HOME

TheInfoList



OR:

Linoma Software was a developer of secure managed file transfer and
IBM i IBM i (the ''i'' standing for ''integrated'') is an operating system developed by IBM for IBM Power Systems. It was originally released in 1988 as OS/400, as the sole operating system of the IBM AS/400 line of systems. It was renamed to i5/OS i ...
software solutions. The company was acquired by HelpSystems in June 2016; HelpSystems changed its name to Fortra in November 2022. Mid-sized companies, large enterprises and government entities use Linoma's (now Fortra's) software products to protect sensitive data and comply with data security regulations such as
PCI DSS The Payment Card Industry Data Security Standard (PCI DSS) is an information security standard used to handle credit cards from major card brands. The standard is administered by the Payment Card Industry Security Standards Council and its us ...
,
HIPAA The Health Insurance Portability and Accountability Act of 1996 (HIPAA or the Kennedy– Kassebaum Act) is a United States Act of Congress enacted by the 104th United States Congress and signed into law by President Bill Clinton on August 21, ...
/
HITECH HiTech is a chess machine built at Carnegie Mellon University under the direction of World Correspondence Chess Champion Dr. Hans J. Berliner, by Berliner, Carl Ebeling, Murray Campbell, and Gordon Goetsch. HiTech was the first computer chess syste ...
, SOX, GLBA and state privacy laws. Linoma's software runs on a variety of platforms including
Windows Windows is a group of several proprietary graphical operating system families developed and marketed by Microsoft. Each family caters to a certain sector of the computing industry. For example, Windows NT for consumers, Windows Server for ...
,
Linux Linux ( or ) is a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically packaged as a Linux distribution, which i ...
,
UNIX Unix (; trademarked as UNIX) is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, whose development started in 1969 at the Bell Labs research center by Ken Thompson, Dennis Ritchie, a ...
,
IBM i IBM i (the ''i'' standing for ''integrated'') is an operating system developed by IBM for IBM Power Systems. It was originally released in 1988 as OS/400, as the sole operating system of the IBM AS/400 line of systems. It was renamed to i5/OS i ...
,
AIX Aix or AIX may refer to: Computing * AIX, a line of IBM computer operating systems *An Alternate Index, for a Virtual Storage Access Method Key Sequenced Data Set * Athens Internet Exchange, a European Internet exchange point Places Belgiu ...
, Solaris,
HP-UX HP-UX (from "Hewlett Packard Unix") is Hewlett Packard Enterprise's proprietary implementation of the Unix operating system, based on Unix System V (initially System III) and first released in 1984. Current versions support HPE Integrit ...
and
Mac OS X macOS (; previously OS X and originally Mac OS X) is a Unix operating system developed and marketed by Apple Inc. since 2001. It is the primary operating system for Apple's Mac computers. Within the market of desktop and lapt ...
.


