Search Results
184 results found with an empty search
- Automate File Transfers to Boost Team Efficiency | GSA
< News Automate File Transfers to Boost Team Efficiency 17 Mar 2024 Dodge the Drudgery – Automate Your File Transfers Manually sending files around your organisation, and to external trading partners, is a tedious and time-consuming aspect of many employee’s lives. However, it needn’t be. You can help your team dodge the drudgery via file transfer automation software. This software enables your team to program when files should move between internal systems, other team members, or trading partners, and is often used to manage reoccurring or high-volume file transfers. Your team is freed up to focus on other business-critical tasks. Read on to find out how… The Leading Solution GoAnywhere MFT is the world’s leading secure FTP (SFTP) file transfer automation software. It enables users to quickly automate file transfers and schedule workflows, using its built-in scheduler or your existing scheduler software. Within GoAnywhere's browser-based administrator, users can also automate their workflows by executing projects with a single click. GoAnywhere MFT can execute multiple workflows concurrently, through its job management system. Administrators can define multiple job queues, grouping workflows that share common characteristics or service level agreements. Each job queue can define the priority of their jobs as well as the maximum number of concurrent jobs that can be executed from the queue. All these job queues can be managed and prioritised through GoAnywhere's Administrator interface. Built-In Schedulers With the built-in scheduler you can execute Projects (workflows) at future dates and times. Projects can run just once, or with any recurring frequency you choose. You can also define custom calendars with specific holidays or dates that are important to your organisation, or to avoid scheduling a job on a specific day. Schedules can be further personalised by specifying them to run under specific users, or with start dates, frequencies and other over-riding variables. You can also indicate the email addresses to be alerted when a Project has completed, or encounters any problem. Unlimited File Sizes Large files are no problem for GoAnywhere MFT, or its email add-on GoAnywhere Secure Mail. It enables you to send large files as secure packages on an ad hoc basis, as well as send multiple large files. Even large files transfers won’t choke... GoAnywhere provides auto-resume and integrity checks to keep big files moving, even when it encounters network connectivity challenges. Robust Audit Logs and Reporting Staying compliant with various industry regulations or privacy laws is easier with GoAnywhere MFT. You can generate comprehensive audit logs of all file transfer and administrator activity, including workflow and file server auditing and administrator logging. This data is captured for activity in GoAnywhere servers for AS2, FTP, FTPS, HTTPS, and SFTP, and it includes details on log in attempts, file uploads and downloads, errors, and other events. Reports can be quickly generated, viewed, filtered, sorted and exported as needed. Executing Projects Workflows can also be automated, executing whenever a file monitor detects new, modified, or deleted files in targeted folders. Workflows can be called from local and remote command lines, scripts, and programs using the provided commands and APIs. Workflows can additionally be called as Web Services using SOAP or REST requests. To execute Workflows based on user activity, triggers can monitor for events like when a file is uploaded or downloaded. Workflows can be executed in Debug mode, which enables users to interactively execute tasks one step at a time. At each stopping point, the values for the variables can be viewed or changed before the next task is executed. If you’d like to discuss how your organisation’s file transfers can be automated, adding to your productivity and bottom line, please feel free to contact our Business Manager, Bradley Copson, (mail to: bradley@gensys.com.au ). He’ll be more than happy to offer you an obligation-free discussion, no-cost trial, or Proof of Concept. Generic Systems Australia Your Local Experts in Secure Managed File Transfer Previous Next
- Version 7.8.3 of GoAnywhere now available | GSA
< News Version 7.8.3 of GoAnywhere now available 4 Aug 2025 A new version of the world's best Managed File Transfer software - GoAnywhere MFT v7.8.3 - has just been released. Generic Systems Australia customers can read about and access it via their customer portals. Previous Next
- Managed File Transfer: Conductor of Your Enterprise IT Orchestra | GSA
