top of page

Search Results

184 results found with an empty search

  • Secret Ransomware Payments Rife: Survey | GSA

    < News Secret Ransomware Payments Rife: Survey 19 Aug 2024 Pervasive cyberattacks are leading most companies to pay ransoms and break their “Do Not Pay” policies, according to recent research. A poll of IT and security decision-makers conducted by Cohesity found that that most companies have paid a ransom in the last two years. In fact, 79% of respondents said their company had been the victim of a ransomware attack during the second half of 2023. The breadth of an organisation’s “attack surfaces” depends on the size and scope of its data environments. However, 78% of respondents said their data security risk had increased faster than the growth in the data they manage. They also said their organisation’s cyber resilience and data security strategies had not kept pace with emerging threats – only 21% had full confidence in their company’s cyber resilience strategy. Slow Recovery, Lack of Testing Cyber resilience is a critical element of business continuity, and encompasses a company’s ability to recover their data and restore business processes when they suffer a cyberattack or IT outage. Key insights from the survey on this point included: All respondents said they need more than 24 hours to recover data and restore business processes. Only 7% said their company could recover data and restore business processes within 1-3 days. 35% said they could recover and restore in 4 to 6 days, while 34% need 1-2 weeks, and 23% need more than 3 weeks. Only 12% of those surveyed said their company had stress-tested their data security, data management, and data recovery processes or solutions in the six months prior to being surveyed. 46% hadn’t tested in more than 12 months. Secret Ransom Payments While 84% had a “do not pay” policy, Cohesity reported that 94% of respondents divulged that their company would pay a ransom to recover data and restore business processes. 5% said “maybe, depending on the ransom amount”. Two thirds said their company would be willing to pay over US$3M to recover data and restore business processes, and a third said their company would be willing to pay over $5M. Don’t Pay: Prevent! The volume, frequency, and sophistication of ransomware attacks will only increase. And paying ransoms only encourages cyberthieves to escalate their efforts. Worse, if ransoms are seen as “easy money”, new miscreants will be tempted to acquire ransomware tools from the dark web and join the cyber crimewave. Rather than investing in ransoms, organisations need to invest in their cyber resilience. That starts with keeping thieves at bay - protecting valuable data where it is stored, and when it is transferred – and building organisational capability in rapidly responding to and recovering from cyberattacks. Building cyber resilience need not be a drag on an organisation’s efficiency. Automation can ensure data is protected at rest and in motion, requiring little to no manual management. For example, Managed File Transfer (MFT) solutions such as the class-leading GoAnywhere MFT encrypt data at rest and in transit, complying with the highest data security standards (including the US’s and Europe’s HIPAA, HITECH, PCI DSS, SOX, and GDPR). MFT manages inbound and outbound file transfers across an organisation, using industry-standard file transfer protocols such as SFTP, FTPS, and AS2 to send files securely, and encryption standards such as Open PGP and AES to protect data in transit and at rest. Advanced Threat Protection and Adaptive Loss Prevention add a further layer of defence. SFT Threat Protection enables safe collaboration with external parties, preventing malware from entering your organisation, and reducing opportunities for employees to lose or mishandle sensitive data. Local Expertise Ready to Help Generic Systems Australia are your local experts in Managed File Transfer and Advanced Threat Protection. We’ve assisted hundreds of organisations across the Asia-Pacific region to secure their data, keep cybercriminals at bay… and keep ransomware off the books. If you’d like to discuss improving your cybersecurity, please feel welcome to contact me , Bradley Copson. I’m always happy to have an obligation-free discussion, explain how simply we can transition you from outdated software and approaches, and offer you a zero-cost Proof of Concept. About the survey: Cohesity’s findings are based on a survey of 902 IT and Security decision-makers (split as close to 50:50 as possible) commissioned by Cohesity and conducted by Censuswide. Survey respondents were polled from businesses in Australia, the United Kingdom, and the United States. The top five industries selected by respondents as best representing the industry their company operates in were: IT & Telecommunications, Finance, Healthcare, Finance, HR, and Manufacturing & Utilities. Previous Next

