Search Results
123 results found with an empty search
- BEST PRACTICES FOR CLOUD MFT | GSA
Best Practices for Cloud MFT Data is the lifeblood of modern business. And most modern organisations rely to some extent on the Cloud as they transfer files between employees, trading partners, and customers. However, permitting your precious data to go “off-prem” increases the risk it will be intercepted or accessed by cybercriminals. To help you guard against cybercrime, here are best practices for safeguarding your data on its way to, from and in, the Cloud. Start with the Right Cloud Provider Cloud providers come in all sizes, capabilities … and risk profiles. Ensure your Cloud provider uses robust security protocols and safeguards. Do they utilise the latest encryption protocols, and offer strong user authorisation and access controls? Do their data transmission and storage approaches meet the regulatory requirements for your industry? What performance levels does your Cloud provider commit to? Can they quickly and reliably receive, store and transmit your business-essential files? Can your Cloud provider easily integrate with your existing systems? Can your Cloud provider offer an appropriate level of technical support when you need it? Select the Right Type of Cloud Cloud computing comes in three basic flavours… Public, Private, and Hybrid. Each offers differing degrees of security and risk. 1. Public Clouds may offer relatively robust security features. However, they must be appropriately configured to offer protection for your files. 2. Private Clouds provide enhanced levels of control and isolation. However, these come at a higher cost. 3. Hybrid Clouds combine elements of both, enabling you to balance security and cost-efficiency. Meet Industry Compliance Requirements Some industries are subject to heightened regulatory requirements regarding data storage and transfer. Even when using an “off-prem” Cloud provider, you remain responsible for meeting those requirements. Failing to utilise an appropriately compliant Cloud environment can lead to fines, law suits, loss of customers, loss of supplier trust, and reputational damage. Maintain Control and Data Sovereignty Governments increasingly require organisations to maintain authority and control of data within their jurisdictional boundaries – aka, “data sovereignty”. Private and Hybrid Cloud environments provide inherently greater authority over where data is stored, access permissions, and retention policies. In this way, they enable organisations to better navigate myriad data sovereignty mandates and evolving compliance standards . Utilising Managed File Transfer as a Service (MFTaaS) MFTaaS is an approach which can help organisations streamline their file transfer processes, while offering robust security, scalability, reliability, anywhere access and cost-effectiveness. However, be sure to confirm your MFTaaS solution offers robust encryption and security protocols, can scale grow with your organisation's needs, and complies with the industry regulations relevant to your business. Technical Best Practices for Cloud File Transfers Ensure secure and efficient transmission of data in a Cloud environment by observing these technical requirements: 1. Data Encryption at Rest and in Transit : Utilise encryption protocols like SSL/TLS for data in transit and encryption solutions provided by your Cloud provider for data at rest. In private Cloud settings, you can also leverage approaches like Bring Your Own Key (BYOK) or Hold Your Own Key (HYOK). 2. Data Loss Prevention (DLP) : A robust DLP solution helps prevent unauthorised data transfers and leakage by monitoring data in real-time and preventing it from being transmitted outside of your organisation. 3. Intrusion Detection Systems (IDS) : By monitoring and alerting IT security teams to any suspicious file transfer behaviour, IDS helps nip security breaches in the bud. Employee Best Practices Having your team follow best practices is also essential to secure data transfer and storage. 1. Staff Training : Teach your employees to recognise data security risks, and how to avoid them. Place special focus on phishing and social engineering – two of the most prevalent cybercriminal threats. 2. Multi-Factor Authentication (MFA) : Enforce MFA for file transfers, and utilise phishing-resistant techniques. 3. Access Control : Restrict access to files and systems, and provide users with only the minimum level of access necessary to perform their role. Implement a regular cycle of access permission reviews. Audit, Backup and Recovery Best Practices Continuous monitoring and auditing of Cloud file transfers not only maintains the security of your data, it also helps identify and mitigate potential threats, while monitoring on-going compliance. Log Analysis and Security Information and Event Management (SIEM) proactively monitor transfers, and enable your IT team to react quickly to emerging threats and incidents. Data backup and disaster recovery are the final critical components of your comprehensive safeguards against data loss in Cloud file transfers. They ensure that, if a disaster occurs, your organisation can provide business continuity by maintaining the availability and integrity of data. Making the Cloud Safe for File Transfers By following these best practices, the Cloud can be an efficient, reliable and secure element within your organisation’s overall data transfer approach. At Generic Systems Australia, we use and recommend the class-leading (link) managed file transfer solution, GoAnywhere MFT, for the way it integrates with the Cloud and embeds best practices. Providing peace of mind, by securing sensitive files in transit and at rest, GoAnywhere automates and encrypts data between an organisation and its trading partners, protecting it from unnecessary vulnerabilities while improving efficiency and reducing costs. If you’d like to learn more about GoAnywhere MFT , our Business Manager, Bradley Copson, would be happy to offer you an obligation-free discussion , a no cost trial, or even a Proof of Concept for your business RESOURCES HOME
- DATASHEET THREAT PROTECTION | GSA
GoAnywhere MFT is the world’s leading Managed File Transfer solution. This datasheet summarises its key technical features. Review the report below. RESOURCES HOME
- Privacy Policy | GSA
