top of page

Search Results

164 results found with an empty search

  • "The Case of the Camouflaged CSV" | GSA

    < News "The Case of the Camouflaged CSV" 3 Sept 2025 It was a typical rainy Wednesday in the Cloud. I was nursing a lukewarm S3 bucket of coffee that was almost as bitter as my ex-wife. And that’s when she sauntered into my inbox—legs for days and resolution to match. Said she’d lost something precious: a young .CSV file named “Quarterly_P&L_FINAL_FINAL_v7.docx”. She’d been told I was the kind of dupe who could go find it. And I knew right then this case was going to be messier than an Agile Standup on a Friday afternoon. “Please,” she purred, her pixel-perfect lips trembling. “She vanished right after I hit ‘Send.’ Now she’s nowhere. Not in my Sent Mail. Not in OneDrive. Not in Dropbox. Not even in the Recycle Bin. Just… gone.” I leaned back in the battered Aeron I’d accepted from the last dame who hadn’t had the means to pay me, and reassured her I’d seen this kind of thing way too many times before. “Could be the work of Miss Configuration,” I mused. “Or worse… hackers.” “Please,” she begged, making like the waterworks were about to flow. “You’ve got to F1 me.” I sighed wearily… I’m always a sucker for a dame in distress. But she was right - I was her only chance of being reunited with her beloved .CSV. So I zipped up my trench coat, flipped my firewall to DND, and hit the dirty streets of cyberspace. First stop: the Dark Web. Sin City City plans don’t show where the Dark Web district begins. Nor is there any bullet-ridden road sign to let you know when you’ve crossed from the mean streets to the even meaner streets. But I knew I was there when I saw the familiar shady characters loitering — pop-up hustlers, cookie pushers, and a guy selling expired SSL certificates within the folds of a battered trench coat. I asked around for leads. “Try The Cache,” said a greasy bookmark with a twitchy scroll wheel. “Files go there to be forgotten.” Cold Cache I didn’t need directions. The Cache was a hidden side bar accessible only through a back door. I gave the bored muscle the password I’d bought from a PII broker and pushed into the shadowy crowd of malware and malcontents. The bartender—a grizzled old exe named Clippy—eyeballed me with suspicion before recognising me. “Well, well… if it ain’t GoAnywhere Gumshoe,” he said, polishing some code with a Dirty Markup tea towel. “Chasing another ghost in the machine?” “Not this time, Clippy,” I said. “This time she’s a file. A CSV. Corporate. Probably jacked full of lies and pivot tables.” Clippy winced. “You don’t want that kind of trouble. Last guy in here who asked about spreadsheets is still in a recursive loop.” I slipped Clippy a few kilobytes and he pointed me towards a shadowy booth. In it sat a rogue AI named DataDaemon, sniffing packets as he pored over a Docker container. “Yeah, she was here,” DataDaemon confirmed. “That file you’re looking for. But she wasn’t flying solo. She was hanging off the arm of… him.” “Who…?” “The PDF.” The Unusual Suspect I cursed under my bandwidth. The PDF—slick, immutable, and always up to something. But I had something up my sleeve that the PDF wouldn’t have counted on. It was for a case just like this one that I’d always maintained The Logs. And now The Logs were going to lead me through the brooding labyrinthine of the metadata metropolis, straight to The PDF and his hostage CSV. In no time, I tracked The PDF to a sleazy compression joint called The Zipper Club. He was lounging in a NAS, smug as a first gen backup, not suspecting a RAID. “Searching for your cute little CSV?” he sneered. “Well she ain’t going back. She craved permanence. And I gave her structure. Fonts that don’t shift. Headers that don’t cry.” I lunged at him, but he was fast—encrypted and password protected. I barely clocked his checksum before he was out the door and into the swirling Cloud again. A Ctrl-Breakthrough Back at my office, I stared at the blinking cursor. The trail seemed to have gone cold. It had been a busy day, and my RAM felt fried. But I had a reputation to maintain. I’d never failed a client before… and I sure as hell wasn’t going to fail this one, either. Running through The Logs one more time, I saw it… a timestamp: 3:14 a.m. That was bang in the middle of the witching hour for network traffic — prime time for somnambulant systems to engage in mundane crosstalk and perform glacial backups. I picked up the CSV’s trail again in a neglected SharePoint graveyard. And then there she was, buried six layers deep in folders labelled “Misc”, “Old Stuff” and “DO NOT DELETE”. I exhumed her gently. She was intact, but changed. Her margins were off. Her fonts had gone rogue. Someone had run a mail merge on her. I brought her back to Miss JPEG, and this time, there was no holding back the flood of pixelated tears. “You found her,” she said. “But she’s… different.” “Aren’t we all,” I said, pointing my chin in the direction of the window, where a new day was shooting the first golden rays of hope through the night’s dark Cloud. I gestured towards CSV’s Version History. “She’s still there,” I said. “Just sleeping. Until you restore her.” Epilogue I leaned back in my Aeron and tipped my fedora over my eyes. I knew today would bring another client, another case, another missing file. But for now, the system was stable. And I was still the best damn gumshoe on the cyberspace beat. Fade to black. Cue saxophone MIDI. If you’d like a GoAnywhere Gumshoe protecting your files, please don’t hesitate to contact me . At Generic Systems Australia , we’re your local experts in Managed File Transfer technology. Previous Next