History

Linoma Group, Inc. (the parent company of Linoma Software) was founded in 1994. The company was started in
Lincoln, Nebraska Lincoln is the capital city of the U.S. state of Nebraska and the county seat of Lancaster County. The city covers with a population of 292,657 in 2021. It is the second-most populous city in Nebraska and the 73rd-largest in the United St ...
by Robert and Christina Luebbe. Throughout most of the 1990s, the Linoma Group performed consulting and contract programming services for organizations in the Nebraska/Iowa area. Linoma Software was formed in 1998 to address the needs of the
IBM AS/400 The IBM AS/400 (Application System/400) is a family of midrange computers from IBM announced in June 1988 and released in August 1988. It was the successor to the System/36 and System/38 platforms, and ran the OS/400 operating system. Lower-c ...
platform (now known as
IBM i IBM i (the ''i'' standing for ''integrated'') is an operating system developed by IBM for IBM Power Systems. It was originally released in 1988 as OS/400, as the sole operating system of the IBM AS/400 line of systems. It was renamed to i5/OS i ...
) by developing productivity tools to help IT departments and end users. These tools were sold throughout the world and helped Linoma establish itself as an innovative software company. In 2002, Linoma released Transfer Anywhere, which was a solution for automating and managing file transfers from the AS/400. Over the next 2–3 years, Linoma added
encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can dec ...
capabilities to Transfer Anywhere including support for Open PGP encryption, SFTP and
FTPS FTPS (also known as FTP-SSL and FTP Secure) is an extension to the commonly used File Transfer Protocol (FTP) that adds support for the Transport Layer Security (TLS) and, formerly, the Secure Sockets Layer (SSL, which is now prohibited by RFC75 ...
. These encryption capabilities helped organizations protect sensitive data transmissions such as
ACH Network In the United States, the ACH Network is the national automated clearing house (ACH) for electronic funds transfers established in the 1960s and 1970s. It processes financial transactions for consumers, businesses, and federal, state, and loca ...
payments,
direct deposit A direct deposit (or direct credit), in banking, is a deposit of money by a payer directly into a payee's bank account. Direct deposits are most commonly made by businesses in the payment of salaries and wages and for the payment of suppliers' acco ...
s, financial data, credit card authorizations, personally identifiable information (PII) and other confidential data. Linoma expanded into other platforms when it completely redesigned Transfer Anywhere into an open OS solution with a graphical browser-based interface, renaming it GoAnywhere Director. Released in early 2008, GoAnywhere Director included comprehensive security controls,
key management Key management refers to management of cryptographic keys in a cryptosystem. This includes dealing with the generation, exchange, storage, use, crypto-shredding (destruction) and replacement of keys. It includes cryptographic protocol design, ...
, trading partner wizards and detailed
audit trail An audit trail (also called audit log) is a security-relevant chronological record, set of records, and/or destination and source of records that provide documentary evidence of the sequence of activities that have affected at any time a specific ...
s for compliance requirements. In 2009, Linoma released GoAnywhere Services as a collection of secure file services including an FTP Server, FTPS Server, SFTP Server and
HTTPS Hypertext Transfer Protocol Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP). It is used for secure communication over a computer network, and is widely used on the Internet. In HTTPS, the communication protocol is e ...
server. GoAnywhere Director and Services were merged in 2015 to become GoAnywhere MFT. GoAnywhere MFT merged the workflow automation capabilities (adapted from GoAnywhere Director) with secure FTP server and collaboration features (adapted from GoAnywhere Services). This provides a unified browser-based interface, centralized logging and reporting. GoAnywhere MFT is in the Managed File Transfer software category of products, but can also be used for ETL functions. GoAnywhere Gateway was released in 2010 as an enhanced
reverse proxy In computer networks, a reverse proxy is the application that sits in front of back-end applications and forwards client (e.g. browser) requests to those applications. Reverse proxies help increase scalability, performance, resilience and securi ...
to protect the
DMZ A demilitarized zone (DMZ or DZ) is an area in which treaties or agreements between nations, military powers or contending groups forbid military installations, activities, or personnel. A DZ often lies along an established frontier or bounda ...
and help organizations meet strict
compliance Compliance can mean: Healthcare * Compliance (medicine), a patient's (or doctor's) adherence to a recommended course of treatment * Compliance (physiology), the tendency of a hollow organ to resist recoil toward its original dimensions (this is a ...
requirements. GoAnywhere Gateway was enhanced in 2011 to provide
forward proxy In computer networking, a proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource. Instead of connecting directly to a server that can fulfill a reques ...
functions. Linoma Software also performs
encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can dec ...
of data at rest on the IBM i platform with its Crypto Complete product. This product also includes key management, security controls and audit trails for PCI compliance. In June 2016, Minneapolis, Minnesota-based HelpSystems acquired Linoma Software. In March 2019, GoAnywhere MFT, in combination with
Clearswift Clearswift is an information security company based in the UK. It offers cyber-security services to protect business's data from internal and external threats. The company is owned by Eden Prairie, Minnesota-based HelpSystems. History Clear ...
’s ICAP and
adaptive redaction Adaptive Redaction is an alternate version of redaction whereby sensitive parts of a document are automatically removed based on policy. It is primarily used in next generation Data Loss Prevention (DLP) solutions. Content and Context The policy ...
product, was named a Security Solution of the Year finalist for the European IT & Software Excellence Awards 2019. In November 2022, the parent company HelpSystems changed its name to Fortra.


Certifications

* VMware Ready * Novell Ready for
SUSE Linux Enterprise Server SUSE Linux Enterprise (often abbreviated to SLE) is a Linux-based operating system developed by SUSE. It is available in two editions, suffixed with Server (SLES) for servers and mainframes, and Desktop (SLED) for workstations and desktop compu ...
* Works With
Windows Server 2008 R2 Windows Server 2008 R2 is the fifth version of the Windows Server operating system produced by Microsoft and released as part of the Windows NT family of operating systems. It was released to manufacturing on July 22, 2009, and became generally ...
* IBM Ready for Power Systems Software –
IBM Power Systems Power Systems is a family of server computers from IBM that are based on its Power processors. It was created in 2008 as a merger of the System p and System i product lines. History IBM had two distinct POWER- and PowerPC-based hardware l ...
* IBM Ready for Systems with Linux -
IBM Chiphopper Chiphopper is a component of the IBM eServer products specifically tailored to the Linux operating system. IBM developed the server products in a collaborative effort with Red Hat and Novell of SUSE Linux ownership at the time. The official name ...