  • Australian Govt’s “Horizon 2” Comes Into View | GSA

    < News Australian Govt’s “Horizon 2” Comes Into View 5 Aug 2025 The Australian Government has invited input on the key policy and program outcomes the nation needs to achieve under the 2023 – 2030 Australian Cyber Security Strategy. Building on the momentum of the recently introduced Cyber Security Act 2024 , Minister for Cyber Security, Tony Burke MP, has released the Horizon 2 Policy Discussion Paper. It seeks feedback and input on key policies designed to enable Australia to: · Embed cyber messaging, cyber standards, capability and efforts. · Empower Australian businesses and citizens to protect themselves and become more resilient to cyber incidents. · Enhance cyber frameworks, workforce, and business ecosystem to drive further cyber security uplift. Consultation on the Discussion Paper is open to all levels of government, industry, educational institutions, community groups, and the Australian public. Submissions to can be made through the Department’s consultation webpage until 29 August 2025. Further industry co-design and Town Halls will also be held during the consultation process. Releasing the Discussion Paper, the Minister said: “We have made historic progress on cyber security but there is always more to do when confronting this evolving threat. Our government believes that all Australians have the right to be safe and feel safe, and cyber security is a critical part of that effort. “We’ve laid excellent foundations with Horizon 1 of the strategy and the passage of the Cyber Security Act – Horizon 2 will continue our progress towards our rightful place as a world leader on cyber security.” Submissions can be made through the Department’s consultation webpage until 29 August 2025. Previous Next

  • Why It’s Worth Migrating to a Better MFT | GSA

    < News Why It’s Worth Migrating to a Better MFT 9 Dec 2025 Is your existing Managed File Transfer (MFT) solution failing to keep pace with modern security, efficiency and budgetary needs? Companies whose existing MFT solution no longer meets modern security, compliance, or usability needs should consider trading up to the world’s leading MFT solution, GoAnywhere MFT . GoAnywhere MFT makes migration straightforward with dedicated tools and services. The Case to Replace Organisations rely on Managed File Transfer to securely exchange sensitive data with partners, customers, and internal systems. However, some legacy solutions struggle to keep pace with today’s demands. Common reasons for replacement include: Volume Pricing Gotchas: some MFTs lure customers with seemingly low initial prices, only to rapidly increase costs as the number of users, or the amount and size of transfers, increase. Budgeting becomes difficult as their MFT licence grows ever more costly. Security Gaps: Some MFT tools lack advanced encryption, secure protocols, or modern authentication methods, leaving organisations exposed to cyber threats. New Compliance Requirements: Increasing government and industry regulation requires auditable, automated file transfer processes. Some MFT systems fall short in providing detailed logging and compliance reporting. Inefficiencies: Maintaining outdated solutions can be costly, requiring manual scripting and complex workarounds. This slows down IT teams and increases the risk of human error. Inadequate Scalability: As businesses grow, file transfer volumes increase. Legacy solutions may not scale effectively, leading to bottlenecks and downtime. Poor User Experience: Modern enterprises expect intuitive interfaces and automation. If the current solution is cumbersome, adoption and productivity suffer. Why GoAnywhere MFT? GoAnywhere MFT is a secure, automated, and user-friendly platform designed to address the deficiencies of competitor MFTs. It offers: Transparent pricing with no surprises as user volumes increase. The licencing model is Server/Node based and has been since the solution’s inception. Centralised management of all file transfers, reducing complexity. Automation features like scheduling, alerting, and workflows to eliminate manual intervention. High availability and scalability , ensuring reliable performance even under heavy loads. Compliance-ready reporting with detailed audit trails. Integration capabilities with cloud services, APIs, and enterprise applications. Easy Migration A common concern of companies considering a switch to a better MFT is the potential for disruption. But at Generic Systems Australia, we alleviate this directly through our comprehensive Migration Services . Our technical experts can quickly and efficiently install GoAnywhere MFT and then configure it to replace all your existing scripts, integration packages and other file transfer middleware. This way, you and your team can keep on doing what you do best – free of distractions – while we do what we do best. Our Migration Services enable you to transition from outdated, inefficient or expensive solutions without risking operational delays. Whether transitioning from in-house processes or another MFT vendor, GoAnywhere provides a structured path to adoption. Make the Move With GoAnywhere MFT from Generic Systems Australia, migration is not only achievable but also streamlined through expert guidance and automation – all available from local technical experts who are the best in their field. At Generic Systems Australia, we’re Oceania’s experts in File Transfer solutions. Previous Next