  • Top 10 Tips for Advanced MFT Workflows | GSA

    < News Top 10 Tips for Advanced MFT Workflows 7 Feb 2024 Improve Business Processes with GoAnywhere’s Advanced Workflows One of the most advanced features of GoAnywhere MFT is also one of its most popular – Advanced Workflows. Workflows (also called “Projects”) expand and unlock superior automation for your file transfers. They enable you to enhance encryption, strengthen security capabilities, and run tasks seamlessly without human intervention. Those already using Advanced Workflows know how much time and effort this feature can save. It takes the drudgery out of moving data between applications, between employees, and within their supply chain ecosystem. Whether you’re in search of new tips and tricks, or just getting started with Advanced Workflows, this article will help you tap the potential of GoAnywhere MFT. 1. Create Projects with No Programming Skills You don’t need to be a technical genius or have any programming skills to create Advanced Workflows. GoAnywhere’s Project designer window couldn’t be any easier to use. It’s drag-and-drop interface puts over 100 unique tasks – copying, translating, moving, backing up, alerting, reporting, etc - at your fingertips. No clunky scripting is needed. 2. Configure Advanced Worksflows Resources Resources are an essential function and act as GoAnywhere’s “arms” or “client”. Configuring resources to network locations, email servers, and file transfer servers saves you time as you create your Advanced Workflows. Do it once, and you can use those resources in all your Projects. There are more than 20 different resource types for GoAnywhere to connect to, such as Amazon S3 Buckets, Azure Blob Storage, and SSH servers (SFTP, SCP, SSH). These pre-defined connections for internal servers, as well as external trading partners and locations, make it simple to build Projects which manipulate and move files. 3. Translate Data into Different Formats Advanced Workflows comes with 15 tasks for data translation. They enable you to read and write files in multiple different formats, and seamlessly translate between them. They include: Read/write CSV, Excel, Fixed-Width-XML, JSON Read flat file SQL query output to various formats Modify RowSet 4. Automate File Encryption/Decryption With cybercriminals increasingly targeting company data, most businesses believe it’s critical to encrypt data when its being transferred. GoAnywhere makes this as simple as it is important. With Advanced Workflows you can completely automate the process of encryption and decryption, for everything from documents to digital signatures and verifications. All of it is done with the robust Open PGP standard. 5. Create and Use Conditional Statements Conditional statements offer excellent control of Workflows within your Projects. Using common “if/else” logic and loops, they can parse through variables or lists of files. By chaining Advanced Workflows tasks together, they perform their tasks when the Workflow runs and prior conditions are “true.” 6. Reference Projects as a Common Function Projects you create can be called or referenced by multiple Projects. This enables commonly performed tasks to be utilised in multiple Projects in the manner of a common function or utility. 7. Run Workflows in Debug Mode Running Workflows in Debug Mode enables easy testing and troubleshooting of individual Projects. Users can interactively execute tasks one step at a time, and enable the job log and variable values to be monitored during each step. At each break in time, the values of the variables can be altered before the next task is executed. 8. Schedule and Automate GoAnywhere Reports Advanced Workflows can be used to schedule and automate reports. Reports can be generated and delivered, and email and text notifications sent. GoAnywhere’s built-in scheduler can be used to execute Workflows at future dates and times. Projects can be scheduled to run on a one-off basis, or with a recurring frequency. 9. Control Data Security with Triggers Triggers enable you to control the security of your data. They can automate Projects, send notifications based on user actions in GoAnywhere, and much more. Triggers can be defined to monitor for certain events such as an account being disabled, a download failing, or a successful login. A triggered event can initiate a response such as receiving an email when a file is uploaded by a trading partner or automatically removing a partial file from a folder if the file upload is unsuccessful. 10. Monitor Files for Determined Events Advanced Workflows can do file-based monitoring for certain events. These events include: Created Modified Deleted, and Exists. If you’d like to explore how your organisation can improve its efficiency through GoAnywhere ’s Advanced Workflows, feel free to contact our Business Manager, Bradley Copson (mail to: bradley@gensys.com.au ). He’s always happy to have an obligation-free discussion, explain how simply we can transition you from outdated software and approaches, and offer you a zero-cost Proof of Concept. Generic Systems Australia Your Local Experts in Secure Managed File Transfer Previous Next

