top of page

Search Results

172 results found with an empty search

  • New “Threat Brain” keeps Cyber Security Briefed and Vigilant | GSA

    < News New “Threat Brain” keeps Cyber Security Briefed and Vigilant 10 June 2025 What if your enterprise IT systems were constantly informed of the latest emerging cyber threats, so they could proactively protect your precious data from cyber thieves? That’s what Fortra’s new Threat Brain does for GoAnywhere , the world’s leading Managed File Transfer (MFT) solution. Threat Brain provides a unique threat intelligence advantage over other MFT solutions. It aggregates indicators from a deep portfolio of cybersecurity solutions to continuously identify and block IPs with bad reputation or malicious intent before those threats enter your organisation. Other MFTs can only react to cyber threats. GoAnywhere proactively avoids them. Threat Intelligence With access to data from Fortra’s deep portfolio of cybersecurity products and vast customer network, Threat Brain continually aggregates, in real-time, risk information across all attack vectors so that GoAnywhere MFT. Generic Systems Australia is a long-term distributor of GoAnywhere across the Asia-Pacific region. Threat Brain’s enhancements to GoAnywhere enable our customers to benefit from: · Consistent re-verification : With lesser MFTs, once an IP address has been allowed, there’s no ongoing monitoring. With GoAnywhere however, IP reputations are checked with every new session to ensure they remain safe. GoAnywhere is the only solution in the marketplace that makes this proactive and consistent security feature available to all customers within the solution. · Massive threat intelligence database : Threat Brain continually aggregates threat intelligence from Fortra’s broad cybersecurity portfolio and its vast, worldwide (anonymised) customer database. No other MFT vendor offers such integrated cybersecurity tools capable of tapping into this collected threat data. · Layered protection : Fortra’s deep portfolio of cybersecurity intelligence and protection adds an additional layer of protection to customers’ sensitive data. Combined with Advanced Threat Protection , GoAnywhere sets the bar for protecting sensitive data in motion and at rest. Proactive Security GoAnywhere taps Threat Brain to perform on-demand IP reputation checks for incoming HTTP/S connections, AS2, and AS4 protocols. These checks are executed on the GoAnywhere Web Client and via API and API endpoints. GoAnywhere automatically blocks IPs with low reputation scores. This IP blocking can be fine-tuned through adjustable sensitivity settings, while provisioning allows for exceptions in case of false positives. When an IP address has been blocked due to low reputation, a system administrator can add an exception to permit the IP address to be accessed. Whenever GoAnywhere takes action to protect your systems and data, it’s recorded in an audit log detailing what was blocked and the reason it intervened. Stay in the Know When it comes to cyber security, it’s critical to be proactive vs reactive. While Brute Force or Denial-of-Service attacks may be detected automatically by traditional MFTs, this happens only after the system has been attacked. Local Expertise at the Ready If you’d like help tapping GoAnywhere’s proactive capabilities for your organisation, please feel welcome to contact me . I have decades of experience as a long term distributor of GoAnywhere in Australia and New Zealand, and I’m always happy to have an obligation-free discussion and demonstrate its impressive capabilities. At Generic Systems Australia , we’re your local experts in secure Managed File Transfer. Previous Next