  • Cyber Target Paris Prepares | GSA

    < News Cyber Target Paris Prepares 23 July 2024 As the attention of sports fans turns to Paris this week, so too are the nefarious attentions of the world’s cyber criminals. So: how will the world’s largest sporting event keep its data and systems secure…? Read on to learn more from those charged with defending the Summer Olympics’ IT systems. Miscreant Magnet Vincent Strubel, head of France’s national cybersecurity agency (ANSSI), warned that this year’s summer Olympics was facing an unprecedented level of cyber threats. Said Strubel: “There will be cyberattacks during the Games and the Paralympics... Some won’t be serious. Some will be serious, but won’t have an impact on the Games. And perhaps there will be some that are serious and liable to have an impact on the Games.” Franz Regul, head of the cyber team responsible for Paris 2024, said he expects the number of security events this year to be “multiplied by 10 compared to Tokyo”. There is a need to keep an exceptionally tight attack surface and tie up any loose ends like SSL misconfigurations, open ports, and privacy issues such as cookie consent violations. French anti-cybercrime units have classified the cyber threats in five categories: 1. Amateur Hackers As the “as-a-service” cybercrime economy develops, it’s become easier than ever for novice threat actors to launch more sophisticated attacks than their limited skillsets would otherwise have allowed. This lowered bar for entry will lead to a higher overall number of attacks. 2. Thrill-Seekers The sheer size and popularity of the Olympic Games will tempt those broadly inclined to create nuisance or show off their “cyber chops” to their peers. They’ll likely seek to exploit any security weaknesses in the websites or booking sites purposed for the event, including those of media organisations and sponsors. Common website security attacks such as cross-site scripting, SQL injection, and DDoS attacks will be their primary threat vector. 3. Hacktivists Activists passionate for their cause of choice are likely to attempt to hijack the world’s largest stage. 4. Black Hat Thieves The immense cashflow around the Paris Olympics makes them a potentially lucrative target for cyber thieves. Phishing attempts – expected to arrive in the form of unsolicited emails about the Games, lodging, tickets, or information followed by “helpful links” – will abound. Those who open the emails and click on the links may find their bank accounts quickly compromised. 5. Nation-State Actors The Olympics have long been a huge world stage on which global powers send political signals to countries, governments, and the world at large. As the Associated Press recently noted, “Among the most threatening cyber-adversaries are countries who might want to embarrass and exact costs on France and the International Olympic Committee.” Defending the Games French cybersecurity authorities are cagey about the significant precautions they’re taking to thwart cyber criminals. Revealing too much would give away a tactical advantage to blog-reading Black Hats. However, here’s what we know so far… 1. Ethical Hackers The ANSSI has hired ethical hackers to test the attack vectors on all Olympic websites. According to Strubel, 500 sites, competition venues and local collectives have all been put under “friendly fire”. 2. AI Artificial Intelligence is being employed to test for multiple threats across IT systems and websites. Regul said that AI was helping differentiate “between a nuisance and a catastrophe”. 3. Physical Security Transportation, supply chains, and surveillance systems are other potential targets for those seeking to compromise the Games. All have been included in the safety perimeter of the Paris 2024 cybersecurity preparations. 4. External Expertise The 2018 Winter Olympic Games were targeted by malware dubbed “Olympic Destroyer”, which aimed to disrupt the opening ceremony. Paris cybersecurity teams have tapped the knowledge and experiences of the consultants who detected and disabled that threat. A Bug Bounty program has also sought to attract the time and skills of independent IT practitioners. 5. Education & War Gaming During the past two years, ANSSI has been “war gaming” cyber incidents with the International Olympic Committees’ IT partners, and deploying cyber defence education programs across the thousands of people responsible for operating the Paris Games’ IT systems. No News will be Good News The final word on Paris’s cyber preparations belongs to Jérémy Couture, who helms the official cybersecurity hub of the Paris Olympic games. Couture said his dream for the Olympics is that technology and cybersecurity won’t be talked about - because that will mean they were a non-issue. Sports fans around the world will be hoping his dreams become reality. Need a Local Expert? If – like the Paris Games - you’d like to tap local expertise keep cyber criminals at bay, please feel welcome to contact me, Bradley Copson ( mailto:bradley@gensys.com.au ). I’m always happy to have an obligation-free discussion, explain how simply we can transition you from outdated software and approaches, and offer you a zero-cost Proof of Concept. At Generic Systems Australia , we’re your local experts in secure Managed File Transfer. #MFT #managedfiletransfer #securefiletransfer #sft #cybersecurity #datatransfer Previous Next