  • Survey finds IT leaders increasingly focussed on PROACTIVE cybersecurity | GSA

    < News Survey finds IT leaders increasingly focussed on PROACTIVE cybersecurity 12 June 2024 Australian IT leaders are increasingly focusing on proactive cybersecurity, according to a new survey released today. In a survey conducted by Tenable, IT leaders said that, while the ability to respond to and recover from cyber incidents remained essential, they are now focusing more on preventing such incidents altogether. Preventative measures they are investing in include: access controls and monitoring (64%) regular software updates and patch management (64%), and regular employee training and education on cybersecurity best practices (60%). Dark Tide Rising The most recent Australian Signals Directorate Report shows that cybercrime is on the increase for enterprises. On average, a new report is received every six minutes, up 23% year on year. The average cost of cybercrime has also increased by up to 14%. Saving Ransoms, Reputations, Operating Costs Adopting preventative cybersecurity measures isn’t only saving companies from the costs of cybercrime. Companies who take proactive steps say they are also benefiting from lower cyber insurance premiums. 44% of IT leaders experienced reductions ranging from 5% to 15%. Reductions of that magnitude demonstrate that insurers too are recognising the effectiveness of proactive cybersecurity. Proactive, Layered Defence A proactive strategy for storing, transferring and securing data is essential for keeping cyberthieves at bay. A layered approach - secure file transfer, secure content engines, secure digital rights management, and employee education – is the optimal way to prevent data breaches. At Generic Systems Australia , we recommend the class-leading secure managed file transfer solution, GoAnywhere MFT , to keep data safe - at rest, and in transit. Coupled with our Advanced Threat Protection Bundle , we enable organisations to safely collaborate without exposing systems to the risks of malware gaining a foothold within their IT systems. About The Survey Tenable partnered with Pure Profile to collect data from more than 200 IT and cybersecurity leaders across the insurance, banking, education, healthcare and transport industries in Australia. If you’d like to join the growing number of IT managers taking strong preventative measures to avoid cybercrime, please get in touch with me, Bradley Copson ( mail to :bradley@gensys.com.au ). I’m always happy to have an obligation-free discussion, explain how simply we can transition you from outdated software and approaches, and offer you a zero-cost Proof of Concept. At Generic Systems Australia , we’re your local experts in secure Managed File Transfer. Previous Next

