top of page

Search Results

167 results found with an empty search

  • Advanced Threat Protection | GSA

    Advanced Threat Protection Take your secure file transfers to the next level. Seamlessly integrate your managed file transfers with advanced threat protection and adaptive data loss prevention to keep your sensitive data secure. The SFT Threat Protection bundle enables you to collaborate safely without malware entering your organisation, and without your employees losing or mishandling data. What Does Advanced Threat Protection Do? Sharing information incurs risks… There’s the risk of opening your systems to threats, such as malware or even threats hidden within file transfers. There’s the risk of exposing the wrong content, whether sent by mistake or hidden in metadata. Advanced Threat Protection enables you to inspect managed file transfer content for threats as well as leakage. Seamless integration between Fortra's GoAnywhere MFT and the Clearswift Secure ICAP Gateway features: Anti-virus and malware protection Deep content inspection Adaptive data loss prevention Media type protection 3 Ways to Enhance File Transfer Security Prevent Files with Malware from being Shared. Simply check a box in GoAnywhere to turn on easy anti-virus protection through the Secure ICAP Gateway to scan all inbound file transfers. Detect and automatically strip out active content like embedded malware, triggered executables, scripts, or macros used to extract or hold sensitive data hostage. Advanced Threat Protection sanitises — without delay in delivery — as only the malicious active content is removed, allowing the file transfer to continue unhindered. This morph-free protection guards against today's leading malware and ransomware (i.e. CryptoLocker, CryptoWall, TorrentLocker, Dridex Dyre, BlackEnergy, etc.) and tomorrow's even more sophisticated threat variants. Block Sensitive Data from Being Shared. Prevent files with Personal Identifiable Information (PII) or other sensitive data from being transferred. GoAnywhere Threat Protection can inspect file contents, then stop and block files from being shared, based on policy. Redact Sensitive Information from Files Before Transfer. Ensure sensitive data is not transmitted or received. Detect or remove geotags, document properties, email addresses, or other metadata from documents, replacing sensitive text with asterisks. Detect and remove text contained in scanned images with Optical Character Recognition. Detect and remove offending content with text redaction. Encryption Isn’t Enough Encrypting sensitive file transfers is vital for ensuring the privacy and integrity of your data and complying with data governance regulations. However, while encryption can protect your files, you can do more to ensure your messaging security, by staying aware of what is being transmitted. Adding threat protection to GoAnywhere enables you to empower some senior individuals the power to transmit PII, while excluding others. Further, even if your transmission process is secure, you may want to audit who is sending what. The Secure ICAP Gateway enhances your encryption by limiting both who can transfer data, and what that data contains. Two Leading Solutions, Seamlessly Integrated The Clearswift Secure ICAP Gateway adds significant value to GoAnywhere MFT because of its threat protection, deep content inspection engine, adaptive data redaction, and flexible policy settings, while managed file transfer makes defining file movements a breeze. Additional features you can add to your file transfer process are structural sanitisation, document sanitisation, data redaction, anti-steganography, and optical character recognition. It’s the best and most thorough security for file transfers. Other Ways Clearswift Can Help You Integrating Clearswift’s core ICAP Gateway and threat protection with SFT can resolve gaps in your process and provide additional benefits. It can audit and control data in file transfers, for example, detecting when customer, employee, or patient records in a file are uploaded to SFT, counting the records, and maintaining an audit log of what data was shared with whom. When you add Clearswift solutions to your SFT instance, you get Lexical Expression Qualifiers, which can detect records based on multi-field matches, and trigger different actions based on number of records detected (e.g., audit, refer to sender, redact, block). Clearswift can also ensure you accept only the correct file types, by enforcing "True Type" controls which ensure you don't receive binaries, executables, scripts, or other unwanted file types. Clearswift solutions defend your system based on file byte pattern rather than by name. And, it works with nested files over 50 levels deep!

