zealand organisations protect themselves against malware and other cyber attacks through the power of the world’s leading MFT solution. Our Migration Service makes the transition even easier for organisations who prefer to use their resources building their businesses rather than improving their IT plumbing. If you’d like a no-cost, no-obligation discussion about how we could help you simply and affordably adopt an advanced MFT solution, please feel welcome to get in touch with us. At Generic Systems Australia, we’re your local experts in Secure Managed File Transfer. Previous Next

  • Moving on from MOVEit | GSA

    < News Moving on from MOVEit 20 Oct 2023 Your Choice of MFT Matters Many organisations across the Asia-Pacific region are replacing their outdated MOVEit-based Managed File Transfer (MFT) systems with Forta’s advanced GoAnywhere suite . In this article, I’ll explain why. There are plenty of options when it comes to selecting a file transfer solution… from free, unsecure methods to the fully-featured marketplace leader. But as cybercrime has continued to surge, companies have increasingly realised how essential it’s become to secure their data transfers, maintaining a ‘circle of trust’ with their customers and supply chains. Additionally, companies have been searching for ways to boost their bottom lines through greater efficiency. The true cost – in terms of lost productivity - of outdated manual file transfer approaches has come into sharper focus. Business leaders are realising that their MFT solutions, which may have once met historic needs, are no longer enough . Superior Security Recent cybersecurity incursions make “Robust Security” top of mind for those seeking a better MFT solution. GoAnywhere MFT takes all aspects of data security seriously, protecting your sensitive data both “in motion” and “at rest”. Maintaining GoAnywhere’s security and compliance product leadership is a primary focus for its development team, who stay across the latest security standards to ensure up-to-date compliance with regulations, frameworks, and standards. Beyond Windows Organisations managing multiple operating systems soon encounter the constraints of MOVEit’s Windows-only solution. GoAnywhere flexibly supports any protocol, any platform, and any deployment, including Microsoft Azure, AWS, Linux, and more. The Need for Speed Included in GoAnywhere is GoFast, a file transfer acceleration protocol which can transmit data considerably faster than traditional FTP. The patented technology in GoFast takes the best of UDP’s speed and adds reliability and rate control, providing GoAnywhere with speed MOVEit can’t match. Drag & Drop Workflows Scripting – as required by MOVEit for some tasks - is clunky, time consuming and confusing for non-expert users. Through its breadth of Automated Workflows capabilities, GoAnywhere enables end users to quickly and easily build workflows. Manual and automated tasks can even be combined into one master workflow. Further, GoAnywhere provides easy reporting on partner Service Level Agreements, alerting you to any workflow issues before your trading partners do. Easy Centralised Control MOVEit requires you to install two products (MOVEit Automation and MOVEit Transfer) to enable full MFT functionality. Most users prefer GoAnywhere’s centralised, browser-based dashboard - an intuitive “one stop shop” for managing file transfers. Advanced Auditability GoAnywhere not only moves and shares data securely, it also provides full auditability of transfers. Logging full audit trails of all user events and file activity, it can also generate reports of file transfer activity, user statistics, and completed jobs – all from within its central management console. And.. Beyond the advantages above, former MOVEit users are often delighted to discover GoAnywhere’s advanced capabilities in: High availability and clustering, providing true active-active support and load balancing to distribute workloads across multiple systems; Remote agents - lightweight applications managed through the GoAnywhere interface which enable configuring and scheduling of file transfers throughout an enterprise; and Secure Forms - customised forms or files that which contain data other tasks can automatically process. Want to see a Better MFT in Action? If you’d like to discuss how GoAnywhere could help boost organisations’ security, efficiency and bottom line, please feel free to contact me ( bradley@gensys.com.au ) for an obligation-free discussion. Bradley Copson Business Manager Generic Systems Australia Previous Next

  • 55 Trillion File & Object Transfers in 2025 | GSA

    < News 55 Trillion File & Object Transfers in 2025 13 Jan 2026 One of the things I mused over during the new year break was “How many files did Australians transfer during 2025?” I asked an AI to assist me in a sweep of available data sources and come up with a reasoned estimation. Humans + Hidden When most people think about digital activity, they picture emails, cloud uploads, or the occasional shared document. Yet when we model Australia’s full digital ecosystem across 2025, a very different picture emerges. Human‑initiated file sharing — email attachments, messaging app files, cloud uploads — accounts for only a tiny fraction of the nation’s digital movement. Analysis places that figure at around 82 billion files per year, a substantial number on its own. But layering in the automated and infrastructural systems that underpin modern digital life, the scale expands dramatically. To reach an estimate of the total, four additional categories need to be accounted for. Automated system backups are the first major contributor. By estimating the number of organisations using cloud‑based incremental backup and applying conservative daily change rates, we arrived at roughly 11 trillion backup‑related file movements annually. Next came cloud sync events , driven by photo libraries, document updates, and multi‑device workflows. With around 60% of Australians using at least one active sync service, this added another 115 billion events. The real explosion came from Content Delivery Networks (CDNs). Every webpage, app screen, and embedded image is delivered as a collection of discrete objects. By modelling daily request volumes and average objects per request, we estimated 34.4 trillion CDN object transfers in 2025. Finally, we incorporated machine‑to‑machine (M2M) activity—the internal chatter of microservices, logs, IoT payloads, and replication events—using a conservative multiplier. This added another 11.4 trillion movements. Together, these layers produced a staggering total: approximately 50–60 trillion digital file and object transfers across Australia in 2025. Humans are barely the spark; the infrastructure is the inferno. Implications for Organisations The scale of data movement across Australia has profound implications for organisations. When file movement becomes this vast, distributed, and automated, traditional ad‑hoc transfer methods simply can’t keep up. Security gaps widen, auditability collapses, and operational risk multiplies. That’s why Managed File Transfer (MFT) technology should no longer be considered “nice to have”. MFT provides a controlled, encrypted, policy‑driven framework for moving data across systems, partners, and cloud environments. It brings visibility to the invisible, governance to the chaotic, and reliability to the mission‑critical. In a world where trillions of transfers happen without a human ever touching a keyboard, MFT is the anchor that keeps organisations secure, compliant, and in control. Here to Help At Generic Systems Australia , we’re Australia’s and New Zealand’s experts in helping businesses implement and take leverage MFT solutions. We’ve assisted dozens of organisations to make their file transfers resilient, secure and reliable — boosting their efficiency in the process. If you’d like to discuss what MFT can do for your organisation, please feel welcome to get in touch with me. I’m always happy to have an obligation-free chat and explain how easily we can transition you from your current approach to the world’s leading MFT solution, GoAnywhere . Previous Next

bottom of page