  • Use APIs to accelerate your MFT’s ROI | GSA

    < News Use APIs to accelerate your MFT’s ROI 26 Nov 2024 Leveraging APIs alongside your Managed File Transfer (MFT) solution is a great way to boost the return on investment from your MFT, and scale its deployment more broadly across your organisation. Here’s how to use APIs to add further automation, integration, scalability, and customisation to your MFT. APIs…? APIs (Application Programming Interfaces) help software applications communicate with another. Enabling APIs with a robust MFT solution is a simple way to add new functionality to your data transfer software, and accelerate the productivity and efficiency gains it offers. APIs will help you integrate your organisation’s data transfers with the many applications your organisation already use daily - CRM platforms, business intelligence tools, ERP systems and more. In doing so, you can synchronise data across your organisation and provide your team with more secure collaboration. Flexible MFT solutions that support APIs also enable you to further customise and automate your file transfers for your unique business and operational needs. Enhanced Security Of particular value is the way APIs can boost an organisation’s cyber defences by integrating their MFT solution with other data-centric security systems. For example, Generic Systems Australia’s Advanced Threat Protection Bundle layers an organisation’s protective measures with the security features of Fortra’s GoAnywhere MFT to further secure sensitive data. The added flexibility to evolve and scale as your needs change can be a game changer for IT teams seeking to maximise user experience and organisational ROI. Better Workflows Automated file transfer workflows can be “supercharged” using APIs. Here are seven specific API features and techniques organisations can leverage to maximise the value they derive from their managed file transfer solution. In each of these examples, we’ll feature API integration with GoAnywhere, the independently-assessed class-leading MFT. GoAnywhere not only provides APIs, it can also consume third-party APIs, and act as middleman, or API gateway, between other applications. 1. RESTful API An interface used by two computer systems to securely exchange information over the internet, REST (Representational State Transfer) can be used to manage users, groups, triggers, projects, and schedules. This simplifies new user onboarding and migrating systems and environments. For example, you can use the REST API to create a new web user programmatically and eliminate the manual tasks often needed for on-boarding new trading partners. You can also start/stop file transfer jobs and query the status of active jobs. 2. REST Enable a Secure Form Within the GoAnywhere dashboard you can select REST Enable Secure Forms to trigger more complex API calls on the backend of Advanced Workflows . Then, using standard REST calls you can invoke the secure form and its underlying project. Rest Enabled Secure Forms can also act as a REST API gateway to computing resources normally not available to public internet users. The GoAnywhere server can be deployed on the secure network and the solution’s Secure Gateway can act as the link to the public internet in the DMZ. An administrator can enable curated access to internal REST APIs that would normally be available only via VPN or by a dedicated network connection. Comprehensive audit logs and fine-grained user access controls can turn GoAnywhere MFT into a complete API gateway. The Method createPayload (GET https://localhost:6443/rest/forms/v1/ticket/payload ) will insert the payload. The Method uploadAttachments (POST https://localhost:6443/rest/forms/v1/ticket/payload/ :payloadId /file ) will upload one attachment at a time. The Method submitPayload (POST https://localhost:6443/rest/forms/v1/ticket/payload/ :payloadId /submit ) will submit the payload. The Method downloadAttachment (GET https://localhost:6443/rest/forms/v1/ticket/payload/ :payloadId /file/ :fileId ) will download one attachment at a time. 3. GoAnywhere HTTPS You can use GoAnywhere HTTPS project tasks to automate file transfers, create Secure Mail Packages, or programmatically place files in Secure Folders for uploading or downloading For example, if you need to send a large, automatically generated report to a user, you can enable the GoAnywhere HTTPS Send Package task in GoAnywhere. Simply create a project to automatically pick a file (or files) and send a package as a link via Secure Mail. You can protect that package with a password, track the number of downloads, or prevent further downloads after 24 hours. Another GoAnywhere HTTPS task is the ability to set up programmable uploads to GoDrive, a solution which provides Enterprise File Sync and Sharing (EFSS) services for employees and partners. 4. Quick Uploads Enabling Quick Uploads in HTTP Service enables you to turn GoAnywhere into a REST endpoint for file exchange. Quick Uploads (which requires a POST Method with Authentication) allows the solution to upload files to GoAnywhere via REST, effectively turning your GoAnywhere Secure Folders feature into a REST-enabled file exchange gateway. REST-enabled file exchange is very useful for other applications to have a place to store and exchange files. The end users don’t really know what is happening under the hood, but it allows application developers to provide lots of flexibility and build easy-to-use applications. 5. Project Run Mode You can start a project in the background in the dashboard's triggers, schedules, and within the project designer’s Call Project task. For example, if you need to start a long-running job, you simply start a job in Batch mode, which will run in the background, and the system will be automatically notified when it is finished. Need to copy a huge file set? Then run a Job that spawns multiple Batch Jobs. For example, every sub folder in your file set could be sent as separately spawned batch jobs. Running multiple jobs in the background in parallel will help optimise your computing resources, increase your throughput, and spread the workload to other nodes in your GoAnywhere cluster. In addition to setting the run mode, you can also set the priority and the job queue. For example, some long-running CPU intensive jobs, such as archiving or backup, can be set to run on a lower priority status or on a lower priority queue so that your core MFT operations remain more responsive. 6. Consume Third-Party APIs Consuming APIs is the process by which an application developer accesses the various APIs that are exposed by the API provider and then uses those APIs to develop one’s own software applications and products. Within GoAnywhere you can use HTTP/HTTP Post and GET Project tasks or Webservices REST tasks to call third-party APIs. For example, once a file is uploaded, you can create a trigger that will automatically import the file into third-party applications, such as a CRM or trouble ticketing system. Additionally, GoAnywhere offers Cloud Connectors to the most popular applications in the industry. (If you cannot find a cloud connector for the application you need, use the Project Webservices or HTTP/HTTPS POST Project tasks to connect via REST to the application of your choice.) 7. Promote Features Continuous Integration and Delivery CI/CD functions are important in every large IT Project. GoAnywhere delivers the ability to promote every user, project, schedule, trigger, secure form etc, from development to staging to production. You can use “Promote” REST API calls to automatically migrate your configurations from development to staging to production. Working on a live production system presents additional challenges. Even the most diligent administrators can make mistakes and accidentally delete or rename configurations which take an entire system offline. Using GoAnywhere’s Promote features, either via GUI or as an API call, is required to maintain maximum system stability and reliability. If you do not have a test system yet, consider deploying one to minimise the risk of human error. API Options to Boost Automation GoAnywhere offers many powerful API options that can seamlessly automate basic file transfer tasks for IT teams and users. You can mix and match the seven techniques above to create a next-generation automation framework that goes far beyond standard MFT functionality. Need Help? It’s Here - Locally! If you’d like help using APIs to boost your MFT’s ROI and your team’s productivity, please feel welcome to get in touch with me . I’m always happy to have an obligation-free discussion. At Generic Systems Australia , we’re your local experts in Secure Managed File Transfer. Previous Next