  • How to Boost Your Business with Advanced Workflows | GSA

    < News How to Boost Your Business with Advanced Workflows 18 Nov 2025 In today’s fast-paced digital environment, businesses rely heavily on secure, efficient file transfers to keep operations running smoothly. Yet many organisations continue to rely on outdated manual processes which are fragile, opaque, and prone to failure. You can avoid these downsides by automating your data workflows with an advanced Managed File Transfer (MFT) solution. The Problem with Legacy File Transfers Many companies still use legacy scripts or batch files created years ago by employees who have long since left. These scripts often run on personal devices or rely on manual execution, leaving businesses vulnerable when something goes wrong. Whether it’s a missed transfer due to someone being out sick or a failure that only becomes apparent when a customer complains, these systems are reactive rather than proactive. Even more sophisticated setups using schedulers like Control-M or Cron jobs still lack visibility and error handling. When a transfer fails, the first alert might come from a frustrated boss or a 2:30 a.m. page from IT support. This reactive model wastes time and erodes trust. Enter Advanced Workflows Advanced Workflows offer a smarter, more resilient approach. With platforms like GoAnywhere , the world’s most advanced MFT solution, users can build automated file transfer processes without needing deep programming skills. The interface enables you to drag and drop tasks into a project outline, define parameters, and schedule execution—all with built-in error handling and notifications. You can automate everything from pulling data from a database to encrypting it with PGP and securely transferring it via SFTP. If something goes wrong—perhaps due to a network issue, or a problem with an external service provider—the system can alert you immediately and attach detailed logs to help you pinpoint and troubleshoot issues before anyone else even notices. Key Features of Advanced Workflow Automation Component Library: GoAnywhere includes more than 150 pre-built tasks, including FTP, encryption, data translation, and cloud integration. You can connect to services like Salesforce, Jira, and ServiceNow with ease. Project Outline: Define the sequence of tasks—read from a database, write to a CSV, encrypt the file, and transfer it. Each step is configurable via dropdowns or parameters. Scheduling and Triggers: Schedule workflows to run at specific times or trigger them based on events like a successful file upload. You can even create holiday calendars to avoid running jobs on non-business days. Monitoring: Watch folders locally or remotely for new files, deletions, or changes. When an event occurs, automatically launch the appropriate workflow. Error Handling and Notifications: If a task fails, send an email with the job log attached. If successful, archive the output and notify stakeholders. A Real-World Example Imagine you need to send HR data to your HR services provider daily. With GoAnywhere’s simple drag-and-drop interface, you can automatically arrange the necessary tasks and schedule them to trigger automatically. Connect to your database and extract employee records. Write the data to a uniquely named CSV file. Encrypt the file using the recipient’s public PGP key. Transfer the file via SFTP. Send a confirmation email with logs and file attachments. No programming experience needed. Why You Need Advanced Workflows Advanced Workflows don’t just save time—they reduce risk, improve compliance, and enhance visibility. You’ll know when transfers succeed or fail, and you’ll have the tools to respond proactively. Plus, by centralising and automating these processes, you free up your team to focus on strategic tasks rather than firefighting. In short, if your business depends on file transfers, it’s time to stop the insanity of manual scripts and embrace the power of automation. Advanced Workflows are the key to boosting productivity, ensuring security, and staying ahead in a competitive landscape. Local Help for Oceania Businesses At Generic Systems Australia , we have decades of experience helping Australia and New Zealand business automate their workflows with the world’s leading MFT solution. If you’d like to discuss the potential for your business, please feel welcome to contact me for a no-obligation discussion. I can even organise a free Proof-of-Concept to show you how easily GoAnywhere can automate your organisation’s critical data transfers. At Generic Systems Australia, we’re your local experts in file transfer. Previous Next

  • Version 7.8.3 of GoAnywhere now available | GSA

    < News Version 7.8.3 of GoAnywhere now available 4 Aug 2025 A new version of the world's best Managed File Transfer software - GoAnywhere MFT v7.8.3 - has just been released. Generic Systems Australia customers can read about and access it via their customer portals. Previous Next