  • The Emotional Toll of Ransomware Attacks | GSA

    < News The Emotional Toll of Ransomware Attacks 25 Aug 2025 Sophos’s recent report The State of Ransomware 2025 sheds light on the little-discussed human impacts of cyber attacks within compromised organisations. Sophos polled 3,400 IT and cyber security leaders across 17 countries who had been hit by ransomware in the past year. Aside from the financial and reputational costs to the organisations, Sophos found that the organisation’s IT and cyber security teams suffered negative personal consequences from every attack. Taking the Fall The fallout from a cyber attack was often most severe at the top of the IT team. In one in four cases, the team’s leadership was replaced as a consequence. That might seem “fair” to some. However, as most CISOs will tell you, business investment decisions are frequently made at the Line of Business level. CISO projects and investment requests are considered alongside other business priorities and investments – sometimes, deprioritised and rejected. In those instances, is it reasonable to hold the CISO accountable? As Frank Dickson, group VP for security at IDC, remarked to CSOonline.com : “Some presume that a ransomware attack is the fault of the CISO. The CISO is a leader, but not  the  leader. Breaches are the result of a pattern of decisions of many.” Dickson said that some enterprise business units — even some CEOs and COOs — will sidestep CISOs by deliberately not inviting them to key meetings, out of the fear they will slow down certain business processes. With the growing frequency of cyber attacks, and the considerable business disruption they create, that’s shortsighted and risky. Emotional Toll Sophos’ survey found that the human consequences of a cyber attack were felt well beyond the leadership level. 41% of IT/cybersecurity teams reported increased anxiety or stress about future attacks. 34% said the team felt guilty that the attack was not stopped in time. 40% reported increased pressure from senior leaders - though 31% reported increased recognition. 31% of teams experienced staff absences due to stress/mental health issues related to the attack. The survey responses reveal how a ransomware attack can be a brutal blow — not just to an organisation’s finances and reputation, but to the people responsible for the IT systems. For the IT team, it’s often a high-stakes, high-pressure ordeal. HR & C-Level Support An organisation’s Human Resources team and C-suite need to play a critical role in stabilising the IT team in the aftermath of a ransomware crisis. That begins with providing immediate support: Acknowledging the pressure, and recognising within the organisation the IT team's efforts. Providing flexible work arrangements, such as adjusted hours, remote work options, and time off where feasible. Making psychological first aid and counsellors available. Ensuring clear internal communication, to avoid the stresses of miscommunication and rumours. Longer term, the focus should be on building IT team resilience. Recognising and rewarding the IT team's role in recovery. Conducting cyber security training across departments - not just IT – to reinforce a culture of shared responsibility. Implementing retention strategies to mitigate post-ransomware attack attrition. Prevention: Better than Cure At Generic Systems Australia , we help Australian and New Zealand organisations avoid cyber attacks by making file transfer and email systems smarter and more resilient. Please feel welcome to contact me if we can help you. We’re your local experts in data transfer. Previous Next

  • Think Cyber Insurance is “Protection Enough”? Think again! | GSA

    < News Think Cyber Insurance is “Protection Enough”? Think again! 8 Oct 2025 Paying a cyber security insurance premium is no substitute for taking measures to thwart cyber thieves. Almost half of cyber insurance claims are being denied. As cyber breaches have become more common, insurers have become more stringent in their underwriting and assessment practices. Insurers facing payouts are carefully scrutinising claimants’ cyber security practices. If they conclude a company failed to take reasonable precautions to mitigate their cyber risks, they’re denying the claim. No Guarantee Cyber insurance is a critical safety net for a modern organisation. But it’s not a guarantee. A staggering 44% of cyber insurance claims are denied, often due to overlooked policy requirements or inadequate cybersecurity practices. To ensure your claim is honoured in the event of a breach, organisations must proactively ensure their security posture meets their insurer’s expectations. Why Claims Fail Astra Security reports that 27% of data breach claims and 24% of first-party claims are denied due to exclusions in the insurance package. These exclusions often stem from outdated security models, misconfigurations, or failure to meet minimum protection standards. Moreover, 60% of claims involve Business Email Compromise (BEC) or Funds Transfer Fraud (FTF) — two attack vectors that insurers scrutinise particularly heavily. Ransomware, though less frequent, remains on average the costliest type of attack. If your organisation lacks robust defences against these threats, your insurer may argue that you failed to uphold your end of the coverage agreement. How to Ensure a Claim Isn’t Denied 1. Treat Data Transfers Like Cash Transfers Data — like cash — is a high value asset vulnerable to theft, loss, and misuse. Treating data transfers with the same rigor as cash helps ensure accountability, security, and compliance. In today’s digital economy, customer records, intellectual property, financial details, and operational insights are all assets that drive business decisions and revenue. Just as companies protect cash transfers with encryption, audit trails, and multi-party verification, data transfers should be governed by similarly strict protocols. The Australian Cyber Security Centre (ACSC) emphasises that users must be held accountable for all data transfers they perform, especially when moving sensitive or classified information between systems. This mirrors financial accountability, where every dollar moved is tracked, verified, and reconciled 2. Implement and Maintain Strong Cybersecurity Controls Insurers expect you to uphold basic security hygiene. This usually includes: · firewalls and endpoint protection, · Multi Factor Authentication MFA, · up-to-date patching, · incident response plans, · periodic vulnerability assessments, and · employee training on phishing and social engineering. One particular technology — Managed File Transfer (MFT) — can help you embed technical and process protections across your organisation in one fell swoop. MFT provides end-to-end encryption, role-based access controls, built-in audit trails, detailed reporting, automated alerts and notifications, centralised visibility and seamless scaling across both cloud and on-premises systems. 3. Understand Your Policy Details Read the fine print of your insurance policy. Know what’s covered, what’s excluded, and exactly what security standards and regimes you’re expected to maintain. 4. Document Everything Keep detailed records of your cybersecurity efforts. This includes security audits and penetration tests, software update logs, employee training sessions and incident response drills. Documentation is your best legal defence if a claim is challenged. It proves you took reasonable steps to mitigate risk. 5. Stay Ahead of Threats Cyber threats evolve rapidly. Insurers are increasingly using AI to assess risk, and attackers are doing the same. Regularly update your risk models and consider continuous penetration testing to identify and patch vulnerabilities before they’re exploited. 6. Get Local Expert Help Cyber insurance is not a substitute for cyber security — it’s a complement. And, as the old maxim states: “an ounce of prevention is worth a pound of cure”. At Generic Systems Australia we have decades of experience helping Australian and New Zealand organisations bolster their cyber defences through deployment of the world’s leading MFT solution, GoAnywhere . Our Migration Service makes the transition even easier for organisations who want to supplement their IT team with local expertise. We can even write custom Cloud Connectors to extend GoAnywhere’s ability to interface seamlessly with less common cloud platforms. If you’d like a no-cost, no-obligation discussion about how we could help you simply and affordably adopt an advanced MFT solution, please feel welcome to get in touch with me. At Generic Systems Australia, we’re your local experts in Secure Managed File Transfer. Previous Next