  • Why Your Business Can't Rely on Employee Cybersecurity Training | GSA

    < News Why Your Business Can't Rely on Employee Cybersecurity Training 29 Oct 2025 The employee cyber security training programs implemented by most large companies don’t reduce the risk of their employees falling for phishing scams. That’s the shocking conclusion of recent research evaluating the effectiveness of two common types of cybersecurity training.  Phishing is a deceptive tactic in which attackers impersonate trusted entities to trick individuals into revealing sensitive information like passwords, credit card numbers, or personal data.  It continues to be the most common form of cyber attack, and leads to the greatest number of cyber infiltrations. Testing the Defences To test the effectiveness of anti-phishing training, researchers sent 10 different phishing email campaigns to 19,500 employees at UC San Diego Health over an eight month period.  They found that there was no significant relationship between whether an employee had recently completed mandated cybersecurity training and whether they then fell victim to a phishing email. Researchers also tested whether sharing anti-phishing information after an employee fell for a phishing scam improved the employee's ability to detect a subsequent phishing attempt. However, once again, they observed very little difference in repeat failure rates. In fact, embedded phishing training only reduced the likelihood of an employee clicking on a phishing link by a mere 2%. Why training fails Research study co-author Grant Ho said a key reason the anti-phishing training isn’t effective is that most employees don’t engage with embedded training materials.  75% of users in the study engaged with embedded training materials for a minute or less, and a third closed embedded training pages immediately, without reading them. He recommended that organisations refocus their efforts to combat phishing on technical countermeasures. Technical Countermeasures One of the first and best lines of defence against phishing is to prevent malware and suspicious links before they can reach employees’ devices.  At Generic Systems Australia we combine the world’s leading Managed File Transfer solution, GoAnywhere , with Advanced Threat Protection to deliver a proactive, multilayered defence against both external threats and internal data leakage.  GoAnywhere provides secure encryption, access controls and audit trails for file transfers, while ATP enables your organisation’s email system to automatically detect and prevent phishing links and other malware from entering your organisation. Here to Help At Generic Systems Australia we have decades of experience helping Australian and New Zealand organisations protect themselves against malware and other cyber attacks. Our Migration Service makes the transition even easier for organisations who prefer to let their team get on with their regular work rather than taking time out to improve their IT plumbing. If you’d like a no-cost, no-obligation discussion about how we could help you simply and affordably adopt an advanced MFT and ATP solution, please feel welcome to get in touch with me. At Generic Systems Australia, we’re your local experts in Secure Managed File Transfer. Previous Next