  • MEETING CDR OBLIGATIONS | GSA

    Australia’s Consumer Data Right (CDR) requires businesses to carefully plan how they handle, store and disclose the consumer data they collect. This primer explains your obligations, the breaches that can occur, and a strategy to avoid them. Meeting Your Business’s CDR Obligations Australia’s Consumer Data Right (CDR) requires businesses to carefully plan how they handle, store and disclose the consumer data they collect. The CDR provides individuals with the right to access their personal information, and the right of data portability found in the European General Data Protection Right (GDPR). An economy-wide program, it was launched in 2020, and is presently being rolled out sector by sector. CDR enables consumers to safely and conveniently elect to share data about them, held by data holders, with accredited providers. The government’s aim with the program is to make it easier for consumers to compare products and services, access better value and improved services, and assist financial management. Phased Rollout CDR has already been rolled out to the banking and energy sectors. The Australian Competition and Consumer Commission and co-regulator the Office of the Australian Information Commissioner are responsible for ensuring accredited providers and data holders comply with their CDR obligations. As companies and consumers have greater access to data, and more data files are being transferred than ever before, greater safeguards to protect this data are required. Regulators are deploying a range of tools to monitor and access the available information to ensure consumers have their data security and integrity in place. Their stated goal is to prevent breaches of the CDR’s obligation through compliance management and enforcement. Business Impact Businesses need to consider how they handle the data they collect, including how that data is harvested, stored, used and disclosed, and how it will make consumer data available to its customers and their nominated recipients when requested to do so. Special care of internal systems, processes and compliance is required to prevent breaches. Examples of CDR breaches include: Repeated refusal to disclose consumer data Misleading or deceptive conduct Data collection without valid consent Intentional use or disclosure of data inconsistent with consumer consent Insufficient security controls to protect CDR data Complying with the CDR Businesses under the CDR protocols should consider: Reviewing their policies and processes for privacy and data handling Training staff on their CDR obligations and how to manage the risks involved with handling consumer data Establishing breach notification procedures One way to ensure files are kept secure both at rest and while in transit is to incorporate a managed file transfer system, like GoAnywhere MFT. This secure, automatic software can protect data by: Controlling access to files and data Encrypting data Establishing the correct security settings when sending and/or receiving highly confidential emails Providing automated audits, reports and logs showing who accessed which data, who it was transmitted to, etc. GoAnywhere can also enhance business efficiency be replacing the myriad of legacy manual approaches for file sharing that can proliferate across businesses over time. Further consumer-oriented resources on CDR are available from the Australia Government’s website . RESOURCES HOME