  • Top 10 Tips for Advanced MFT Workflows | GSA

    < News Top 10 Tips for Advanced MFT Workflows 7 Feb 2024 Improve Business Processes with GoAnywhere’s Advanced Workflows One of the most advanced features of GoAnywhere MFT is also one of its most popular – Advanced Workflows. Workflows (also called “Projects”) expand and unlock superior automation for your file transfers. They enable you to enhance encryption, strengthen security capabilities, and run tasks seamlessly without human intervention. Those already using Advanced Workflows know how much time and effort this feature can save. It takes the drudgery out of moving data between applications, between employees, and within their supply chain ecosystem. Whether you’re in search of new tips and tricks, or just getting started with Advanced Workflows, this article will help you tap the potential of GoAnywhere MFT. 1. Create Projects with No Programming Skills You don’t need to be a technical genius or have any programming skills to create Advanced Workflows. GoAnywhere’s Project designer window couldn’t be any easier to use. It’s drag-and-drop interface puts over 100 unique tasks – copying, translating, moving, backing up, alerting, reporting, etc - at your fingertips. No clunky scripting is needed. 2. Configure Advanced Worksflows Resources Resources are an essential function and act as GoAnywhere’s “arms” or “client”. Configuring resources to network locations, email servers, and file transfer servers saves you time as you create your Advanced Workflows. Do it once, and you can use those resources in all your Projects. There are more than 20 different resource types for GoAnywhere to connect to, such as Amazon S3 Buckets, Azure Blob Storage, and SSH servers (SFTP, SCP, SSH). These pre-defined connections for internal servers, as well as external trading partners and locations, make it simple to build Projects which manipulate and move files. 3. Translate Data into Different Formats Advanced Workflows comes with 15 tasks for data translation. They enable you to read and write files in multiple different formats, and seamlessly translate between them. They include: Read/write CSV, Excel, Fixed-Width-XML, JSON Read flat file SQL query output to various formats Modify RowSet 4. Automate File Encryption/Decryption With cybercriminals increasingly targeting company data, most businesses believe it’s critical to encrypt data when its being transferred. GoAnywhere makes this as simple as it is important. With Advanced Workflows you can completely automate the process of encryption and decryption, for everything from documents to digital signatures and verifications. All of it is done with the robust Open PGP standard. 5. Create and Use Conditional Statements Conditional statements offer excellent control of Workflows within your Projects. Using common “if/else” logic and loops, they can parse through variables or lists of files. By chaining Advanced Workflows tasks together, they perform their tasks when the Workflow runs and prior conditions are “true.” 6. Reference Projects as a Common Function Projects you create can be called or referenced by multiple Projects. This enables commonly performed tasks to be utilised in multiple Projects in the manner of a common function or utility. 7. Run Workflows in Debug Mode Running Workflows in Debug Mode enables easy testing and troubleshooting of individual Projects. Users can interactively execute tasks one step at a time, and enable the job log and variable values to be monitored during each step. At each break in time, the values of the variables can be altered before the next task is executed. 8. Schedule and Automate GoAnywhere Reports Advanced Workflows can be used to schedule and automate reports. Reports can be generated and delivered, and email and text notifications sent. GoAnywhere’s built-in scheduler can be used to execute Workflows at future dates and times. Projects can be scheduled to run on a one-off basis, or with a recurring frequency. 9. Control Data Security with Triggers Triggers enable you to control the security of your data. They can automate Projects, send notifications based on user actions in GoAnywhere, and much more. Triggers can be defined to monitor for certain events such as an account being disabled, a download failing, or a successful login. A triggered event can initiate a response such as receiving an email when a file is uploaded by a trading partner or automatically removing a partial file from a folder if the file upload is unsuccessful. 10. Monitor Files for Determined Events Advanced Workflows can do file-based monitoring for certain events. These events include: Created Modified Deleted, and Exists. If you’d like to explore how your organisation can improve its efficiency through GoAnywhere ’s Advanced Workflows, feel free to contact our Business Manager, Bradley Copson (mail to: bradley@gensys.com.au ). He’s always happy to have an obligation-free discussion, explain how simply we can transition you from outdated software and approaches, and offer you a zero-cost Proof of Concept. Generic Systems Australia Your Local Experts in Secure Managed File Transfer Previous Next