  • Accountability Gap Creates Cyber Risk | GSA

    < News Accountability Gap Creates Cyber Risk 22 Oct 2024 New research has revealed a concerning gap in accountability for cyber security in many Australian organisations. Security firm Trend Micro polled 100 Australian IT leaders to better understand their attitudes toward Attack Surface Risk Management. They found that most organisations lacked clear leadership buy-in and sufficient resources to measure and mitigate cyber risks. The top three gaps in cyber resilience were: Insufficient staffing for round-the-clock cybersecurity coverage. Inadequate techniques to measure and manage attack surface risks. Not using proven regulatory and other frameworks, such as the NIST Cybersecurity Framework. Only 37% of those surveyed said their organisation had satisfactorily closed each of these exposures. The buck stops… nowhere? Seeking root causes for unclosed gaps in organisational cyber resilience, Trend found that the failures could be traced back to a lack of leadership and accountability at the top of the organisation. More than a third of respondents claimed their leadership didn’t consider cybersecurity to be their responsibility. When asked who does or should hold responsibility for mitigating business risk, respondents gave a variety of answers, indicating a lack of clarity on reporting lines. Nearly a third (32%) said the buck stopped with organisational IT teams. Trend spokesperson, Srujan Talakokkula, said the “lack of clear leadership on cybersecurity, can have a paralysing effect on an organisation, leading to reactive, piecemeal and erratic decision making”. “A lot of that comes down to collaboration and communication across the business,” he said. “Companies need CISOs to clearly communicate in terms of business risk to engage their boards. “Ideally, they should have a single source of truth across the attack surface from which to share updates with the board, continually monitor risk, and automatically remediate issues for enhanced cyber-resilience,” he added. ASIC Cracking Down Trend’s warning comes on the heels of reports that Australia’s corporate regulator is preparing legal actions against some company directors for their lack of governance relating to cyberattacks. ASIC has previously cautioned directors that they need to prepare for hacks, and that sanctions would be applied to those who didn’t. They told The Australian Financial Review that companies wouldn’t get away with paying lip service to cyber defence and must provide evidence they had performed their duties if their organisation was breached by cybercriminals. “With one cyberattack reported every six minutes in Australia, ASIC’s message for directors is to make sure your organisations have appropriate cybersecurity measures in place – this is your responsibility,” a spokesperson said. Not just “an IT Issue” ASIC’s heightened investigations show that cyber security is no longer a fringe issue that can be relegated to technical staff. However, a survey of in-house lawyers by Herbert Smith Freehills recently found many boards are not yet engaged on the topic of cyber resilience. 58% said it would take an actual cyberattack to motivate their organisation to meaningfully improve their data risk management. Owning and managing the risk Rather than letting cyber resilience slip between the cracks in org charts, directors need to put cyber resilience at the top of their companies’ board agendas. Executive management should be requested to report on the measures and investments they’re making to keep cyber thieves at bay. A Managed File Transfer (MFT) solution such as the class-leading GoAnywhere MFT can encrypt data at rest and in transit, complying with the highest data security standards. It manages inbound and outbound file transfers across an organisation, using industry-standard file transfer protocols and encryption to protect data in transit and at rest. Advanced Threat Protection and Adaptive Loss Prevention add a further layer of defence. SFT Threat Protection enables safe collaboration with external parties, preventing malware from entering an organisation, and reducing the risk of employees losing or mishandling sensitive data. Local Experts On Hand Generic Systems Australia are local experts in Managed File Transfer and Advanced Threat Protection. We’ve assisted hundreds of organisations across the Asia-Pacific region to secure their data and keep cybercriminals at bay. If you’d like to discuss how we can help improve your company’s cybersecurity, please feel welcome to contact me , Bradley Copson. I’m always happy to have an obligation-free discussion, explain how simply we can transition you from outdated software and approaches, and offer you a zero-cost Proof of Concept. Previous Next