< News Managed File Transfer: Conductor of Your Enterprise IT Orchestra 4 Dec 2025 In today’s enterprise IT landscape, complexity is the rule rather than the exception. Organisations rely on dozens—sometimes hundreds—of applications, platforms, and services to keep operations running smoothly. Each system has its own rhythm, is its own “instrument,” and has its own way of producing value. The challenge lies not in the individual performance of these systems, but in how well they coordinate with one another. This is where Managed File Transfer (MFT) can step up and play the role of orchestra conductor. Your IT Orchestra Imagine your enterprise IT environment as a vast orchestra. The finance system is the brass section, bold and powerful. The HR platform is the woodwinds, steady and supportive. The customer relationship management tool is the strings, agile and expressive. Each application has its own sheet music, tuning and timing. Left to themselves, these musicians might play well individually. But without guidance, the ensemble risks descending into cacophony. MFT ensures that every musician receives the right cues, at the right tempo, and in the right order. It doesn’t matter if the ERP system “plays” in one key and the analytics platform in another; MFT provides the synchronisation and structure that allows them to perform together harmoniously. Timing and Precision In an orchestra, timing is everything. A single misplaced note can disrupt the entire performance. Similarly, in enterprise IT, a delayed or failed file transfer can ripple across departments, causing inefficiencies or even compliance risks. MFT acts as the baton, ensuring that data moves securely, reliably, and on schedule. It enforces discipline across the ensemble, so that the payroll system receives its inputs before payday, the supply chain platform gets its updates before shipments, and the analytics engine has fresh data before executives make decisions. Security as the Score A conductor doesn’t just wave a baton; they interpret the score, ensuring fidelity to the composer’s intent. In IT, the “score” is the organisation’s security and compliance requirements. MFT enforces encryption, authentication, and auditing, ensuring that sensitive data is handled in accordance with regulations. Just as a conductor prevents the orchestra from straying off‑script, MFT prevents systems from improvising in ways that could compromise security or compliance. Flexibility and Adaptation Orchestras often perform different pieces, requiring the conductor to adapt to new tempos, styles, and arrangements. Likewise, enterprises constantly evolve—adding new applications, integrating with partners, or scaling to meet demand. MFT provides the flexibility to incorporate new “musicians” without disrupting the ensemble. It abstracts away the complexity of how systems connect, so IT teams can focus on the music rather than the mechanics. A Successful Symphony Ultimately, the value of MFT lies in its ability to transform disparate systems into a unified performance. It ensures that the finance section doesn’t drown out HR, that analytics doesn’t rush ahead of operations, and that customer data flows seamlessly across the organisation. The result is not just efficiency, but coherence—a symphony of systems working together to deliver business value. MFT is more than a logistics tool; it is the conductor that turns enterprise IT from a collection of talented but isolated musicians into a world‑class orchestra. By ensuring timing, security, and harmony, MFT enables organisations to perform at their best—producing not noise, but music. Here and Ready to Help At Generic Systems Australia we have decades of experience helping Australian and New Zealand organisations become more efficient, organised and protected through the power of the world’s leading MFT solution . Our Migration Service makes the transition even easier. If you’d like a no-cost, no-obligation discussion about how we could help you simply and affordably adopt an advanced MFT solution, please feel welcome to get in touch with us. At Generic Systems Australia, we’re your local experts in secure Managed File Transfer. Previous Next
- Zero Unforced Errors | GSA
< News Zero Unforced Errors 29 Jan 2026 GoAnywhere Managed File Transfer executes your organisations data transfers with consistency and accuracy, eliminating the risks that come with manual processes. It automates complex workflows so your data moves reliably between systems, partners, and applications. Strong security controls protect files in transit and at rest, ensuring compliance with organisational and regulatory requirements. Centralised monitoring provides clear visibility into every transfer. At Generic Systems Australia, we have decades of experience installing and providing LOCAL support to organisations taking GoAnywhere MFT. If you'd like an obligation-free chat about how MFT could secure and speed your data transfers... hit us up! 😉 Previous Next
- Record Quarter for Local Ransomware Attacks | GSA