  • Cybercrime Incident Costs Triple for Australian Enterprises | GSA

    < News Cybercrime Incident Costs Triple for Australian Enterprises 21 Oct 2025 The latest Annual Cyber Threat Report from the Australian Cyber Security Centre (ACSC) revealed that the average cost of a cybercrime incident to large Australian businesses has more than tripled year on year. This alarming surge reflects not just the growing sophistication of cybercriminals, but also the expanding attack surface of enterprise systems and the rising stakes of data breaches in an increasingly digitised economy. Why Average Costs are Skyrocketing Several converging factors explain the dramatic escalation in financial impact. High-Value Assets : Large businesses hold vast troves of sensitive data — customer records, intellectual property, financial systems. These are prime targets for ransomware and data exfiltration. Cybercriminals are increasingly tailoring attacks to exploit these assets, demanding higher ransoms and causing deeper operational disruption. Supply Chain Vulnerabilities: Enterprises often rely on complex ecosystems of vendors, partners, and third-party platforms. A breach in one node can cascade across the network, amplifying the damage and complicating response efforts. Regulatory Penalties and Legal Exposure: Stricter data protection laws mean that businesses can incur hefty fines and legal liabilities for a breach. The reputational fallout can also erode customer trust and shareholder value. Extended Downtime and Recovery Costs : Cyber incidents often cripple critical infrastructure, leading to prolonged outages, lost productivity, and expensive recovery operations. For large businesses, even a few hours of downtime can translate into millions in losses. According to the ACSC, the average cost per incident for large organisations has surged from to over AUD $202,000 in just one year. It’s a stark reminder that reactive security is no longer sufficient. MFT: A Strategic Shield One of the most overlooked yet powerful tools in the cybersecurity arsenal is Managed File Transfer (MFT). Unlike ad hoc file sharing methods such as email attachments, cloud drives, or FTP, MFT provides a secure, auditable, and policy-driven framework for exchanging sensitive data. Here’s how MFT — such as the class leading GoAnywhere MFT — helps businesses reduce cybercrime exposure. End-to-End Encryption : MFT platforms encrypt data both in transit and at rest, ensuring that even if intercepted, the contents remain unreadable to unauthorised persons. Access Control and Authentication : Granular permissions, multi-factor authentication, and role-based access prevent unauthorised users from accessing or manipulating files. Automated Workflows and Monitoring : MFT systems can automate file transfers with built-in logging and alerts, reducing human error and enabling rapid detection of anomalies. Compliance and Audit Trails : MFT solutions often include detailed audit logs and compliance reporting features, helping organisations meet regulatory requirements and demonstrate due diligence in the event of an incident. Reduced Shadow IT : By centralising file transfers within a secure platform, MFT reduces the risk of employees using unapproved tools that bypass corporate security controls. From Reactive to Resilient As cyber threats grow in scale and complexity, large businesses need to shift from reactive defence to proactive resilience. This makes investing in secure infrastructure like Managed File Transfer more than a mere technical upgrade. GoAnywhere enables further resilience by providing High Availability and Failover through active-active clustering, enabling multiple GoAnywhere installations to work together in a distributed environment.  This way, if one node fails or is compromised, other nodes seamlessly continue processing file transfers and workflows, minimising downtime and maintaining service continuity.  The tripling of cybercrime costs is a wake-up call. By securing the channels through which data flows, organisations can close critical gaps, reduce breach likelihood, and contain the “blast radius” when incidents occur. In a landscape where every file could be a vector and every transfer a risk, MFT offers the control, visibility, and security that modern enterprises need. Standing By to Help At Generic Systems Australia , we’re Australia and New Zealand’s experts in helping business take advantage of GoAnywhere’s many capabilities. We’ve assisted dozens of organisations to make their file transfers resilient, secure and reliable — boosting their efficiency in the process. If you’d like to discuss how we can deliver these advantages to your organisation, please feel welcome to get in touch with me. I’m always happy to have an obligation-free chat and explain how easily we can transition you from your current approach to a new world of cyber security and productivity. At Generic Systems Australia, we’re your local experts in data transfer. Previous Next