  • About Us | GSA

    About Generic Systems Australia Your local experts in Secure Managed File Transfer Technology Our Story We are independent experts in data transfer - more than just software suppliers. Our curated suite of industry-leading solutions, coupled with our unparalleled experience and expertise, have made us the Asia-Pacific region’s most trusted partners in secure Managed File Transfer technologies. Founded in 1993, we’re proud to count among our clients some of the region’s most iconic brands. Leveraging our unique skills and readily available local support, they rely on us to optimise their IT systems, hone their business processes and integrate their supply chains. A long-term partner of Fortra (formerly Help Systems, and Linoma Software, the original authors of GoAnywhere MFT), we’ve been the Asia-Pacific's regional distributor of the industry leading GoAnywhere MFT suite since 2007. Our in depth understanding of the product’s Advanced Workflows , data translation, auditing and compliance, automation and security enables us to rapidly devise optimal solutions, provide rapid Proofs of Concept, and move ahead quickly with implementation. We have exclusively managed APAC deployments for some of the largest multinational corporations, Government departments and small- to medium-sized businesses as well. Our local technical support service provides our clients with the reassurance that local help will always be on-hand. Generic Systems Australia is a values-led organisation. Our long-term commitment to doing business ethically, being the absolute best at what we do, and keeping our customers’ needs always at the fore, is the foundation of our enduring success. Our company was founded on that principle 30 years ago and continues to this day. If you’re exploring how to boost your efficiency and bottom line by leveraging Secure Managed File Transfer technology, reach out to our Business Manager, Bradley Copson, for an obligation-free discussion. Our People Bradley Copson Business Manager Expert in enhancing organisational effectiveness and efficiency through Managed File Transfer technologies. "My understanding of contemporary business challenges, coupled with my early career experience leading IT operations and support functions, enable me to advise clients from a perspective that’s both business-minded and IT-pragmatic. “By approaching each engagement ethically, assigning technical experts who consistently deliver professional services of the highest quality, and keeping my client’s best interests always at the fore, I’ve been entrusted with opportunities to manage many of our region’s most iconic brands.” Simon Kuenstner Solutions Architect Managed File Transfer Expert "Three decades of experience as a solutions architect enable me to quickly chart a course through any maze of legacy systems and manual processes, to design and implement secure MFT solutions which empower clients to work smarter, smoother and more efficiently. "I love to explore with clients how GoAnywhere can be used in new ways to further boost their business’s bottom line.” Schedule a call with us today!