< News Record Quarter for Local Ransomware Attacks 13 May 2025 The first quarter of 2025 was the worst ever for ransomware attacks, with the highest-ever number of organisations named on data-leak sites. The Q1/25 surge was driven by major activity spikes from ransomware groups Cl0p, Medusa, and FunkSec. · Cl0p, who accounted for more than third of all successful attacks, exploited zero-day vulnerabilities (CVE-2024-50623 and CVE-2024-55956) in Cleo managed file transfer (MFT) solutions, fuelling a 23% increase in overall ransomware activity between Q4 2024 and Q1 2025. · Ransomware-as-a-service (RaaS) group Medusa capitalised on the void left by disrupted ransomware gangs in late 2024, increasingly targeting critical infrastructure. · FunkSec utilised AI to develop malware which infiltrated 152 named victims this quarter. Australian Orgs Under Attack Australia ranked sixth among the most targeted nations for ransomware attacks in February. We were the 11th most affected country for data breaches last year, with 47 million Australian accounts exposed - an astonishing average of one breach per second . Since 2004, Australia has experienced 192.5 million breached accounts, the highest number in the Oceania region. More than 49 million unique Australian email addresses have been exposed, often alongside sensitive information such as passwords and contact details. Changed Ransomware Tactics According to Bitdefender, cybercriminals are increasingly targeting newly discovered vulnerabilities in internet-facing devices, rather than focusing on specific industries or businesses. Cybercriminals reportedly scan for new software vulnerabilities within hours of them being publicly disclosed. After accessing a targeted system, they then take time to manually infiltrate deeper, often delaying ransomware deployment by weeks or months. Protecting Your Organisation Holistic protection of your organisation’s valuable data requires both technology solutions and sound business practices. Layered defences, with integrated solutions that address encryption, threat protection, and data loss prevention, enable safe collaboration without risking malware, mishandled data, breaches and non-compliance. Given most breaches involve a human element, technology solutions need to be automated and easy for employees to use. Software needs to be able to manage: How access to data is granted; How access is authenticated; How access is tracked and controlled; and How access be speedily revoked, when needed. Layered Protection A standalone managed file transfer (MFT) solution – such as GoAnywhere MFT - is a great first layer of defence. It provides security for files at rest and in-transit. However, integrating Threat Protection as an additional layer enables you to take appropriate action when there’s PII in the data moving in and out of your organisation. Based on rules you predefine, our Advanced Threat Protection Bundle can mask, remove, or permit PII to be moved within your organisation and beyond, via a Secure ICAP Gateway. Benign Rule Adding granular rules-based controls to data handling is the killer feature of Advanced Threat Protection. For example, it enables you to: permit some specified individuals to transmit various categories of data, but not everyone; apply role-based access to your data; and audit who is sending what information. GoAnywhere’s encryption can be enhanced by limiting who can transfer data and what that data contains. The automatic detection and sanitisation of files removes some of the human factor risks so that employees can focus on their work instead of fussing with manual interventions. Augmenting technical solutions with employee training further reduces human factor risks. Local Help at the Ready At Generic Systems Australia , we are the Asia-Pacific region’s experts in deploying Managed File Transfer and Advanced Threat Protection. We’ve assisted dozens of organisations to protect their data and systems, while boosting their operational efficiency. If you’d like to discuss how we can help you, please feel welcome to contact me . I’m always happy to have an obligation-free chat and explain how simply we can transition you from your current approach. At Generic Systems Australia, we’re your local experts in data transfer. Previous Next
- Top 10 Tips for Advanced MFT Workflows | GSA
< News Top 10 Tips for Advanced MFT Workflows 7 Feb 2024 Improve Business Processes with GoAnywhere’s Advanced Workflows One of the most advanced features of GoAnywhere MFT is also one of its most popular – Advanced Workflows. Workflows (also called “Projects”) expand and unlock superior automation for your file transfers. They enable you to enhance encryption, strengthen security capabilities, and run tasks seamlessly without human intervention. Those already using Advanced Workflows know how much time and effort this feature can save. It takes the drudgery out of moving data between applications, between employees, and within their supply chain ecosystem. Whether you’re in search of new tips and tricks, or just getting started with Advanced Workflows, this article will help you tap the potential of GoAnywhere MFT. 1. Create Projects with No Programming Skills You don’t need to be a technical genius or have any programming skills to create Advanced Workflows. GoAnywhere’s Project designer window couldn’t be any easier to use. It’s drag-and-drop interface puts over 100 unique tasks – copying, translating, moving, backing up, alerting, reporting, etc - at your fingertips. No clunky scripting is needed. 