  • Automate File Transfers to Boost Team Efficiency | GSA

    < News Automate File Transfers to Boost Team Efficiency 17 Mar 2024 Dodge the Drudgery – Automate Your File Transfers Manually sending files around your organisation, and to external trading partners, is a tedious and time-consuming aspect of many employee’s lives. However, it needn’t be. You can help your team dodge the drudgery via file transfer automation software. This software enables your team to program when files should move between internal systems, other team members, or trading partners, and is often used to manage reoccurring or high-volume file transfers. Your team is freed up to focus on other business-critical tasks. Read on to find out how… The Leading Solution GoAnywhere MFT is the world’s leading secure FTP (SFTP) file transfer automation software. It enables users to quickly automate file transfers and schedule workflows, using its built-in scheduler or your existing scheduler software. Within GoAnywhere's browser-based administrator, users can also automate their workflows by executing projects with a single click. GoAnywhere MFT can execute multiple workflows concurrently, through its job management system. Administrators can define multiple job queues, grouping workflows that share common characteristics or service level agreements. Each job queue can define the priority of their jobs as well as the maximum number of concurrent jobs that can be executed from the queue. All these job queues can be managed and prioritised through GoAnywhere's Administrator interface. Built-In Schedulers With the built-in scheduler you can execute Projects (workflows) at future dates and times. Projects can run just once, or with any recurring frequency you choose. You can also define custom calendars with specific holidays or dates that are important to your organisation, or to avoid scheduling a job on a specific day. Schedules can be further personalised by specifying them to run under specific users, or with start dates, frequencies and other over-riding variables. You can also indicate the email addresses to be alerted when a Project has completed, or encounters any problem. Unlimited File Sizes Large files are no problem for GoAnywhere MFT, or its email add-on GoAnywhere Secure Mail. It enables you to send large files as secure packages on an ad hoc basis, as well as send multiple large files. Even large files transfers won’t choke... GoAnywhere provides auto-resume and integrity checks to keep big files moving, even when it encounters network connectivity challenges. Robust Audit Logs and Reporting Staying compliant with various industry regulations or privacy laws is easier with GoAnywhere MFT. You can generate comprehensive audit logs of all file transfer and administrator activity, including workflow and file server auditing and administrator logging. This data is captured for activity in GoAnywhere servers for AS2, FTP, FTPS, HTTPS, and SFTP, and it includes details on log in attempts, file uploads and downloads, errors, and other events. Reports can be quickly generated, viewed, filtered, sorted and exported as needed. Executing Projects Workflows can also be automated, executing whenever a file monitor detects new, modified, or deleted files in targeted folders. Workflows can be called from local and remote command lines, scripts, and programs using the provided commands and APIs. Workflows can additionally be called as Web Services using SOAP or REST requests. To execute Workflows based on user activity, triggers can monitor for events like when a file is uploaded or downloaded. Workflows can be executed in Debug mode, which enables users to interactively execute tasks one step at a time. At each stopping point, the values for the variables can be viewed or changed before the next task is executed. If you’d like to discuss how your organisation’s file transfers can be automated, adding to your productivity and bottom line, please feel free to contact our Business Manager, Bradley Copson, (mail to: bradley@gensys.com.au ). He’ll be more than happy to offer you an obligation-free discussion, no-cost trial, or Proof of Concept. Generic Systems Australia Your Local Experts in Secure Managed File Transfer Previous Next