  • Cyber Target Paris Prepares | GSA

    < News Cyber Target Paris Prepares 23 July 2024 As the attention of sports fans turns to Paris this week, so too are the nefarious attentions of the world’s cyber criminals. So: how will the world’s largest sporting event keep its data and systems secure…? Read on to learn more from those charged with defending the Summer Olympics’ IT systems. Miscreant Magnet Vincent Strubel, head of France’s national cybersecurity agency (ANSSI), warned that this year’s summer Olympics was facing an unprecedented level of cyber threats. Said Strubel: “There will be cyberattacks during the Games and the Paralympics... Some won’t be serious. Some will be serious, but won’t have an impact on the Games. And perhaps there will be some that are serious and liable to have an impact on the Games.” Franz Regul, head of the cyber team responsible for Paris 2024, said he expects the number of security events this year to be “multiplied by 10 compared to Tokyo”. There is a need to keep an exceptionally tight attack surface and tie up any loose ends like SSL misconfigurations, open ports, and privacy issues such as cookie consent violations. French anti-cybercrime units have classified the cyber threats in five categories: 1. Amateur Hackers As the “as-a-service” cybercrime economy develops, it’s become easier than ever for novice threat actors to launch more sophisticated attacks than their limited skillsets would otherwise have allowed. This lowered bar for entry will lead to a higher overall number of attacks. 2. Thrill-Seekers The sheer size and popularity of the Olympic Games will tempt those broadly inclined to create nuisance or show off their “cyber chops” to their peers. They’ll likely seek to exploit any security weaknesses in the websites or booking sites purposed for the event, including those of media organisations and sponsors. Common website security attacks such as cross-site scripting, SQL injection, and DDoS attacks will be their primary threat vector. 3. Hacktivists Activists passionate for their cause of choice are likely to attempt to hijack the world’s largest stage. 4. Black Hat Thieves The immense cashflow around the Paris Olympics makes them a potentially lucrative target for cyber thieves. Phishing attempts – expected to arrive in the form of unsolicited emails about the Games, lodging, tickets, or information followed by “helpful links” – will abound. Those who open the emails and click on the links may find their bank accounts quickly compromised. 5. Nation-State Actors The Olympics have long been a huge world stage on which global powers send political signals to countries, governments, and the world at large. As the Associated Press recently noted, “Among the most threatening cyber-adversaries are countries who might want to embarrass and exact costs on France and the International Olympic Committee.” Defending the Games French cybersecurity authorities are cagey about the significant precautions they’re taking to thwart cyber criminals. Revealing too much would give away a tactical advantage to blog-reading Black Hats. However, here’s what we know so far… 1. Ethical Hackers The ANSSI has hired ethical hackers to test the attack vectors on all Olympic websites. According to Strubel, 500 sites, competition venues and local collectives have all been put under “friendly fire”. 2. AI Artificial Intelligence is being employed to test for multiple threats across IT systems and websites. Regul said that AI was helping differentiate “between a nuisance and a catastrophe”. 3. Physical Security Transportation, supply chains, and surveillance systems are other potential targets for those seeking to compromise the Games. All have been included in the safety perimeter of the Paris 2024 cybersecurity preparations. 4. External Expertise The 2018 Winter Olympic Games were targeted by malware dubbed “Olympic Destroyer”, which aimed to disrupt the opening ceremony. Paris cybersecurity teams have tapped the knowledge and experiences of the consultants who detected and disabled that threat. A Bug Bounty program has also sought to attract the time and skills of independent IT practitioners. 5. Education & War Gaming During the past two years, ANSSI has been “war gaming” cyber incidents with the International Olympic Committees’ IT partners, and deploying cyber defence education programs across the thousands of people responsible for operating the Paris Games’ IT systems. No News will be Good News The final word on Paris’s cyber preparations belongs to Jérémy Couture, who helms the official cybersecurity hub of the Paris Olympic games. Couture said his dream for the Olympics is that technology and cybersecurity won’t be talked about - because that will mean they were a non-issue. Sports fans around the world will be hoping his dreams become reality. Need a Local Expert? If – like the Paris Games - you’d like to tap local expertise keep cyber criminals at bay, please feel welcome to contact me, Bradley Copson ( mailto:bradley@gensys.com.au ). I’m always happy to have an obligation-free discussion, explain how simply we can transition you from outdated software and approaches, and offer you a zero-cost Proof of Concept. At Generic Systems Australia , we’re your local experts in secure Managed File Transfer. #MFT #managedfiletransfer #securefiletransfer #sft #cybersecurity #datatransfer Previous Next