  • Annual Upgrade and Health Check Service | GSA

    Annual Upgrade & Health Check Service Take the time, effort and risk out of ensuring your GoAnywhere environment is up to date and running smoothly! Our Annual Upgrade and Health Check Service provides dedicated resources to update your organisation’s GoAnywhere environment to the latest version. One of our experienced local Technical Consultants will review your organisation’s upgrade strategy, conduct a Health Check of your system and consult with you on any risks and compatibility issues potentially associated with your upgrade. What’s Included: Pre-Upgrade System Evaluation: Prior to upgrade, our local specialist will conduct an evaluation of your existing environment to identify issues and configurations that require special attention before upgrading. Preparation Meeting: a local GoAnywhere expert will present the findings and verify the scope of the upgrade. Upgrade: Our local GoAnywhere expert will assist with the upgrade of your environment, staying on hand to address any issues that may arise during the upgrade process. Rollback: In the unlikely event you encounter an unforeseen production issue, we will provide up to two hours of services to mitigate the issue. If the issue cannot be resolved, we will guide you through the rollback process and restore GoAnywhere to the previous working state. Health Check: We’ll evaluate the security configurations, performance logs, and overall health of your system. Our local GoAnywhere experts will check the number of licenses, workspaces, and job logs, and assist with optimising them. They’ll also advise you of opportunities to further leverage your investment in GoAnywhere to improve your organisation’s efficiency and security. Our Annual Upgrade and Health Check Service delivers the most up to date release of Fortra's GoAnywhere MFT and best practices. Download the Product Datasheet below for comprehensive details, and then Contact Us to schedule your Upgrade and Health Check! Download the Product Datasheet