  • Why Your Business Needs PROACTIVE Cyber Security | GSA

    < News Why Your Business Needs PROACTIVE Cyber Security 4 Apr 2025 Blocking cyber criminals before they gain access to your IT systems requires your cyber security solution to have access to, and pre-emptively act upon, the very latest intel on threats. It needs an early warning system. Activating the proactive features in your existing security solutions is a good first step to keeping bad actors out. However, layering security with solutions that guard your data – instead of merely alerting you to breaches after the fact – is much better. Six Reasons Here are six reasons your organisation should consider making a proactive Managed File Transfer (MFT) security solution the foundation for your layered data security. Traditional threat intelligence is reactive against cyberthreats rather than proactive. While Brute Force and Denial of Service (DoS) attacks can be detected automatically, that’s only after your systems have come under attack.  A vulnerability discovered by a cybercriminal in one business system can be quickly replicated across other businesses’ systems in a wave of copycat attacks .  Some attacks may only be detectable through (all-too-infrequent) manual inspection of activity logs.  New and previously unknown vulnerabilities can lead to Zero Day incidents , if cyber security solutions don’t continually check for bad IP addresses. Cybercriminals systematically probe MFT service endpoints to evade automatic IP blocking.  An Example A manufacturing plant with multiple MFT deployments was concerned about rising cyberthreats and the potential for their systems to be compromised.  While they were confident in their MFT solution’s ability to protect sensitive data while in transit and in motion, their system didn’t pre-emptively detect bad actors or threats before they entered their MFT environment. While they could add trusted IPs to their “allowed” list, that created a future level of risk. What if that IP address was subsequently compromised…? Thinking Ahead GoAnywhere MFT , the world’s most fully-featured MFT, offers a unique proactive threat intelligence advantage over other lesser solutions , mitigating the risk of persistent IP address trust. By simply turning on the feature in the latest version of GoAnywhere, organisations can leverage the dynamic intelligence database of Fortra’s Threat Brain . This “brain” is comprised of data and indicators from Fortra’s deep portfolio of cybersecurity solutions. It provides a forward-leaning approach to cybersecurity threats, blocking IPs with bad reputations or malicious intent before they enter the MFT environment. When activated within GoAnywhere, Threat Brain pre-emptively blocks bad actors across all attack vectors, continually checking trustworthiness with each new session. Proactive Security Benefits for MFT As a built-in module, Fortra’s dynamic cybersecurity intelligence database benefits GoAnywhere customers by: Consistent re-verification : An IP's reputation is re-checked with every session to ensure it remains safe”. Other MFT products don’t offer this ongoing monitoring of IP addresses once they are white-listed. Comprehensive threat intelligence data sources : Threats detected in one of Fortra’s many security solutions is shared with the Threat Brain, increasing the overall intelligence data available to GoAnywhere MFT. Layered protection : Combined with Threat Protection and Zero Trust File Transfer, GoAnywhere provides unmatched options to safeguard data throughout the entire data lifecycle. Stay A Step Ahead of Cyber Crims Blocking the door to your MFT environment can be as easy as enabling the Threat Brain module in GoAnywhere and determining which level of security you require to meet your organisation’s security mandates or compliance requirements. If you’d like help tapping GoAnywhere’s proactive capabilities for your organisation, please feel welcome to contact me . I’m always happy to have an obligation-free discussion, demonstrate GoAnywhere’s capabilities, and even offer you a zero-cost Proof of Concept. At Generic Systems Australia , we’re your local experts in secure Managed File Transfer. Previous Next