  • Accidental Accomplices…? | GSA

    < News Accidental Accomplices…? 21 May 2024 Are your employees your organisation’s biggest cybersecurity threat…? A recent experiment has found that many employees are still prone to leaving sensitive information vulnerable to cyberattacks - even when dealing with emails from an unknown sender. Testing the responses of employees around the world, Fortra found that 10.4% clicked a bogus message’s phishing link - up 3.4% over a similar test in the previous year. Global Worst Practice Alarmingly, the problem is worse in our region than anywhere else in the world, with 14.9% of Asia-Pacific employees succumbing to the phishing attempt. Also shocking was the number of bogus link clickers who then disclosed their passwords. 6 out of every 10 end users who clicked on the phishing email links failed to recognise the phishing website and exposed their organisation to cybertheft by sharing their password. The results of the experiment demonstrate the serious ongoing threat to local organisations posed by employees who are either uneducated on cybersecurity threats, or unmotivated to mitigate those risks. Protecting Your Organisation from Accidental Accomplices Clearly, ongoing employee education must be part of your defensive posture. But there are also key technical safeguards you can put in place to prevent your employees from becoming accidental accomplices to cybercriminals. Our SFT Threat Protection Bundle enables your organisation’s email system to automatically detect and prevent phishing links and other malware from entering your organisation. Combining the layered strengths of GoAnywhere MFT and Clearswift, it enables your team to receive and share information securely, without impairing their productivity. How It Works The SFT Threat Protection Bundle seamlessly integrates managed file transfer with advanced threat protection and adaptive data loss prevention to keep your sensitive data secure. It not only prevents malware from entering your organisation, it also prevents employees from losing or mishandling data. For example, if an employee knowingly (or unknowingly) attempts to share any files containing malware, those files are sanitised by having the malicious elements automatically removed. The SFT Threat Protection Bundle can also automatically detect and –– if you configure it to do so –– prevent employees from sharing sensitive information. For Example Let’s say a folder contains Word or PDF documents or Jpeg image files which contain Personally Identifiable Information (PII). If an employee starts to load any of these files into the Secure File Transfer web client, the Clearswift secure ICAP gateway will automatically inspect and block the file. If you prefer, the gateway can automatically redact (i.e. mask out) sensitive PII information from documents and image files, while still enabling the remainder of the file to be shared. Free Demo If you’d like to see first-hand how the SFT Threat Protection Bundle can help keep your organisation’s data safe, get in touch with me, Bradley Copson, and my technical team at Generic Systems Australia. We’re your local experts in secure managed file transfer. And if you’d like a copy of Fortra's Phishing Study Report, including broader advice on how to address your cybersecurity challenges – I’ll be more than happy to send you a copy. #mft #managedfiletransfer #sft #securefiletransfer #cybersecurity Previous Next

  • Australian Govt’s “Horizon 2” Comes Into View | GSA

    < News Australian Govt’s “Horizon 2” Comes Into View 5 Aug 2025 The Australian Government has invited input on the key policy and program outcomes the nation needs to achieve under the 2023 – 2030 Australian Cyber Security Strategy. Building on the momentum of the recently introduced Cyber Security Act 2024 , Minister for Cyber Security, Tony Burke MP, has released the Horizon 2 Policy Discussion Paper. It seeks feedback and input on key policies designed to enable Australia to: · Embed cyber messaging, cyber standards, capability and efforts. · Empower Australian businesses and citizens to protect themselves and become more resilient to cyber incidents. · Enhance cyber frameworks, workforce, and business ecosystem to drive further cyber security uplift. Consultation on the Discussion Paper is open to all levels of government, industry, educational institutions, community groups, and the Australian public. Submissions to can be made through the Department’s consultation webpage until 29 August 2025. Further industry co-design and Town Halls will also be held during the consultation process. Releasing the Discussion Paper, the Minister said: “We have made historic progress on cyber security but there is always more to do when confronting this evolving threat. Our government believes that all Australians have the right to be safe and feel safe, and cyber security is a critical part of that effort. “We’ve laid excellent foundations with Horizon 1 of the strategy and the passage of the Cyber Security Act – Horizon 2 will continue our progress towards our rightful place as a world leader on cyber security.” Submissions can be made through the Department’s consultation webpage until 29 August 2025. Previous Next