2. Configure Advanced Worksflows Resources Resources are an essential function and act as GoAnywhere’s “arms” or “client”. Configuring resources to network locations, email servers, and file transfer servers saves you time as you create your Advanced Workflows. Do it once, and you can use those resources in all your Projects. There are more than 20 different resource types for GoAnywhere to connect to, such as Amazon S3 Buckets, Azure Blob Storage, and SSH servers (SFTP, SCP, SSH). These pre-defined connections for internal servers, as well as external trading partners and locations, make it simple to build Projects which manipulate and move files. 3. Translate Data into Different Formats Advanced Workflows comes with 15 tasks for data translation. They enable you to read and write files in multiple different formats, and seamlessly translate between them. They include: Read/write CSV, Excel, Fixed-Width-XML, JSON Read flat file SQL query output to various formats Modify RowSet 4. Automate File Encryption/Decryption With cybercriminals increasingly targeting company data, most businesses believe it’s critical to encrypt data when its being transferred. GoAnywhere makes this as simple as it is important. With Advanced Workflows you can completely automate the process of encryption and decryption, for everything from documents to digital signatures and verifications. All of it is done with the robust Open PGP standard. 5. Create and Use Conditional Statements Conditional statements offer excellent control of Workflows within your Projects. Using common “if/else” logic and loops, they can parse through variables or lists of files. By chaining Advanced Workflows tasks together, they perform their tasks when the Workflow runs and prior conditions are “true.” 6. Reference Projects as a Common Function Projects you create can be called or referenced by multiple Projects. This enables commonly performed tasks to be utilised in multiple Projects in the manner of a common function or utility. 7. Run Workflows in Debug Mode Running Workflows in Debug Mode enables easy testing and troubleshooting of individual Projects. Users can interactively execute tasks one step at a time, and enable the job log and variable values to be monitored during each step. At each break in time, the values of the variables can be altered before the next task is executed. 8. Schedule and Automate GoAnywhere Reports Advanced Workflows can be used to schedule and automate reports. Reports can be generated and delivered, and email and text notifications sent. GoAnywhere’s built-in scheduler can be used to execute Workflows at future dates and times. Projects can be scheduled to run on a one-off basis, or with a recurring frequency. 9. Control Data Security with Triggers Triggers enable you to control the security of your data. They can automate Projects, send notifications based on user actions in GoAnywhere, and much more. Triggers can be defined to monitor for certain events such as an account being disabled, a download failing, or a successful login. A triggered event can initiate a response such as receiving an email when a file is uploaded by a trading partner or automatically removing a partial file from a folder if the file upload is unsuccessful. 10. Monitor Files for Determined Events Advanced Workflows can do file-based monitoring for certain events. These events include: Created Modified Deleted, and Exists. If you’d like to explore how your organisation can improve its efficiency through GoAnywhere ’s Advanced Workflows, feel free to contact our Business Manager, Bradley Copson (mail to: bradley@gensys.com.au ). He’s always happy to have an obligation-free discussion, explain how simply we can transition you from outdated software and approaches, and offer you a zero-cost Proof of Concept. Generic Systems Australia Your Local Experts in Secure Managed File Transfer Previous Next
- A Missing Piece in Your Cyber Security Strategy? | GSA
< News A Missing Piece in Your Cyber Security Strategy? 26 Mar 2024 Is Secure Managed File Transfer a “missing piece” in your company’s Cybersecurity Strategy? The Australian Federal Government has set its sights on making Australia a world leader in cybersecurity by 2030 and is currently drafting upgraded cybersecurity regulations. In the industry consultation period just ended, they flagged new cybersecurity legislation and amendments to the Security of Critical Infrastructure Act which would include: Secure-by-design standards for the Internet of Things; Mandatory ransomware reporting; and Upgraded protection for and risk management of critical corporate infrastructure. The new legislation reflects comments made by Attorney-General, Mark Dreyfus, in the aftermath of the 2022 Optus hack. He said “We need better laws to regulate how companies manage the huge amount of data they collect, and bigger penalties to incentivise better behaviour. (E)xisting safeguards are inadequate. It’s not enough for a penalty for a major data breach