  • Protect Your Organisation From Stranger Strings | GSA

    < News Protect Your Organisation From Stranger Strings 1 Dec 2025 In the hit Netflix series Stranger Things , danger lurks in the shadows of ordinary life — a flickering light, a hidden passage, or a seemingly harmless object can conceal a gateway to the Upside Down. That’s how it is with the batch files still used by many organisations to conduct critical daily file transfers. These batch files may look mundane, even routine. However, a single hidden line of code can unleash chaos. Hiding in Plain Sight A batch file is essentially a script: a sequence of commands executed by the operating system. While this makes them convenient for repetitive tasks, it also makes them vulnerable to tampering. A single malicious line can transform a routine transfer into a catastrophic event. Consider this simple example: “del C:\*.* /Q /F” This line, if inserted into a batch file, would attempt to delete every file on the C: drive. To the untrained eye, it might blend seamlessly among legitimate commands like ‘xcopy’ or ‘robocopy’. Yet its impact would be devastating — wiping out critical data, halting operations, and potentially opening the door to further exploitation by hackers. The danger lies not in the complexity of the attack, but in its simplicity. One unnoticed command can undo years of work. The Demogorgon in the Detail Batch files are inherently insecure because they lack the safeguards modern IT environments demand. Their key risks include: Ease of manipulation: as they’re plain text, anyone with access can edit them, inserting destructive or unauthorised commands. No authentication or encryption: they move files without verifying the sender or encrypting the data, leaving sensitive information exposed. Limited logging and visibility: they provide little or no audit trail. You may not even know a breach has occurred until the damage becomes apparent. Escalated privileges: a malicious line may not just affect files; it may compromise your entire system. Prone to human error: a simple mistyped command can have disastrous consequences. No Place for 80s Nostalgia Batch files are relics of a time when networks were simpler and threats less sophisticated. In today’s environment of ransomware, insider threats, and regulatory scrutiny, relying on them is a huge gamble. The Modern Alternative Managed File Transfer (MFT) solutions address batch file vulnerabilities by providing a secure, automated framework for moving data. Unlike batch files, MFT platforms are designed with security, compliance, and reliability at their core. Here’s why MFT is a safer choice: Encryption by default: MFT solutions encrypt files both in transit and at rest, ensuring sensitive data cannot be intercepted or read by unauthorised parties. Authentication and access control: Only authorised users and systems can initiate transfers, and different permissions can be assigned to each user. This prevents tampering and ensures accountability. Audit trails and monitoring: Every transfer is logged, providing visibility into who moved what, when, and where. This is invaluable for compliance and incident response. Error handling and recovery: MFT platforms include built-in mechanisms to detect failed transfers and retry automatically, reducing the risk of data loss. Scalability and automation: MFT systems can handle complex workflows across multiple environments, eliminating the need for fragile, manually maintained scripts. Compliance support: For industries bound by regulations such as GDPR, HIPAA, or PCI DSS, MFT provides the controls and reporting necessary to demonstrate compliance. Staying Out of the Upside Down The contrast between batch files and Managed File Transfer is stark. Batch files are like handwritten notes left on a desk — easy to read, easy to alter, and easy to misuse. MFT, by comparison, is like a secure courier service: encrypted, tracked, and accountable at every step. At Generic Systems Australia , we’re Australia’s and New Zealand’s experts in helping organisations automate their file transfers with Managed File Transfer solutions. If you’d like to discuss how we can help you, please feel welcome to get in touch with me . I’m always happy to have an obligation-free chat and explain how simply and affordably we can replace your outdated batch files with a reliable and efficient MFT solution. Previous Next

  • How GoAnywhere Helps PMFresh Better Serve Customers & Partners | GSA

    < Case Studies How GoAnywhere Helps PMFresh Better Serve Customers & Partners PMFresh uses GoAnywhere MFT to handle its 20,000 weekly file transfers. They initially chose GoAnywhere as a solution to replace problematic custom-written and legacy programs to meet the requirements of their large customer, Domino’s Pizza. The robust solution has since proven itself with its flexibility, functionality, and ease of use both in and out of the organization. “GoAnywhere’s flexibility in being able to interact with the varied systems of our customers, allows us to effectively set up electronic trading partnerships with our customers,” noted Ashish Bhatt, IT Manager for PMFresh. “GoAnywhere is a flexible, secure file transfer tool that makes file transfers and other business processes easier.” “With four manufacturing plants and a small IT staff, GoAnywhere can straddle all the systems easily without specialized skill sets. By using more variable skill sets it’s been easier to manage file sending, receiving, and translating. GoAnywhere allows us to do more with less,” he added. Moving In-House Brought Reliability and Cost Savings Prior to installing GoAnywhere, PMFresh used a mixture of solutions, including a third-party provider, but experienced a lot of issues. “We were under a lot of pressure to bring the Domino’s ordering system and B2B communications inhouse to reduce the manual management needed for these processes. There were a lot of moving parts,” Ashish said. “Every time we wanted to interact with an external trading partner, we had to find a solution they were able to manage. When we started to work with Domino’s, we found our old process gave us lots of errors and our third party charged us considerably to receive those transfers,” noted Ashish. Simon Kuenstner, then a tech consultant to PMFresh, was tasked with finding a solution for PMFresh’s in-house system. “We were very satisfied with the options GoAnywhere MFT provided another customer in terms of reliability, logging, and encryption,” he said. “Since then, GoAnywhere has proved its flexibility and high reliability over many years. It is secure, very fast, and the scalability is great. It doesn’t matter what platform you need to connect to, it can easily communicate with whatever you or your partners have.” What used to take hours or even several days can now be accomplished in minutes or hours. And the Advanced Workflow engine gives PMFresh the ability to do everything from simple transfers to complex automation. Ashish said he also appreciates the logging and ability to integrate messaging and alerts into the file transfer process. “With GoAnywhere, we were able to get the set-up with Domino’s started over a weekend, had the ordering process automated on an FTP site, and that project is still running smoothly today.” A Mission-Critical Solution GoAnywhere is considered mission-critical for PMFresh and is now incorporated in all parts of the business from accounts, purchasing, production, and customer service. PMFresh has been able to reduce many of the manual tasks for processing electronic orders, invoices, business intelligence reporting, and more. “Without GoAnywhere receiving, moving, and translating files, the business would stop,” said Asish. “We are able to both reduce the hours needed for processes and save money. And with multiple systems, many trading partners in the industry, and a complex, distributed factory footprint, GoAnywhere allows us to be more flexible. It is the glue that connects our systems. “We continually look at our processes to see if GoAnywhere can help in any way. Our people – both in and out of the organisation – are very happy with what we have done so far, as it has saved them so much time. It’s a fast, productive environment, is stable, and integrates with all our systems,” he added. On-Premise Transferred Successfully to Azure Cloud In 2020, when increasing their cloud footprint, PMFresh migrated all their on-premises and data centre computer workloads to the Microsoft Azure cloud. Part of that migration included moving their six-year instance of GoAnywhere to Azure. With GoAnywhere implemented in Azure, PMFresh now hosts SFTP and AS2, (server and client) in the Cloud, to securely communicate with their external trading partners. They also run integrations between services hosted in Azure and on-premises, as well as their ERP systems which are also hosted. PMFresh utilizes virtual machines (VM) in Azure for their GoAnywhere instances and utilizes GoAnywhere’s Gateway within an Azure DMZ for optimal security with internet facing trading partners and systems. In addition, utilizing the Azure Cloud’s highly available architecture, backup options, and the ability to replicate the GoAnywhere environment into other regions, gives PMFresh infrastructure reliability that they did not have in their on-premises data centre. It enables PMFresh to serve their customers with reliable orders, invoices, and communications. “I’d highly recommend running GoAnywhere in the cloud if it is a critical component of your business, as it is for PMFresh,” Asish said. GoAnywhere MFT Helps PMFresh Deliver Service Excellence With GoAnywhere in place, PMFresh can process new orders in a timelier fashion and communicate more reliably with their partners. Said Asish: “The simplicity of the software enables us to onboard new customers and suppliers easily, saving us both a lot of time. The streamlined processes help partners as well. Some of our larger customers have large processing sites, and GoAnywhere enables us to align with their existing processes. “The solution’s flexibility gives us an advantage. We can say, ‘we can work with that’ and that flexibility has helped us a lot.” While already utilising many functions of GoAnywhere, SFTP, HTTPS, AS2, and GoAnywhere Gateway, Ashish anticipates adding process automation using Secure Forms. “We have plans to migrate some additional dated processes on old systems to GoAnywhere as well. We want to continue exploring its capabilities as it saves us time and money, and most importantly for our customers, it is highly reliable.” He added that, by using the Advanced Workflow engine, “Our only limitation is our imagination.” --- If you would like to explore how GoAnywhere MFT can help you better serve your customers and suppliers, please feel free to contact our Business Manager, Bradley Copson. He’s always happy to have an obligation-free discussion, explain how quickly and easily we can transition your organisation to the class-leading MFT solution, and offer you a zero-cost Proof of Concept. Previous Next