  • Ad-Hoc Filesharing Services Add Risk | GSA

    < News Ad-Hoc Filesharing Services Add Risk 27 May 2025 Make no mistake - unintentional errors by employees and supply chain partners are a leading cause of data breaches. The uncontrolled use of ad-hoc file sharing services (e.g. WeTransfer, Dropbox, Google Workspace, Cerberus FTP Server, and ShareFile) significantly increases the risk of employees making mistakes and for those mistakes to go unnoticed. Here then are seven reasons why organisations should reconsider their use of ad-hoc cloud file sharing services. 1. They may not enforce automatic file encryption. A key means of preventing your data falling into the wrong hands is to ensure it’s always encrypted, both in transit, as well as when it’s being stored. A secure Managed File Transfer (MFT) solution can automatically encrypt your data. 2. Dubious key and certificate management. Beyond encryption of the file being transferred, some cloud applications leave files open to malicious intent by failing to maintain strong keys and certificates. 3. They may create compliance gaps. Not all cloud platforms meet regulatory requirements around file transfers, leaving your organisation liable for financial, legal, and reputational damages. 4. Limited data control. Unsupervised file sharing and collaboration can lead to files being sent to or accessed by unauthorised individuals. With many cloud-based solutions, once files are transferred, there’s no ongoing control over their use. A secure MFT provides ongoing safeguards with tight controls on who can access, edit, and transfer files, and for how long. 5. No workflow automation. MFT solutions such as GoAnywhere MFT simplify and automate file transfer processes, with multi-step workflows to execute repetitive, manual tasks. "Projects" can be easily created by dragging and dropping modules which define business processes to seamlessly transfer files, eliminating the need for complicated scripting or programming. For example: a Project can be created to retrieve encrypted data from a server, decrypt it, read file contents and submit them to a downstream internal application. The file can also be altered, added to, re-encrypted, and then sent to another external SFTP server. 6. Lack of centralised user management. Cloud file sharing solutions may not provide a comprehensive and easy to use dashboard for administrators to control access, authentication, and encryption of sensitive files. The more tools and applications that must be coordinated, the greater the risk of human or systems error. A robust MFT solution manages all types of file-send situations, including ad-hoc emails, large files, and batch files. 7. Threat detection and management. Protecting your organisation from viruses, malware, ransomware, Advanced Persistent Threats, and banned media types requires constant vigilance. Our Advanced Threat Protection can automatically block these threats and remove the element of human error from your risk profile. Local Expertise Available If you’d like to discuss removing the risk of ad-hoc file sharing applications from your organisation, please feel welcome to contact me . I’m always happy to have an obligation-free discussion, demonstrate the capabilities of the world’s most advanced MFT, and even offer you a zero-cost Proof of Concept. At Generic Systems Australia , we’re your local experts in secure Managed File Transfer. Previous Next