Generic Systems Australia Privacy Policy Generic Systems Australia (“GSA”, “we” or “us) are committed to protecting the privacy of the BUSINESS information we collect. Our Privacy Policy describes how we collect and use your business information where we are acting as a data controller (i.e. where we decide how and why your information is used). This Policy does not apply to personal information we hold as an employer or data processor when acting on behalf of, and in accordance with the instructions of our customers through our customers’ use of GSA services and the software licenced via us. We may make changes to our Privacy Policy from time to time to take account of changes to our standard practices and procedures or where necessary to comply with new laws and regulations. If we make changes, we will update the “last updated” date in the following paragraph, and the latest version will always be available on our website. This Policy was last updated on 1 June 2024 . We encourage you to check our website from time to time to ensure that you are aware of our current Privacy Policy. Types of personal information we collect The types of personal information we collect will depend on the circumstances in which the information is collected. However, the types of personal information we collect and hold about you may include: identifying information, such as your name; contact information, such as your address, email address and telephone/mobile number; usernames and passwords that you create when registering for an account with us; your organisation and position, where your organisation has business dealing with us; information about your occupation and employer organisation; information about how you use the products or services we provide to you; records of our communications with you, such as telephone, email, SMS, online and in person communications; if you visit our offices, images of you which may be captured on CCTV; other information that you provide us during the course of business; and other information that is capable of identifying you. You are always welcome to provide us with comments, queries and feedback in relation to our products and services. We may record and monitor telephone calls and other communications between you and us for training, quality control and compliance purposes. When you communicate with us, we may collect additional information including the languages you speak, how best to manage communications with you, and information about your dealings with us. If you participate in a survey or competition, or respond to a feedback request, we will collect the information that you provide in doing so, and associated information such as when and how you submitted the response. We collect information about people who are our contractors, suppliers and business partners, or who are employed by our contractors, suppliers and business partners. When you do business with us, we may collect information about you from others, such as from others who do business with you. Our website may contain links to third party websites. We are not responsible for the privacy practices or the content of those third-party websites. The privacy practices applicable to those third-party websites may differ substantially from ours, so we advise you to read the privacy policy of those websites before using them. Log data, device and location information When using our products and services (including our website), we will collect information about you and about your use of our products and services, such as which services you use and how you use them. We will collect information such as: user name and password; device information, such as the model and ID of the device you use, operating system, telephone number and mobile phone network; server log information, such as details of how you used the products or service (including our website), IP address, hardware settings, browser type, browser language, the date and time of your use and referral URL; and your browser or your account using cookies (see below for further information about our use of cookies). Our products and services (including our website) may also detect and use your IP address or domain name for internal traffic monitoring and capacity management purposes or to otherwise administer the products and services. The patterns of usage of visitors to the online services may be tracked for the purposes of providing improved service and content based on aggregate or statistical review of user traffic patterns. How we collect personal information We may collect personal information about you in the following ways: when you order products or services from us; when you use our online services and other products and services (including our website); when you visit our sites or offices; when you submit a query or request to us; when you respond to a survey that we run or fill in forms on our website; by tracking your use of our products and services (including our website); from third parties who are entitled to disclose that information to us; from publicly available sources; from online sources (including social media platforms and providers like LinkedIn); suppliers of information products and services (e.g. companies that consolidate data from multiple public sources); or other lawful means. From time to time, we may use third-party online services to collect personal information such as your name and email address or telephone number to administer online competitions, customer feedback and surveys. If you provide us with personal information about someone else, you must only do so if that person has provided their permission for you to do so. Cookies We may also collect personal information about you and your use of our website, products and services using cookies. Amongst other things, we use cookies to monitor and observe your use of our website, products and services, compile aggregate data about that use, and provide you with a more effective service (which may include customising parts of our website based on your preferences and past activities on that website). How we use personal information and our legal basis for using your personal information We use personal information that we collect about you to: verify your identity when you are dealing with us; maintain our relationship with you; determine your eligibility for any of our products or services; answer your queries and requests; enable us to provide you or your organisation with our products and services; use in accordance with any request or instructions from you; make special offers related to our products or services that we think may be of interest to you; keep you informed about our activities and notify you of changes to our products or services; monitor use of our products and services (including our website); provide better products, services and information to our customers and to the community; assess, operate, maintain, upgrade and improve our products and services (including