to be seen as the cost of doing business.” With new legislation — and much bigger fines — imminent, now is the time to plug any potential gaps in your organisation’s cybersecurity strategy. Protect Your Data, Not Just Your Network Increasingly frequent cyber incidents prove that cybersecurity is not keeping pace with cyber threats. According to Forbes, “Companies keep pouring tons of money into protecting their network… but the real crown jewels are in the data that sits behind the network walls. That data is often not protected." It’s not enough to lock the door. An organisation’s crown jewels should also be kept in a vault. This ensures that, even if a hacker gets inside, they won’t be able to exploit the data they find. The vault is encryption. And the security guard that puts the jewels in the vault is Managed File Transfer (MFT). How MFT Secures Your Data To be truly secure, data must be protected not only when it’s stored, but also while it’s enroute to and from storage . MFT solutions such as the class-leading GoAnywhere MFT encrypt data at rest and in transit, complying with the highest data security standards across the US and Europe (e.g. HIPAA, HITECH, PCI DSS, SOX, and the GDPR). MFT manages inbound and outbound file transfers across an organisation, using industry-standard file transfer protocols such as SFTP, FTPS, and AS2 to send files securely, and encryption standards such as Open PGP and AES to protect data in transit and at rest. The "Managed" in MFT MFT software automates and streamlines the exchange of data for you, reducing manual processes and eliminating the need for any legacy tools and scripts you might currently be using. Data (including documents, images, videos, and other files) can also be exchanged via MFT across your private networks, systems, applications, partners, and cloud environments from a single point of administration. More than Transfers MFT software isn’t only for sending files between users and systems. It can also automate business processes, ensure secure connections, track file transfer activity, and more… File Encryption GoAnywhere MFT employs integrated encryption technologies to secure sensitive data. It also includes a key manager which enables you to create, import, export, and manage your keys and certificates within the product. Automation User errors and manual processes can also cause data breaches. By automating the encryption and exchange of sensitive files, processes and workflows can run without user intervention — especially useful when dealing with a high volume of file transfers. Email Enhancement GoAnywhere MFT offers a secure email module which allows users to send one-off file transfers securely, through a HTTPS connection. Cloud Connections MFT can help you build better connections between your network and web/cloud applications. GoAnywhere MFT offers built-in cloud integrations with applications such as Dropbox, SharePoint, and JIRA, and popular cloud services including Amazon, Google and Azure. Auditing & Reporting GoAnywhere MFT provide audit reports to meet compliance needs. All file transfer and administrator activity is stored and easily searchable. For organisations that need to report on file transfer activity to remain compliant with regulations and laws, the audit logs can be automatically generated and distributed as PDF reports. These are just some of the many MFT features which can help you protect your files. Plugging in the Missing Piece With the Federal Government soon to unveil its new cybersecurity legislation, now is the time to get ahead of requirements and explore how MFT can enhance your data’s security at rest and in motion. Arrange a free MFT trial and see how it works in your organisation. The benefits are almost immediate, from file transfer automation to solid data encryption. A data breach need not be a given for your organisation. By adding the missing MFT piece to your Cybersecurity Strategy, your valuable data can remain out of reach of cyberthieves. If you’d like to discuss how MFT can complete your organisation’s Cybersecurity Strategy, please feel welcome to contact us . We’re always happy to have an obligation-free discussion, explain how quickly and easily we can transition your organisation to the class-leading MFT solution, and offer you a zero-cost Proof of Concept. At Generic Systems Australia , We’re Your Local Experts in Secure Managed File Transfer! Previous Next
- Top Cyber Security Agency Reports on Most Common Cyber Threats to Businesses | GSA