  • How GoAnywhere integrates with your Hybrid Cloud | GSA

    < News How GoAnywhere integrates with your Hybrid Cloud 2 Oct 2025 Recent research by IMARC Group and Forrester shows Australian organisations increasingly using Hybrid Cloud as a strategic bridge between legacy systems and modern cloud-native applications. Hybrid Cloud enables them to modernise without abandoning critical infrastructure. By integrating on-premises environments with public cloud platforms, businesses can maintain control over sensitive or complex legacy workloads while gradually introducing scalable, agile cloud-native services. This duality enables seamless data flow, API-driven interoperability, and phased migration strategies—essential for industries bound by compliance or technical debt. GoAnywhere MFT — the world’s leading Managed File Transfer solution — facilitates businesses on this path by offering “ Cloud Connectors ” that seamlessly integrate GoAnywhere with external cloud services. Also referred to as “cloud integrations”, Cloud Connectors offer out-of-the-box connectors for GoAnywhere to popular services including Salesforce, SharePoint Online, Microsoft Dynamics 365, Box, and Dropbox. For example: One a trading partner might ask you to share an important file it via a folder in Dropbox. Or perhaps there are contacts or billing information to be updated automatically in Salesforce. GoAnywhere’s Cloud Connectors enables these tasks to be done easily and securely. Broad Range Cloud Connectors are easily downloaded from GoAnywhere MFT’s integrated Marketplace, which features Connectors for the most commonly used cloud services. These include: • Alibaba Object Storage Service • Amazon Cloud Trail, CloudWatch, EC2, Lambda, SNS, and SQS • Atlassian JIRA • Automate Plus • Azure Data Lake Storage Gen1 (superseded by Gen2) and Storage Queue • Box • Citrix ShareFile • Dropbox • Egnyte • GateScanner CDR • GoAnywhere Command • Google Cloud Storage, Drive, and Translate • JAMS • Jenkins • Microsoft Dynamics 365 Business Central, 365 CRM, OneDrive, Sharepoint Online and Sharepoint On-Premise • OPSWAT MetaDefender • Salesforce • ServiceNow • SMA OpCon Scheduler • SOS Berlin JobScheduler (Online version not supported) • Trello • Veeva CRM • Votiro • Webdocs • Zendesk (Online version not supported) Configuring Cloud Connectors Once a Cloud Connector is installed, its connection properties can be configured as a GoAnywhere Resource. This only needs to be performed once, and can then be seamlessly reused in any workflows and cloud file transfers. A Cloud Connector definition contains the various actions required to communicate with cloud applications. For example: authentication logging file transfer file management and error handling. In GoAnywhere, these actions appear as elements located under the Cloud Connector in the GoAnywhere Project Designer. Elements can be incorporated into a business’s workflows alongside other project tasks, and processes can even be automated between multiple web and cloud services at once. New GoAnywhere connectors can be downloaded without needing to update the software. No Connector? No problem While GoAnywhere Marketplace contains a broad array of Cloud Connectors, you may also want to connect to a unique external service. Custom connectors are the answer. And at Generic Systems Australia, we can design and develop Custom Connectors for you, using GoAnywhere’s Cloud Connector Designer. If you’d like to discuss how your organisation’s file transfers to external cloud providers can be made more efficient and secure, please feel welcome to get in touch with me. I’m always happy to have an obligation-free discussion, explain how easy it is to transition to an improved file transfer approach, and offer you a zero-cost Proof of Concept. At Generic Systems Australia , we’re your local experts in Managed File Transfer. Previous Next

  • GoAnywhere V7.7 released – with Fortra Threat Brain protection | GSA

    < News GoAnywhere V7.7 released – with Fortra Threat Brain protection 13 Dec 2024 Great news for our GoAnywhere MFT customers, with your software now able to leverage insights from Fortra Threat Brain to further protect your managed file transfers. Fortra Threat Brain is a comprehensive cyber security information hub, fed by telemetry from the Fortra’s expansive portfolio of products as well as insights from across the dark web, social media, and law enforcement. It brings together a team of threat intelligence analysts and partners, an expansive portfolio of AI-enabled cybersecurity products, and a vast array of intelligence sources, to provide even stronger protection for your valuable data. The up-to-date threat intelligence from Fortra Threat Brain enables GoAnywhere to reject HTTP/S service connections flagged as malicious. That includes connections to GoAnywhere’s Web Client, AS2, AS4, and any other endpoints that run on the HTTPS service. Extended file transfer protection is just one of many enhancements available in GoAnywhere Version 7.7, now released to customers for download. (And if you’d like our help with upgrading, be sure to check out our GSA Annual Upgrade & Health Check Service .) Previous Next

bottom of page