Associations

* Microsoft Partner ** Silver Independent Software Vendor (ISV) competency. ** Silver Application Integration competency. * IBM Advanced Business Partner * VMware Elite Partner * Oracle Partner Network (OPN) * PCI Security Standards *
COMMON Common may refer to: Places * Common, a townland in County Tyrone, Northern Ireland * Boston Common, a central public park in Boston, Massachusetts * Cambridge Common, common land area in Cambridge, Massachusetts * Clapham Common, originally ...
*
Better Business Bureau Better Business Bureau (BBB) is a private, 501(c)(6) nonprofit organization founded in 1912. BBB's self-described mission is to focus on advancing marketplace trust, consisting of 97 independently incorporated local BBB organizations in the Unit ...
* Red Hat ISV Partner * OpenPGP Alliance *
Apple Developer Apple Developer (formerly Apple Developer Connection) is Apple Inc.'s website for software development tools, application programming interfaces (APIs), and technical resources. It contains resources to help software developers write software for ...
* Novell ISV Partner * GSA Advantage Schedule


Software


GoAnywhere MFT

GoAnywhere MFT is a managed file transfer solution for the exchange of data between systems, employees, customers and trading partners. It provides a single point of control with security settings, detailed audit trails and reports. Data transfers are secured using protocols for
FTP The File Transfer Protocol (FTP) is a standard communication protocol used for the transfer of computer files from a server to a client on a computer network. FTP is built on a client–server model architecture using separate control and data ...
servers (
FTPS FTPS (also known as FTP-SSL and FTP Secure) is an extension to the commonly used File Transfer Protocol (FTP) that adds support for the Transport Layer Security (TLS) and, formerly, the Secure Sockets Layer (SSL, which is now prohibited by RFC75 ...
, SFTP, and
SCP SCP may refer to: Organizations Political parties * Soviet Communist Party, the leading political party in the former Soviet Union * Syrian Communist Party * Sudanese Communist Party * Scottish Christian Party Companies * Seattle Computer Produ ...
) and Web servers (
HTTPS Hypertext Transfer Protocol Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP). It is used for secure communication over a computer network, and is widely used on the Internet. In HTTPS, the communication protocol is e ...
and AS2). It supports popular encryption protocols and offers a NIST-certified
FIPS 140-2 The Federal Information Processing Standard Publication 140-2, (FIPS PUB 140-2), is a U.S. government computer security standard used to approve cryptographic modules. The title is ''Security Requirements for Cryptographic Modules''. Initial pu ...
Validated Encryption module. GoAnywhere MFT's interface and workflow features help to eliminate the need for custom programs/scripts, single-function tools and manual processes that were traditionally needed. This improves the quality of file transfers and helps organizations to comply with data security policies and regulations. With integrated support for clustering, GoAnywhere MFT can process high volumes of file transfers for enterprises by load balancing processes across multiple systems. The clustering technology in GoAnywhere MFT also provides active-active automatic failover for disaster recovery. A secure email module is also available that allows users to send messages and files as secure packages. Recipients receive an email with a unique link to each package that allows them to view or download the files via a secure HTTPS connection. There is no limit on file size or type, and each package can be subject to password protection as well as other security features. GoAnywhere agents are lightweight applications that automate file transfers and workflows on remote and on-premises systems throughout the enterprise. Agents are managed by a central deployment of GoAnywhere MFT, allowing users to configure and schedule agent file transfers and business processes from the browser-based interface. For integration with cloud and web applications, GoAnywhere offers Cloud Connectors, built-in integrations that help users automatically move data to and from applications like SharePoint or Salesforce. A designer interface in the software also makes it possible for users to build custom connectors.


GoDrive by GoAnywhere

GoDrive is an on-premise solution that provides Enterprise File Sync and Sharing (EFSS) services for employees and partners. GoDrive files and folders can be easily shared between users with advanced collaboration features including file revision tracking, commenting, trash bin, media viewing and synchronization with Windows and Mac devices. GoDrive is an alternative to cloud-based file sharing services. It provides on-site file storage with localized control,
end-to-end encryption End-to-end encryption (E2EE) is a system of communication where only the communicating users can read the messages. In principle, it prevents potential eavesdroppers – including telecom providers, Internet providers, malicious actors, and eve ...
, and detailed audit trails. If an end-user device is lost or stolen, its GoDrive data can be deactivated and wiped remotely.