  • MFT: Not Just Your First Line of Cyber Defence | GSA

    < News MFT: Not Just Your First Line of Cyber Defence 16 Sept 2025 Every organisation serious about protecting its data will likely come to view a Managed File Transfer (MFT) solution as one of their first lines of defence. Employing MFT as the standard when exchanging data puts organisations light years ahead of businesses still relying on risky File Transfer Protocol and email to transfer files. MFT platforms not only centralise – and therefore, control - data transfer, they also enable companies to apply comprehensive policies which protect data. Data can be insulated from threats as diverse as inbound malware to careless employees entrusting files to external platforms beyond an organisation’s direct control, such as Google Drive and Dropbox. Critical protection policies, such as those encompassing encryption, monitoring, and auditing capability, can be enforced. High Volume = High Exposure In 2024, businesses were responsible for generating around 30% of the world’s data—an astonishing ~44.1 zettabytes. That included data such as transaction records, CRM logs, ERP systems, IoT sensor data from manufacturing and logistics, internal communications, analytics, and cloud backups, AI training datasets and other enterprise software usage. But as the volume of data used and consumed by businesses grows, so too does the cost and impact of potentially losing that data. The high ransoms now regularly being paid to cyberthieves amply demonstrate just how valuable business data has become. Surely it makes more sense to invest in a relatively inexpensive protective technology like MFT, than to lose equivalent funding — or greater — in the form of ransoms paid to cyber thieves? Lessons from Bankers Banks, traditional repositories of valuables from cash, precious metals and sensitive documents, have learned a lot over the years about protecting assets. And their learnings are relevant to how we should be protecting our valuable data. Banks no longer store our valuables in a single bank vault. Nor for that matter do they store our digital currency on a single server. Rather, banks protect our precious assets — physical and digital — behind layers of security. Physical valuables sit behind physical barriers, multiple locks, access control systems, remote monitoring and security guards. Digital valuables are protected against threats such as malware, ransomware, accidental data loss, third-party exposure, and zero-day attacks by a broad array of technologies. Sitting beneath those technologies, ensuring they’re enforced and providing a sound bedrock of centralised control, surveillance and auditing, is MFT. Adding Layered Defence At Generic Systems Australia we’re adept at installing and maintaining the world’s leading MFT, GoAnywhere . And our Advanced Threat Protection (ATP) bundle significantly enhances GoAnywhere’s data protection capabilities by introducing a proactive, multilayered defence against both external threats and internal data leakage. While GoAnywhere already provides secure encryption, access controls, and audit trails for file transfers, the ATP bundle adds dynamic inspection and sanitisation that targets the content itself—not just the container. At the heart of this integration is the Clearswift Secure ICAP Gateway, which enables deep content inspection and adaptive Data Loss Prevention (DLP). This means every file transferred through GoAnywhere can be scanned for malware, embedded scripts, macros, and other active content that could compromise systems. Unlike traditional antivirus tools, ATP sanitises files in real time—removing only the malicious elements while allowing legitimate content to pass through uninterrupted. Limiting Exposure Beyond malware, the ATP Bundle also addresses sensitive data exposure. It can detect and block files containing personally identifiable information (PII), financial records, or confidential metadata before they’re shared externally. Policies can be set to redact sensitive text, strip geotags and even apply optical character recognition (OCR) to scanned documents to catch hidden data. This empowers organisations to enforce granular control over who can transmit sensitive content and under what conditions—adding a layer of governance that encryption alone cannot provide. In essence, the ATP Bundle transforms GoAnywhere from a secure conduit into an intelligent gatekeeper. It doesn’t just move data safely—it understands what’s inside, evaluates its risk, and ensures that only clean, compliant content reaches its destination. Modular Enhancements Augmenting GoAnywhere’s capabilities are Modules which can further protect an organisation from the inherent risks of legacy protocols such as SFTP/FTPS, email attachments and manual processes. SFTP Server can be upgraded to by GoAnywhere SFTP Server Module, enabling SSH-encrypted transfer with centralised access control, audit logging and integration with Active Directory. FTPS Server can be upgraded to FT Module, offering SSL/TLS encryption, customisable access, and DMZ-safe deployment via GoAnywhere Gateway. HTTPS Web Uploads can be replaced by the Secure Folders Module to create browser-based file access with HTTPS encryption and user authentication. AS2/AS4/PeSIT can be replaced by Certified Protocol Modules, providing Retail and banking-grade secure exchange with Drummond certification. These modules consolidate disparate protocols into a single, scalable platform—reducing complexity, improving visibility, and enforcing consistent security policies across all transfers. Making Email Secure Email is ubiquitous. However, it's also one of the least secure ways to transmit sensitive data. Fortra’s Secure Mail module in GoAnywhere transforms ad-hoc file sharing into a secure, trackable process without disrupting user workflows. Using Secure Mail, Users send files as secure encrypted packages via their browser or an Outlook plugin. Recipients receive a unique link to download via HTTPS — no files are sent directly via email. Senders can set expiration dates, download limits, and password protection, and all activity is logged for auditability and compliance. Secure Mail keeps files on your infrastructure until accessed, eliminating third-party hosting risks and ensuring full control over sensitive data. Strategic Defence By replacing legacy protocols and insecure email practices with GoAnywhere’s modular architecture, organisations gain: • Unified governance over all file transfers; • Reduced attack surface via DMZ-safe deployment; • Improved compliance with GDPR, HIPAA, PCI DSS; and • Streamlined user experience without sacrificing security. Here to Help At Generic Systems Australia we have decades of experience helping Australian and New Zealand organisations protect themselves against malware and other cyber attacks through the power of the world’s leading MFT solution. Our Migration Service makes the transition even easier for organisations who prefer to use their resources building their businesses rather than improving their IT plumbing. If you’d like a no-cost, no-obligation discussion about how we could help you simply and affordably adopt an advanced MFT solution, please feel welcome to get in touch with us. At Generic Systems Australia, we’re your local experts in Secure Managed File Transfer. Previous Next

