Detailed Features

Listed below are the detailed features in GoAnywhere Services™ shown with all the licensed options.

File Transfer Protocols
SFTP - FTP over SSH  
FTPS - FTP over SSL/TLS  
SCP - Secure Copy over SSH  
Standard FTP  
HTTP/s  
AS2 receive  
Operating Systems Supported
Windows Server 2003, 2008 and 2012  
Windows 7, 8, XP and Vista  
Linux (Red Hat, SUSE, Ubuntu, CentOS, etc.)  
UNIX  
AIX for IBM Power Systems  
IBM i (AS/400, iSeries)  
HP-UX  
Solaris  
Mac OS X  
Virtualized Environments
VMware Ready (certified)  
Microsoft Hyper-V  
IBM Power VM  
Administration
Browser based administration (no PC install)  
Secure access over HTTPS  
Remote configuration and monitoring  
Intuitive dashboard with quick links, statistics and tips  
Graphical screens with point-n-click wizards  
Context sensitive help text  
Separation of duties (role-based permissions for admins)  
Browsers Supported
Microsoft Internet Explorer  
Mozilla Firefox  
Google Chrome  
Apple Safari  
User Account Creation
Create accounts using templates  
Auto-create accounts from Active Directory (AD) or LDAP servers  
Import accounts from CSV or XML files  
Self-register accounts with optional approval process  
Allow users to invite others to register  
Create accounts through API calls from external apps  
User Authentication Methods
Active Directory (AD)  
LDAP  
IBM i user profiles  
GoAnywhere database  
SSL certificates (X.509 Standard)  
SSH public keys  
Single sign-on (SSO) support using SAML v2.0  
Active Directory (AD) and LDAP Synchronization
Automatically synchronize user accounts from AD or LDAP  
Synchronize user accounts interactively (on demand)  
Create user accounts at time of login, if exists in AD or LDAP  
Auto-update user profile information at login (name, email, etc.)  
Configure which security groups to synchronize  
Support for multiple AD and LDAP servers  
Specify a failover AD or LDAP server for high availability  
Password Security
Password strength policy (min length, special char, etc.)  
Password age enforcement (min/max number of days)  
Password history (disallow reuse of prior passwords)  
Password expiration intervals (in days)  
Password expiration email notifications  
Administrator can force password reset  
User can be allowed to change own password  
Passwords encrypted using strong SHA-512 hash algorithm  
User Account Security
Authorize services (SFTP, HTTPS, etc.) per user  
Adopt user permissions from groups  
Configure IP whitelists (allowable IPs) per user  
Restrict login to certain days of the week (e.g. Mon-Fri)  
Restrict login to certain times of the day (e.g. 8am-5pm)  
Expire temporary accounts on specific dates  
Auto-disable user accounts after X invalid login attempts  
Auto-disable user accounts with no activity in X days  
Time out sessions after X seconds of inactivity  
Manually disable user accounts  
Limit or disable anonymous access  
Folder Configurations
Auto create folders using variables and/or constants  
Virtual file and folder names (user friendly aliases)  
Defined on user, group and template levels  
Unlimited subfolders  
Disk quotas at the user, group and folder level  
Create and manage virtual folders/files through API calls  
Folder/File Permissions
Upload (Write)  
Download (Read)  
List  
Overwrite  
Append  
Rename  
Delete  
Checksum  
Subfolder Create  
Subfolder Rename  
Subfolder Delete  
Share folders and files with other users  
File Systems
Local file system  
UNC paths  
Mounted drives (e.g. NFS)  
Network Attached Storage (NAS)  
Storage Area Network (SAN)  
Mapped drives  
Samba (SMB)  
Common Internet File System (CIFS)  
IFS on IBM i  
Chroot Jail  
Encryption for File Transfers
Encrypt data in transit over SSL, TLS or SSH  
Strong ciphers: AES128, AES192, AES256, Triple DES  
Legacy cipher support: DES, RC4, Blowfish  
Configure the ciphers allowed for client connections  
Force encrypted command channels  
Support for implicit and explicit SSL  
FIPS 140-2 validated algorithms from RSA  
Encryption for Data at Rest
Specify the targeted folders for encryption  
Automatically encrypt files when written to targeted folders  
Automatically decrypt files when read from targeted folders  
Utilizes strong AES256 cipher and random key for encryption  
Supports both local folders and network shares  
Key and Certificate Management
Browser-based integrated Key Manager  
Create new SSH keys and SSL certificates  
Import existing SSH keys and SSL certificates  
Export SSH keys and SSL certificates  
Add and remove SSH keys from API interface  
Assign one or more SSH keys per user  
Authorize key management role to only certain admins  
Connectivity
IPv6 compatible  
Dual-stack network support (IPv4 and IPv6 coexisting)  
Custom login banners  
Multiple listeners allowed for inbound connections  
Configurable port numbers  
Can limit number of concurrent connections  
Compression to reduce bandwidth requirements  
Reject or accept files with certain extensions  
Redirect HTTP traffic to HTTPS  
Clear Command Channel (CCC) support for FTP/FTPS  