  • “Scripting SNAFU” – A True Cautionary Tale | GSA

    < News “Scripting SNAFU” – A True Cautionary Tale 25 Feb 2025 A n anecdote shared by a local business dramatically demonstrates the danger of relying on old-fashioned file transfer scripts within your organisation. Million Dollar Mishap An Australian business was using legacy scripts to copy their customers’ Personally Identifiable Information (PII) between systems within their business. Now, PII – personal details such as name, address, phone number, date of birth, bank details etc – is the most protected kind of consumer information under Australian law. Businesses which mishandle it expose themselves to penalties potentially as high as $50M. One day, a staff member in this business accidentally deleted a customer’s data directory – an error that went unnoticed. When the legacy file transfer script ran as per its usual schedule, attempting to copy the customer’s updated PII to their customer directory, it couldn’t. The destination directory was missing. So the script copied the customer’s PII to a different customer’s directory! This meant the original customer’s PII was now visible to and accessible by the wrong customer – in breach of Australia’s Privacy Act. Better Managed File Transfers GoAnywhere MFT – the world’s leading Managed File Transfer (MFT) solution – would have prevented this error from occurring. It tightly controls where files are transferred from and to, with high levels of authentication and encryption. GoAnywhere remains vigilant. If it detects anomalies in its authorised file transfers, it doesn’t proceed. Instead, it sends an immediate alert to an authorised employee so that the issue can be addressed – before any data is lost or privacy laws broken. However, there are many more reasons why you should replace file transfer scripts with the world’s leading MFT… No Safe Scripts Scripts aren’t secure. For example, data sent via FTP is transferred “in the clear” – an easy target for external hackers, or curious employees and vendors. Worse, user credentials aren’t encrypted, putting your entire system at risk. Scripts lack advanced features. For example, automating file transfers with FTP requires adding a second solution, a time-consuming and complex prospect. It’s also difficult to build in re-try features, and lock down how users interact with sensitive data. Scripts don’t play well with new systems. For example, cloud-based computing environments require file transfers to be integrated with cloud-based solutions, and platforms such as Azure and AWS. Scripts are time consuming. Developing, maintaining, and troubleshooting scripts takes time, distracting valuable support staff from more important things. And if your support staff aren’t available when a script fails, it can bottleneck your organisation’s entire workflow. A Happy Ending So, what happened to the business whose missing directory accidentally exposed their customer’s PII…? After one of their customers reported that they were seeing a different customer’s PII, the business scrambled to quickly address the problem. They re-created the necessary customer directories and manually moved their customer’s data to where it belonged. Whew! But it’s what they did next that made the biggest difference… Determined to prevent the possibility of any such error ever recurring, the business immediately conducted a comparison of Managed File Transfer solutions. They selected GoAnywhere, the industry’s leading Managed File Transfer – and became a Generic Systems Australia customer! Leveraging The Experience If you’d like to learn more about how GoAnywhere MFT could put guardrails around your business’s handling of PII, please feel welcome to get in touch with me . I’m always happy to have an obligation-free discussion, or provide a quick and easy proof of concept. At Generic Systems Australia we’re your local experts in MFT solutions. Previous Next