  • Migration Services | GSA

    MIGRATION SERVICES Had enough of creating and maintaining clunky scripts? Dissatisfied with your current managed file transfer solution? Worried about disrupting your business while making the switch? We make switching to GoAnywhere MFT Easy! Are you planning to move from your current in-house file transfer processes, or moving up from your old MFT solution to the class-leading MFT, Fortra's GoAnywhere MFT ? Migrating from old approaches to the latest MFT need not be complicated or disruptive. At Generic Systems Australia, we have experts, tools and decades of experience which enable us to do the work for you –– quickly, easily and affordably. When you take advantage of our Migration Services, we take care of each step of the process, from evaluating your current configuration to building and executing a migration plan. You can relax and get on with running your business, secure in the knowledge that your transition to GoAnywhere MFT will be as seamless and efficient as possible. Contact Us How we can help? Give Your Outdated Scripts the Flick File transfer scripts can be clunky, risky and time-consuming to maintain. Before we deploy GoAnywhere MFT for you, we can take stock of all the ways your team is transferring files, and quickly build automated workflows that replace your scripts with file transfers that are robust, secure, automated and auditable. Migrating from other file transfer products to the world’s leading MFT As our region’s local experts in managed file transfer, we’ve successfully migrated dozens of customers from lesser MFT products to GoAnywhere MFT, the world’s leading MFT solution. We can do the same for you… evaluating your current setup (processes, workflows, and file transfers) and then working with you to create a robust migration path to all the security and efficiency that a GoAnywhere environment provides. Connecting to Clouds We can help you seamlessly integrate GoAnywhere with external services via Cloud Connectors. These enable you to easily and securely transfer files between your organisation and external cloud services and applications. Cloud Connectors offer out-of-the-box connectors for GoAnywhere to a range of popular services including Salesforce, SharePoint Online, Microsoft Dynamics 365, Box, and Dropbox. And should you ever need to connect to a custom cloud, we can do that for you, too. At Generic Systems Australia, we can design and develop your own Custom Cloud Connectors for you, taking advantage of GoAnywhere’s Cloud Connector Designer.

  • GoAnywhere V7.7 released – with Fortra Threat Brain protection | GSA

    < News GoAnywhere V7.7 released – with Fortra Threat Brain protection 13 Dec 2024 Great news for our GoAnywhere MFT customers, with your software now able to leverage insights from Fortra Threat Brain to further protect your managed file transfers. Fortra Threat Brain is a comprehensive cyber security information hub, fed by telemetry from the Fortra’s expansive portfolio of products as well as insights from across the dark web, social media, and law enforcement. It brings together a team of threat intelligence analysts and partners, an expansive portfolio of AI-enabled cybersecurity products, and a vast array of intelligence sources, to provide even stronger protection for your valuable data. The up-to-date threat intelligence from Fortra Threat Brain enables GoAnywhere to reject HTTP/S service connections flagged as malicious. That includes connections to GoAnywhere’s Web Client, AS2, AS4, and any other endpoints that run on the HTTPS service. Extended file transfer protection is just one of many enhancements available in GoAnywhere Version 7.7, now released to customers for download. (And if you’d like our help with upgrading, be sure to check out our GSA Annual Upgrade & Health Check Service .) Previous Next

bottom of page