our website); maintain and update our records; carry out market analysis and research; carry out planning and forecasting activities and other internal business processes; manage and resolve any legal or commercial complaints or issues (including debt recovery); meet our obligations and perform our functions under applicable laws and agreements; comply with our legal and regulatory obligations; use as otherwise required or authorised by law or government agency. We may also use your personal information for any other purpose as authorised by you. Our legal basis for the above activities includes: consent; necessary for performance of a contract; necessary for our legitimate interests or the legitimate interests of a third party; necessary for compliance with our legal obligations. . When we have legitimate interests As set out above, in some cases we use your information where it is necessary for our legitimate interests or the legitimate interests of a third party. This includes where the use of your personal information is necessary to: administer our operations and business in an efficient and effective way including undertaking management planning and improving and developing our products and services; for our authorised third-party service providers or others to perform services on our behalf, such as payment processing and data analysis; understand and respond to queries, complaints and feedback; send direct marketing to business contacts; transfer personal information in relation to an actual or proposed sale, transfer or reorganisation of all or part of our business and the acquisition of the business; analyse and optimise our website's content by updating it in accordance with your preferences; ensure network and information security; and enforce our legal rights and manage any dispute and legal claims and take legal or other professional advice. Direct marketing and research If you have given us your consent or if we are otherwise legally entitled to do so, we may use and disclose your personal information for marketing purposes (but we will not sell your personal information to any third party) including contacting you about our products and services (including our website), the products and services of other people, or related special offers from our business partners, that we think may be of interest to you. This information may be sent to you by email, SMS or by other means. We may use your personal information to carry out consumer and market research, compile demographics and perform other research and analysis so that we can develop and implement initiatives to improve our services, improve the design, construction and operation of our products and identify people likely to be interested in our products and services. You can opt-out of receiving marketing communications from us at any time by following the “unsubscribe” link in any communication (or sending a return email with “un subscribe in the Subject line” from us or contacting us using the contact details below. Unsubscribing from marketing communications will not stop service-related communications from us, such as administrative alerts in relation to your account. De-identification We may de-identify information about you so that the information can no longer be used to identify you (anonymisation). We may use and disclose de-identified information in the course of our business (including in any promotional or marketing material). Aggregation We may aggregate information on the use of our products and services (including our website) in such a way that the information can no longer be related to identifiable individuals. We may use and disclose aggregated information in the course of our business (including in any promotional or marketing material). Who we disclose personal information to We may disclose your personal information to: your representatives, advisers and others you have authorised to interact with us on your behalf; controlled entities within our corporate group; our team members and third parties including business partners, consultants, contractors, suppliers, service providers, professional advisers and agents who need the information to assist us with conducting our business activities; prospective purchasers of all or part of our business or shares in our company or a related entity; government agencies or authorities, regulators, law enforcement agencies and other parties where authorised or required by law who ask us to disclose that information and to which we are legally required to disclose your personal information; parties identified at the time of collecting your personal information or as otherwise authorised by you. How we maintain and secure your personal information Security is a priority for us when it comes to your information. We take reasonable steps to ensure that any of your personal information which we hold is accurate, complete and up to date. These steps include promptly updating personal information when we are advised that personal information has changed, checking our contact lists for accuracy, and providing individuals with a simple means to update their personal information. On rare occasions, we also keep hard copy records of this personal information in physical storage facilities. We use a range of physical and technical security processes and procedures to protect the confidentiality and security of the information that we hold, and we update these from time to time. These measures include: implementing physical and technical access and security controls to our physical and electronic databases, such as security procedures for access to our business premises; and technological security procedures including password protection, network firewalls, encryption, intrusion detection and site monitoring where practicable to do so. We also take steps to monitor access to and modification of your information by our team members and contractors, and ensure that our team members and contractors are aware of and properly trained in their obligations for managing your privacy. However, the internet is not a secure environment and no matter what physical and technical security processes and procedures are used we cannot guarantee the security of your personal information. You also play an important role in keeping your information secure by maintaining the confidentiality of any usernames and passwords you use with our products and services (including our website). How long we store your personal information for Personal information is only retained for as long as it is needed for the purpose for which it was collected or as required by law. After the expiry of this