< News Top Cyber Security Agency Reports on Most Common Cyber Threats to Businesses 3 Dec 2024 The latest annual report by Australia’s top cyber security agency – The Australian Signals Directorate (ASD) – contains sobering details about the challenges being confronted daily by Australian businesses. Describing the current cyber security strategy environment as “the most complex and challenging … since the Second World War”, the ASD says advancements in critical and emerging technologies dramatically improve the ability of cyber thieves targeting Australian organisations. Cyber Crime Increasing ASD received more than 36,700 calls to its Australian Cyber Security Hotline during the 2023-24 financial year - up 12% on the previous year. It responded to more than 1,100 cyber security incidents, and notified organisations of potential malicious activity on their networks more than 930 times. However, these numbers are merely the tip of the iceberg relative to the total number of attempted hacks. ASD characterised cybercrime as “a persistent and disruptive threat”. Contributing to the surge in cyber crime is the availability of new opportunities and technologies such as artificial intelligence. This is reducing the level of sophistication needed for cybercriminals to operate, and attracting new criminals to the field. Top Business Threats Compromised business email accounts (20%) and fraud (13%) were among the top self-reported cybercrimes for businesses and individuals in Australia during the last financial year. Online banking fraud accounted for a further 13% of incidents. Ransomware and data theft extortion (stealing data without encrypting their victims’ systems) also remained a pervasive and costly threat. The top 5 sectors reporting cybercrimes to law enforcement were: Retail trade (15%) Professional, scientific and technical services (13%) Construction (12%) Financial and insurance services (8%) Other services (7%) Average Losses by Businesses Interestingly, the average self-reported cost of cybercrime to Australian business fell slightly vs the previous financial year: Small businesses: $49,615 (down 8%) Medium businesses $62,870 (down 35%) Large businesses $63,602 (down 11%) However, it’s worth bearing mind recent research which shows a large number of businesses did not report ransomware payments in 2023-24. Cybercrime Reports by State and Territory Australia’s more populous states continue to report more cybercrime, with Queensland and Victoria reporting disproportionately higher rates of cybercrime relative to their populations. The highest self-reported financial losses were from victims in NSW (~$86,000 per cybercrime) followed by Victoria (~$66,000). Common Cybercrime Techniques The ASD says Credential Stuffing – using stolen usernames and passwords to access other services and accounts via automated logins – is one of the most common cyber attacks. Another common technique is Password Spraying - a brute-force attack where cybercriminals attempt to access a large number of accounts with commonly used passwords. Quishing - Quick Response (QR) phishing – is another growing threat. Cybercriminals use QR – for example, on a café menu, or a subtly altered public notice - to trick people into providing personal information or downloading malware onto their smart device. Combating the Threats In its report, ASD urges organisations to replace unsupported information and communications technology systems with secure-by-design products, and consider cyber security when implementing new technologies. Two great examples of secure-by-design protective technologies are those that we recommend at Generic Systems Australia. Managed File Transfer (MFT) is a technology which enables organisations to securely exchange data between systems and people in an automated, reliable and efficient way. Advanced Threat Protection adds a further layer of defence, seamlessly integrating your managed file transfers with adaptive data loss prevention to keep sensitive data secure. ASD also urges organisations to prepare a cyber security incident response plan and test it regularly to ensure an effective response and fast recovery. The process of developing such a plan will help an organisation understand the nature of its most valuable data, where it is stored, which systems and individuals have access to it, and how it is protected – or exposed to – malicious threats. Obtaining Expert Help At Generic Systems Australia , we have many years of experience helping Australian and New Zealand IT teams protect their valuable data with the very best MFT solutions. From the initial scoping of organisations’ legacy data transfer approaches, through zero-cost Proof of Concepts and hassle-free Migration Services , we help companies stay focused on running their business without disruption as we transition them to more secure approaches. If you’d like a to discuss how your cyber security can be boosted by MFT and layered defences, please feel welcome to contact me . I’m always happy to have an obligation-free discussion. Generic Systems Australia are your local experts in Managed File Transfer. You can view a full copy of The Australian Signals Directorate Annual Cyber Threat Report 2023-24 here . Previous Next
- Migrating from MOVEit | GSA