Bandwidth Throttling
Limit upload speed  
Limit download speed  
Limit by specified days of the week  
Limit by specified times of the day  
Guaranteed Delivery
Support for client auto-resume / append  
File integrity checksum  
Mac algorithms of SHA1 and MD5  
IP Filtering
Global IP blacklists and whitelists  
User-level IP blacklists and whitelists  
Monitor for DoS attacks (anti-hammering) with auto blacklist  
Monitor for Brute Force attacks with auto blacklist  
Temporary and permanent IP blacklisting  
Email alerts on auto-blacklisted IPs  
High Availability and Clustering
Database tables for product data (simplifies backup/recovery)  
Active-Passive for disaster recovery  
Active-Active for automatic failover  
Cluster multiple systems (no 3rd party tools required)  
Load balance sessions between multiple systems  
DMZ Gateway
Inbound reverse proxy  
Can keep sensitive files in the private network (out of DMZ)  
Allows closing inbound ports into the internal/private network  
Can optionally serve as an outbound (forward) proxy  
Single DMZ gateway can service multiple systems  
Auditing
Audits user login activity  
Logs unauthorized attempts  
Logs all trading partner account activity  
Database storage of audit log entries  
Optional SYSLOG feed of audit records  
Automatically can archive old audit entries  
Retention period can be customized  
Real time monitoring of active sessions  
Email alerts for invalid login attempts  
Reporting
View audit logs from browser-based dashboard  
Filter results by user, date, time, IP, etc.  
Focus on certain activity (e.g. downloads, uploads, etc.)  
Select which columns to show/hide  
Sort columns by user, date, time, etc.  
Export filtered audit entries into CSV format  
Authorized users can view own activity logs  
Workflow Automation - Triggers
Create triggers based on uploads, downloads, etc.  
Multi-level conditions using IFs, ANDs and ORs  
Complex expressions using parenthesis  
Filter conditions based on user, file name, folder, etc.  
Send custom email notifications  
Launch external programs and scripts with parameters  
Move files  
Rename files  
Delete files  
Run projects in GoAnywhere Director™  
Backend Database Support (for storing product tables)
DB2 for IBM i  
Derby  
Microsoft SQL Server  
MySQL  
Oracle  
Adhoc File Transfers
Browser-based HTML web client for adhoc file transfers  
Optional applet web client for enhanced file transfers  
Multi-select files and folders  
Context sensitive right-click menus  
Drag-n-drop files for uploads and downloads  
Monitor progress of transfers  
Queue to process large numbers of transfers  
Verifies the integrity of files  
Large file support  
Users can share folders and files with other users (if authorized)  
Rebrand web client with custom logo, colors, fonts  
Multilingual screens with support for 7 different languages  
Customizable disclaimer and privacy policy  
Secure Mail (email alternative for sending large or sensitive files)
Send secure mail from Outlook 2010 and 2013  
Optionally send secure mail using a browser-based form  
Attachments are automatically stripped and centrally stored  
Address book to store frequently used contacts and groups  
HTTPS links are generated for each secure mail package  
Option to expire package after X number of days  
Option to limit the number of downloads  
Password protection; send in the same email or separately  
Certified delivery option; recipient(s) must register before access  
Customizable templates for email notifications  
Sender can recall packages  
Sender can receive notifications when packages are read  
Inbox for working with messages received  
Receipients can be forced to reverify email address  
Recipient(s) can reply to sender  
Files and messages are stored in encrypted format  
Automatic cleanup of expired packages  
Local control of secure mail packages (not hosted)  
Administrator can restrict Secure Mail to certain email addresses  
Mobile Devices (e.g. Smartphones, Tablets, etc.)
GoAnywhere administration through the browser  
Perform adhoc file transfers from Android mobile device  
Send Secure Mail from Android mobile device  
System Alerts
Send emails to one or more administrators for system events  
Alert when GoAnywhere is started or shut down  
Alert when available memory reaches a minimum value  
Alert when SSL certificates are about to expire  
Alert when a license key is about to expire  
Alert when a Trigger fails  
Support
Phone based support with toll-free number  
Email support  
Live chat  
Community web-based forum  
Self-service knowledgebase  
Product manuals in HTML and PDF format  
Maintenance includes product upgrades  
Licensing
On-premise software (not hosted)  
Licensed per server partition/instance  
Unlimited trading partner accounts  
Unlimited administrator users  
Unlimited transfers  

GoAnywhere Services can be installed onto Windows, VMware, Linux, IBM i, AIX (pSeries), UNIX, HP-UX, Mac OS and Solaris platforms.  IBM i is also referred to as System i, iSeries, as400, as/400 and i5.