period, we will take reasonable steps to make sure its de-identified or destroyed. The criteria used to determine appropriate retention periods for personal information include: the length of time we have an ongoing business relationship with you; the amount, nature and sensitivity of the personal information; whether we have a legal obligation to retain personal information; and whether retaining the personal information is necessary to resolve legal disputes (including the establishment, exercise or defence of legal claims). Your rights Depending on where you are located, you may have a right to: request a copy of your personal information. In relation to personal data you have supplied to us, and which is held by us for the purpose of entering into a contract between us or on the basis of your consent, you may be entitled to ask us for a copy of this information in a structured, commonly used and machine readable format so that you can reuse it or share it with other organisations; object to our processing of your data and ask us to restrict the use of your information and to delete it; or correct or rectify any personal information that is out-of-date, incorrect, incomplete or misleading. Such requests should be submitted to us in writing using the contact details below. We may ask you to verify your identity before responding to your request. We will respond to your request in a timely manner and action your request in accordance with applicable data protection laws. You have a right to withdraw your consent where you have previously given us consent to use your personal information (e.g. to receive marketing communications). You can do this by contacting the Privacy Officer using the contact details below or, where the consent relates to marketing, by unsubscribing using the link in any of our communications. Complaints If you have a concern about your privacy or how we have collected or handled your personal information, please contact our Privacy Officer using the contact details below. If you wish to make a complaint, you should forward a written complaint to our Privacy Officer using the contact details below. In the complaint, please include your contact details (such as email address, name, address and telephone number) so we can contact you for further information and clearly describe the complaint. We will respond to your query or complaint within a reasonable time and in accordance with applicable data protection laws. If you are not satisfied with our response, you may contact us to discuss your concerns or may raise a complaint with your local data protection authority through their official channels. In Australia it is the Office of the Australian Information Commissioner, in New Zealand it is the Privacy Commissioner. Contact us If you require further information this Privacy Policy or Generic Systems Australia’s management of your personal information please contact us via the following contact details: Privacy Officer Phone: +61 2-9959-2239 Email: info@gensys.com.au
- CYBERSECURITY 2024 | GSA
2024 Cyber Insiders Survey Fortra's "2024 State of Cybersecurity Survey" shares the invaluable insights of more than 400 cybersecurity professionals from across the globe, including many in Australia, New Zealand and the Asia-Pacific region. Here’s their 2024 report. To receive a Complimentary Copy of the Report, simply submit your email address below: First name Last name Enter your email address Phone You'll receive the '2024 Cyber Insiders Survey Report' shortly! RESOURCES Receive Report HOME
- About Us | GSA
About Generic Systems Australia Your local experts in Secure Managed File Transfer Technology Our Story We are independent experts in data transfer - more than just software suppliers. Our curated suite of industry-leading solutions, coupled with our unparalleled experience and expertise, have made us the Asia-Pacific region’s most trusted partners in secure Managed File Transfer technologies. Founded in 1993, we’re proud to count among our clients some of the region’s most iconic brands. Leveraging our unique skills and readily available local support, they rely on us to optimise their IT systems, hone their business processes and integrate their supply chains. A long-term partner of Fortra (formerly Help Systems, and Linoma Software, the original authors of GoAnywhere MFT), we’ve been the Asia-Pacific's regional distributor of the industry leading GoAnywhere MFT suite since 2007. Our in depth understanding of the product’s Advanced Workflows , data translation, auditing and compliance, automation and security enables us to rapidly devise optimal solutions, provide rapid Proofs of Concept, and move ahead quickly with implementation. We have exclusively managed APAC deployments for some of the largest multinational corporations, Government departments and small- to medium-sized businesses as well. Our local technical support service provides our clients with the reassurance that local help will always be on-hand. Generic Systems Australia is a values-led organisation. Our long-term commitment to doing business ethically, being the absolute best at what we do, and keeping our customers’ needs always at the fore, is the foundation of our enduring success. Our company was founded on that principle 30 years ago and continues to this day. If you’re exploring how to boost your efficiency and bottom line by leveraging Secure Managed File Transfer technology, reach out to our Business Manager, Bradley Copson, for an obligation-free discussion. Our People Bradley Copson Business Manager Expert in enhancing organisational effectiveness and efficiency through Managed File Transfer technologies. "My understanding of contemporary business challenges, coupled with my early career experience leading IT operations and support functions, enable me to advise clients from a perspective that’s both business-minded and IT-pragmatic. “By approaching each engagement ethically, assigning technical experts who consistently deliver professional services of the highest quality, and keeping my client’s best interests always at the fore, I’ve been entrusted with opportunities to manage many of our region’s most iconic brands.” Simon Kuenstner Solutions Architect Managed File Transfer Expert "Three decades of experience as a solutions architect enable me to quickly chart a course through any maze of legacy systems and manual processes, to design and implement secure MFT solutions which empower clients to work smarter, smoother and more efficiently. "I love to explore with clients how GoAnywhere can be used in new ways to further boost their business’s bottom line.” Schedule a call with us today!