< News Migrating from MOVEit 8 July 2024 The rapid escalation of cybercrime is causing many organisations across the Asia-Pacific region to upgrade to more advanced file transfer solutions. That includes replacing Managed File Transfer (MFT) systems such as MOVEit with the class-leading GoAnywhere MFT suite. As our region’s local experts in MFT, at Generic Systems Australia we’re adept at helping customers simply, quickly and affordably migrate from their existing data transfer approaches. Many Options - but only one of them “Best” There are plenty of options when it comes to selecting a file transfer solution… from free, unsecure methods to the fully-featured market leader. However, as cybercrime continues to surge, many companies are concluding that the benefits of upgrading to the class-leading MFT more than justify the relatively minor investment required. They understand that maintaining a ‘circle of trust’ with their customers and supply chains is paramount to their business’s ongoing profitability. So, why is GoAnywhere MFT consistently declared by independent studies to be the leading MFT …? Superior Security “Robust Security” is most often the top of mind consideration for companies seeking the optimal MFT solution. GoAnywhere MFT takes all aspects of data security seriously, protecting your sensitive data both “in motion” and “at rest”. Maintaining GoAnywhere’s security is a primary focus for its software development team. They consistently stay across the latest security standards and threat monitoring to ensure up-to-date compliance with regulations, frameworks, and standards. Easy Centralised Control MOVEit requires you to install two products (MOVEit Automation and MOVEit Transfer) to enable full MFT functionality. Most companies find GoAnywhere’s centralised, browser-based dashboard - an intuitive “one stop shop” - a more efficient means of managing their data flows. The Need for Speed Included in GoAnywhere is GoFast, a file transfer acceleration protocol which can transmit data considerably faster than traditional FTP. The patented technology in GoFast takes the best of UDP’s speed and adds reliability and rate control. Drag & Drop Workflows Scripting (as required by MOVEit for some tasks) is clunky, time consuming and confusing for non-expert users. Through its breadth of Automated Workflows capabilities, GoAnywhere enables end users to quickly and easily build workflows. Manual and automated tasks can even be combined into one master workflow. Further, GoAnywhere provides easy reporting on partner Service Level Agreements, alerting you to any workflow issues before your trading partners do. Advanced Auditability GoAnywhere not only moves and shares data securely, it also provides full auditability of transfers. Logging full audit trails of all user events and file activity, it can also generate reports of file transfer activity, user statistics, and completed jobs – all from within its central management console. Modular, Multi-Platform Flexibility Organisations managing multiple operating systems appreciate how GoAnywhere flexibly supports any protocol, any platform, and any deployment, including Microsoft Azure, AWS, Linux, and more. Further, GoAnywhere’s capabilities can be significantly extended through the availability of a broad array of licensable modules , satisfying a wide variety of specialised file transfer needs. And More… Beyond the advantages above, former MOVEit users are often delighted to discover GoAnywhere’s advanced capabilities in: High availability and clustering, providing true active-active support and load balancing to distribute workloads across multiple systems; Remote agents - lightweight applications managed through the GoAnywhere interface which enable configuring and scheduling of file transfers throughout an enterprise; and Secure Forms - customised forms or files that which contain data other tasks can automatically process. If you’d like to discuss how your organisation can migrate to the leading MFT solution, please feel welcome to contact me, Bradley Copson ( mailto:bradley@gensys.com.au ) . I’m always happy to have an obligation-free discussion, explain how simple the transition can be, and offer you a zero-cost Proof of Concept. At Generic Systems Australia , we’re your local experts in secure Managed File Transfer. Previous Next
- Asia-Pacific orgs are on Cybercrime Frontline | GSA
< News Asia-Pacific orgs are on Cybercrime Frontline 12 July 2024 The Asia-Pacific region is the frontline in the fight against cybercriminals. A survey conducted by security firm Kiteworks has found that 72% of organisations in our region experienced four or more cybersecurity incidents in the past year - 20% more than the global average. Data also shows that Asia-Pacific organisations also exchange sensitive content with the highest number of third parties. This could be contributing to the higher-than-average cyberattacks. One of your best defences against hackers is to centrally control the flow of data into and out of your organisation. Managed File Transfer (MFT) software does that for you. At Generic Systems Australia , we’re the Asia-Pacific’s experts on the world’s #1 MFT, GoAnywhere . Let me know if you’d like an obligation-free discussion about how we could help you keep your organisation safe from the cyber crimewave. #MFT #managedfiletransfer #securefiletransfer #sft #cybersecurity #cybercrime Previous Next