  • MFT as your Middleware! | GSA

    < News MFT as your Middleware! 4 Nov 2025 Modern enterprises are constantly navigating the flow of information between intricate internal systems and external cloud services. Regardless of whether that flow is inside or outside of the corporate firewall, the need for secure and efficient data transfer remains paramount. Traditional solutions like Extract Transfer Load (ETL) systems help process and store data within a central warehouse, while Enterprise Service Buses (ESBs) serve as hubs that manage and monitor data and service flows across various applications. Yet, despite their strengths, these tools fall short when it comes to security—especially when third-party interactions are involved. This gap between integration and security has left organisations searching for a more unified approach. More than MFT Enter GoAnywhere MFT , a solution which redefines what managed file transfer can be. Unlike conventional MFT platforms, GoAnywhere functions as a lightweight ETL, a capable ESB, and a robust MFT tool—all rolled into one. What truly distinguishes GoAnywhere is its unwavering focus on security, making it one of the few platforms that can meet the growing demand for secure and seamless data exchanges both within and beyond enterprise boundaries. GoAnywhere offers the same automation and integration capabilities found in ETL, ESB, and Enterprise Application Integration solutions. It enables organisations to connect internal systems with cloud-based resources and external partners, including banks, credit card providers, financial data services, foreign exchange markets, and retirement or pension systems. When needed, GoAnywhere can also act as middleware, integrating with existing ETL setups while managing system connections, securing communications, and streamlining integration processes. Even for enterprises already equipped with ETL tools, GoAnywhere enhances data transfer security by introducing multiple layers of protection. Its architecture includes a multi-tier setup featuring the GoAnywhere Gateway, which operates as a reverse proxy in the DMZ to shield data from internet threats. Additionally, organisations can deploy a Secure ICAP Gateway—a deep content inspection engine that blocks malicious content from infiltrating through third-party interfaces. Security is further reinforced through integration with Fortra Threat Brain, a comprehensive threat intelligence database that proactively identifies and blocks suspicious IP addresses before they can breach the network. On-Prem, Off-Prem... Anywhere Another standout feature of GoAnywhere is its ability to bridge the divide between on-premises systems and cloud-based applications. Unlike typical SaaS middleware platforms, which often struggle to accommodate legacy systems, segmented networks, and hybrid environments, GoAnywhere centralises and secures file transfers across all these domains. It’s not limited to one environment, making it a truly versatile solution for enterprises with complex infrastructures. For organisations aiming to enhance operational efficiency, GoAnywhere offers a high-performance middleware platform that supports secure and high speed data transfers. It interfaces with a wide array of systems, applications, and cloud services, protects files from malware, enforces zero trust principles regardless of file destination, and ensures data remains outside the DMZ. Recognised globally as a leading MFT solution, GoAnywhere is celebrated for its security, adaptability, and ability to operate wherever and however enterprises need it. It’s increasingly becoming the connective tissue between disparate systems and workflows. Local Help On Hand At Generic Systems Australia , we bring years of experience helping IT teams across Australia and New Zealand optimise their file transfers and safeguard their data using GoAnywhere MFT. From assessing legacy systems to offering zero-cost Proof of Concepts and seamless Migration Services, we ensure businesses can transition to more secure practices without disruption. If you’re interested in exploring how GoAnywhere can benefit your organisation, feel free to reach out for an obligation-free conversation. At Generic Systems Australia, we’re proud to be Australia’s and New Zealand’s experts in Managed File Transfer. Previous Next

bottom of page