- INFO TECH REPORT 24 | GSA
Independent Info-Tech MFT Quadrant Report (2024) Once again, respected tech analysts Info-Tech have evaluated the most popular MFT software and vendors, and found that GoAnywhere is the top MFT solution. Here’s their 2024 independent report. To receive a Complimentary Copy of the Report, simply submit your email address below: First name Last name Enter your email address Phone You'll receive the 'Independent Info-Tech MFT Quadrant Report' shortly! RESOURCES Receive Report HOME
- Connector Service | GSA
Seamlessly Integrate GoAnywhere with ANY Cloud Cloud Connectors enable Fortra's GoAnywhere MFT, the world’s leading managed file transfer solution , to transfer files easily and securely between your organisation and external cloud services and applications. For example: Let’s say one of your trading partners requests an important file and wants you to share it via a folder in Dropbox. Or perhaps you have contacts or billing information you want to update automatically in Salesforce. Cloud Connectors enable you to do so, easily. Broad Range Cloud Connectors are easily downloaded from GoAnywhere MFT’s integrated Marketplace, which features Connectors for most common cloud services. Available "Out-of-the-Box Cloud Connectors Check availability Cloud Connectors can integrate with available on-premises and online versions of third-party software unless otherwise noted. Unique Custom Connector Service No Marketplace Connector for your special Cloud…? No problem! At Generic Systems Australia, we can design and implement Custom Connectors for you, using GoAnywhere’s Cloud Connector Designer. Contact Us Configuring Cloud Connectors is Easy! Once a Cloud Connector is installed, you can configure the connection properties as a GoAnywhere Resource. With this resource, you only need to specify the connection once before being able to seamlessly reuse it in any of your workflows and cloud file transfers. A Cloud Connector definition contains the various actions required to communicate with cloud applications. For example: authentication logging file transfer file management error handling In GoAnywhere, these actions appear as elements located under the Cloud Connector in the GoAnywhere Project Designer. Elements can be incorporated into your workflows alongside other project tasks, and processes can even be automated between multiple web and cloud services at once Contact Us
- DATASHEET GA GATEWAY | GSA
GoAnywhere Gateway provides an additional layer of security when exchanging data with your trading partners, enabling you to keep file sharing services and documents safely in your private/internal network. This datasheet summarises its key technical features. View Report RESOURCES HOME
- LOCAL BUYERS GUIDE | GSA
MFT Local Buyer's Guide Finding the right Managed File Transfer solution for your organisation may not be easy... with dozens of factors to consider - including industry and government compliance requirements, cloud vs on-prem solutions, critical cybersecurity protections, pricing models and more. In this Asia and Pacific Region MFT Local Buyer’s Guide, you’ll find the key considerations, the questions you need to ask vendors, and a wealth of other advice to help you successfully evaluate MFT solutions. To receive our Local Buyers' Guide, simply submit your email address below: First name Last name Enter your email address Phone You'll receive the Buyers' Guide shortly! RESOURCES Receive Report HOME
- THINK LIKE A HACKER | GSA
THINK LIKE A HACKER To win the fight against cybercriminals, it helps to think like a hacker. In this guide, we explain the terminology and techniques used by cyber thieves, and share seven important strategies for protecting your valuable data. To receive our Guide, please submit your email address below: First name Last name Enter your email address Phone You'll receive the 'Think Like a Hacker' Guide shortly! RESOURCES Receive Report HOME