GoAnywhere Gateway

GoAnywhere Gateway provides an additional layer of
network security Network security consists of the policies, processes and practices adopted to prevent, detect and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves th ...
by masquerading server identities when exchanging data with trading partners. The application does not store user credentials or data in the
DMZ A demilitarized zone (DMZ or DZ) is an area in which treaties or agreements between nations, military powers or contending groups forbid military installations, activities, or personnel. A DZ often lies along an established frontier or bounda ...
/ local network. When using a
reverse proxy In computer networks, a reverse proxy is the application that sits in front of back-end applications and forwards client (e.g. browser) requests to those applications. Reverse proxies help increase scalability, performance, resilience and securi ...
, inbound ports do not need to be opened into the private network, which is essential for
compliance Compliance can mean: Healthcare * Compliance (medicine), a patient's (or doctor's) adherence to a recommended course of treatment * Compliance (physiology), the tendency of a hollow organ to resist recoil toward its original dimensions (this is a ...
with
PCI DSS The Payment Card Industry Data Security Standard (PCI DSS) is an information security standard used to handle credit cards from major card brands. The standard is administered by the Payment Card Industry Security Standards Council and its us ...
,
HIPAA The Health Insurance Portability and Accountability Act of 1996 (HIPAA or the Kennedy– Kassebaum Act) is a United States Act of Congress enacted by the 104th United States Congress and signed into law by President Bill Clinton on August 21, ...
,
HITECH HiTech is a chess machine built at Carnegie Mellon University under the direction of World Correspondence Chess Champion Dr. Hans J. Berliner, by Berliner, Carl Ebeling, Murray Campbell, and Gordon Goetsch. HiTech was the first computer chess syste ...
, SOX, GLBA and state privacy laws. The current version is 2.0.1. A
reverse proxy In computer networks, a reverse proxy is the application that sits in front of back-end applications and forwards client (e.g. browser) requests to those applications. Reverse proxies help increase scalability, performance, resilience and securi ...
is used by the application for the file-sharing services (for example, FTP/S, SFTP, HTTP/S servers) it front-ends in the DMZ. GoAnywhere Gateway's service broker binds file transfer requests to the appropriate service in the private network through a secure control channel. GoAnywhere Gateway makes connections to external systems on behalf of users and applications in the private network. Routing outbound requests through a centralized point helps manage file transfers through a
firewall Firewall may refer to: * Firewall (computing), a technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts * Firewall (construction), a barrier inside a building, designed to limit the spre ...
. This method keeps inbound ports closed. The
forward proxy In computer networking, a proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource. Instead of connecting directly to a server that can fulfill a reques ...
hides the identities and locations of internal systems for security purposes.


GoAnywhere OpenPGP Studio

GoAnywhere OpenPGP Studio is a free desktop tool that protects sensitive files using the OpenPGP encryption standard. Documents can be encrypted, decrypted, signed and verified from a PC or workstation using this tool. An integrated key manager allows users to create, import, export and manage OpenPGP keys needed to encrypt and decrypt files. GoAnywhere OpenPGP Studio will run on almost any operating system including Windows, Linux, Mac OS X, Solaris and UNIX.


Crypto Complete

Crypto Complete is a program for the IBM i that protects sensitive data using strong
encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can dec ...
,
tokenization Tokenization may refer to: * Tokenization (lexical analysis) in language processing * Tokenization (data security) in the field of data security * Word segmentation * Tokenism Tokenism is the practice of making only a perfunctory or symbolic ef ...
, integrated
key management Key management refers to management of cryptographic keys in a cryptosystem. This includes dealing with the generation, exchange, storage, use, crypto-shredding (destruction) and replacement of keys. It includes cryptographic protocol design, ...
, and
auditing An audit is an "independent examination of financial information of any entity, whether profit oriented or not, irrespective of its size or legal form when such an examination is conducted with a view to express an opinion thereon.” Auditing ...
. This software encrypts database fields, can automatically encrypt IFS files. The application also locates sensitive information that should be encrypted using the FNDDBFLD utility, which is available at no cost to IBM i users. The current version is 3.3.0. The key management system is integrated within the Crypto Complete policy controls, encryption functions and auditing facilities. Along with the integrated security native to the
IBM i IBM i (the ''i'' standing for ''integrated'') is an operating system developed by IBM for IBM Power Systems. It was originally released in 1988 as OS/400, as the sole operating system of the IBM AS/400 line of systems. It was renamed to i5/OS i ...
, access to key maintenance/usage activities is controlled to help meet compliance requirements. The backup encryption component encrypts the data written to tape devices. Crypto Complete encrypts the backups of any user data in IBM i libraries, objects, and IFS files. The field encryption registry works with IBM's Field Procedures and remembers which fields in a database should be encrypted. This process can be automated whenever any data is added to the field. When the data is decrypted, the returned values are masked or displayed based on the authority of the user. Tokenization is the process of replacing sensitive data with unique identification numbers (tokens) and storing the original data on a central server (typically in encrypted form). Tokenization can help thwart hackers and minimize the scope of compliance audits when it is stored in a single central location. Tokenization is used to protect sensitive data like credit card personal account numbers (PAN), bank account numbers,
social security numbers In the United States, a Social Security number (SSN) is a nine-digit number issued to U.S. citizens, permanent residents, and temporary (working) residents under section 205(c)(2) of the Social Security Act, codified as . The number is issued to ...
, driver's license numbers and other personally identifiable information (PII).