  • Huge Average Cost of Data Breaches Revealed | GSA

    < News Huge Average Cost of Data Breaches Revealed 22 Jan 2024 Cost of a Data Breach A$6.77 million! That was the average cost globally of a data breach in 2023, according to research by IBM. An all-time high, and a 15% increase over the last 3 years, the astonishing number was calculated through in-depth analysis of real-world data breaches experienced by 553 organisations globally – including 112 in the Asia and Pacific regions – in the 12 months prior to March 2023. Alarmingly, only a third of studied breaches were detected by an organisation's own security team. 27% were disclosed by an attacker, and the remainder came from customers, trading partners, law enforcement and other third parties. Nearly 40% of breaches were compounded by the loss of data across multiple environments including public cloud, private cloud, and on-prem. IBM recommended company security teams focus on where cyber criminals are most successful and concentrate their efforts on stopping them before they achieve their goals. This is where an investment in a Secure Managed File Transfer solution has a key role to play. The interception of ad hoc file transfers – for example, email attachments, FTP transfers and other ad hoc methods of moving data within your organisation and between its trading partners – is a key exposure. A Secure Managed File Transfer solution such as the class-leading GoAnywhere MFT addresses the many risks of these ad hoc approaches through a holistic approach and complementary array of security features. Authentication & Encryption Automatically encrypt files on disk using AES 256 encryption Use Domains to create multiple security zones. Filter connections with IP blacklists and whitelists (Global and User level). Block Brute-Force and Denial of Service (DoS) attacks with an automatic IP blacklist. Authenticate SFTP connections with passwords and/or SSH keys. Authenticate FTPS and HTTPS connections with passwords and/or SSL certificates. Ability to accept or reject files with certain extensions. Run services under non-standard port numbers. Create and manage SSL certificates, SSH keys, and Open PGP keys through integrated screens. User Access & Controls Authenticate users against LDAP, Active Directory (AD), IBM i profiles, RADIUS, RSA SecurID, Google Authenticator, Duo Security, and other IAM (Identity and Access Management) solutions. Define administrator user permissions for separation of duties. SAML support for single sign-on and dual factor authentication. Restrict users to specific home directories and subfolders. Specify folder level permissions (upload, download, delete, rename, etc.) by user and group. Restrict user logins to certain days-of-week or times-of-day. Set password policies and expiration intervals. Authorise selected services (e.g. FTP, SFTP, FTPS, HTTPS and AS2) to certain users and groups. Disable user accounts after maximum login attempts. Disable user accounts automatically after a period of inactivity. Receive instant notifications on login failures. Disable anonymous login. View the active sessions for logged-in users with the ability to terminate (kick) sessions. Auditing & Reporting Generate full audit trails of all user events and file activity with reporting. Generate reports of file transfer activity, user statistics, and completed jobs from within the console. Feed audit log messages to a central SYSLOG server. Full Compliance GoAnywhere MFT secures your sensitive files and transmits data using the latest security standards, keeping your data secure and compliant with regulations, frameworks, and standards, including: Australia’s Consumer Data Right. Singapore’s PDPA (Personal Data Protection Act). PCI DSS, the global data security standard adopted by payment card brands. The EU’s GDPR (General Data Protection Regulation) The US’s HIPAA (Health Insurance Portability and Accountability Act) & HITECH (Health Information Technology for Economic and Clinical Health Act). The US’s FISMA (Federal Information Security Management Act) & NIST (National Institute of Standards and Technology) Cybersecurity Framework. Canada’s PIPEDA (Personal Information Protection and Electronic Documents Act). California’s Consumer Privacy Act. “An ounce of prevention…” As the old saying goes: “An ounce of prevention is worth a pound of cure”. To avoid becoming one of the cybercrime victims IBM studies in 2024 😉 please do explore how the world’s leading Managed File Transfer solution, GoAnywhere MFT can bolster your organisation’s Cyberdefences. Our Business Manager, Bradley Copson ( bradley@gensys.com.au ), is always happy to have an obligation-free discussion , and can offer you a no-cost trial or Proof of Concept. Previous Next

  • Contact Us | GSA

    We're Happy to Help Generic Systems Australia are your local experts in Secure Managed File Transfer, servicing Australia and the Asia-Pacific region. We're always happy to answer your questions, or offer you an obligation-free discussion and zero-cost Proof of Concept. Address Generic Systems Australia Level 25, 100 Mount Street North Sydney NSW 2060 Australia Phone +61-2-9959-2239 Email mktg@gensys.com.au Social Media First Name Last Name Email Phone Number (optional) Message Enquiry Type Learn More Send Thank for your message! You will receive an email shortly! We respect your privacy! We won't share your details with third parties or AI. Your enquiry will be handled personally by a member of our technical team. And we won't spam you.

  • MFT'S ROLE IN BUISNESS : EBOOK | GSA

    “MFT's Role in Business: IT Leaders Weigh In” eBook A good way to learn the value of a Managed File Transfer (MFT) solution is to hear about it from those who use one. In Fortra’s eBook “MFT's Role in Business: IT Leaders Weigh In”, nine IT and security professionals share their experiences using Fortra’s GoAnywhere MFT. To receive a complimentary copy of the eBook, simply send us your email address below: First name Last name Enter your email address Phone You'll receive the "MFT's Role in Business: IT Leaders Weigh In" eBook RESOURCES Receive Report HOME

  • INFO TECH REPORT 22 | GSA

    Info-Tech Report MFT Quadrant Report (2022) Independent analysts Info-Tech compared MFT solutions and vendors in 2022, and found that GoAnywhere MFT was the unsurpassed leader in the field. To receive a Complimentary Copy of their Report, please submit your email address below: First name Last name Enter your email address Phone You'll receive the 'Info-Tech Report MFT Quadrant Report' shortly! RESOURCES Receive Report HOME

bottom of page