Surveyor/400

A productivity suite for working with IBM i data, files, libraries, and objects. Surveyor/400 operates in a GUI front-end, but provides options for either
IBM 5250 IBM 5250 is a family of block-oriented terminals originally introduced with the IBM System/34 midrange computer systems in 1977. It also connects to the later System/36, System/38, and IBM AS/400 systems, and to IBM Power Systems systems runn ...
or "Command Line" emulation. The current version is 4.0.4.IBM Journal - 13 December 2010
/ref>


RPG Toolbox

RPG Toolbox was developed to help developers upgrade their older
RPG RPG may refer to: Military * Rocket-propelled grenade, a shoulder-launched anti-tank weapon **''Ruchnoi Protivotankoviy Granatomyot'' (Russian: ''Ручной Противотанковый Гранатомёт''), hand-held anti-tank grenade laun ...
and
System/36 The IBM System/36 (often abbreviated as S/36) was a midrange computer marketed by IBM from 1983 to 2000 - a multi-user, multi-tasking successor to the System/34. Like the System/34 and the older System/32, the System/36 was primarily progr ...
code to the new RPG IV or OS/400 standard. The program allows developers to save code "snippets" for re-use or testing. The current version is 4.06


Platforms

The GoAnywhere applications are VMware Ready and operate in a virtualized or static environment on the following operating systems. *
Linux Linux ( or ) is a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically packaged as a Linux distribution, which i ...
* Novell SUSE Linux Enterprise Server (SLES) *
Red Hat Enterprise Linux Red Hat Enterprise Linux (RHEL) is a Commercial software, commercial Open-source software, open-source Linux distribution developed by Red Hat for the commerce, commercial market. Red Hat Enterprise Linux is released in server versions for x86-6 ...
*
Unix Unix (; trademarked as UNIX) is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, whose development started in 1969 at the Bell Labs research center by Ken Thompson, Dennis Ritchie, a ...
*
Mac OS X macOS (; previously OS X and originally Mac OS X) is a Unix operating system developed and marketed by Apple Inc. since 2001. It is the primary operating system for Apple's Mac computers. Within the market of desktop and lapt ...
*
Windows Windows is a group of several proprietary graphical operating system families developed and marketed by Microsoft. Each family caters to a certain sector of the computing industry. For example, Windows NT for consumers, Windows Server for ...
*
HP-UX HP-UX (from "Hewlett Packard Unix") is Hewlett Packard Enterprise's proprietary implementation of the Unix operating system, based on Unix System V (initially System III) and first released in 1984. Current versions support HPE Integrit ...
* Solaris * IBM System p (AIX) *
IBM i IBM i (the ''i'' standing for ''integrated'') is an operating system developed by IBM for IBM Power Systems. It was originally released in 1988 as OS/400, as the sole operating system of the IBM AS/400 line of systems. It was renamed to i5/OS i ...
*
IBM System z IBM Z is a family name used by IBM for all of its z/Architecture mainframe computers. In July 2017, with another generation of products, the official family was changed to IBM Z from IBM z Systems; the IBM Z family now includes the newest mod ...
*
Amazon EC2 Amazon Elastic Compute Cloud (EC2) is a part of Amazon.com's cloud-computing platform, Amazon Web Services (AWS), that allows users to rent virtual computers on which to run their own computer applications. EC2 encourages scalable deployment o ...
* Microsoft Azure


See also

* Comparison of FTP server software


Notes

{{Reflist, 30em


External Reviews/Links

Business Wire - GoAnywhere Services
br /

br /> Secure communication Managed file transfer