What's working
- Protocol breadth (SFTP, AS2, AS4, FTPS, HTTPS) wins enterprise shortlists.
- Compliance story (HIPAA, PCI DSS, GDPR) is mature and well documented.
- Installed base of 3,000-plus orgs creates strong renewal revenue inertia.
GoAnywhere MFT is the category's most recognized mid-market name, but three consecutive years of critical CVEs and a forced perpetual-to-subscription migration have opened real displacement windows. This profile sticks to what is visible on public pages, review sites, and security advisories. It tells you where the cracks are and what to do about them before the next breach cycle resets the conversation.
GoAnywhere is converting perpetual license holders to subscription, with reviewers publicly citing effective price doubles on maintenance-to-subscription conversions. That gives competitors a specific dollar number to beat in every displacement conversation.
ProductA third consecutive critical vulnerability (CVE-2025-10035, CVSS 10.0, actively exploited as a zero-day in September 2025) makes security posture the primary evaluation axis for any buyer considering GoAnywhere. Vendors with fewer public CVEs now have a structural narrative advantage at renewal.
ProductGoAnywhere's own team acknowledged on G2 in Q4 2025 that the admin UI is not up to 2026 standards and announced plans for AI-assisted natural-language workflow building. This is an admission of a usability debt that competitors can exploit immediately, before the refresh ships.
NarrativeGoAnywhere is leaning into Fortra's broader cybersecurity portfolio to justify renewals, positioning itself as part of an integrated security stack rather than a standalone MFT tool. For large enterprises this could be sticky; for mid-market buyers it raises complexity and total cost concerns.
GTMG2 carries 372-plus reviews with heaviest concentration in mid-market and large enterprise segments, particularly financial services and healthcare. That buyer profile has the lowest tolerance for unpatched CVEs and the most active compliance scrutiny at renewal time.
Not raw changes. Directional evidence across product, pricing, content, and market motion.
We track real changes across pricing, positioning, and product. You get clear signals in one place and push them to your team instantly.
Works with the communication tools you already use
Microsoft Security Blog
Confirms ransomware group Storm-1175 exploited CVE-2025-10035 as a zero-day, lending institutional weight to the CVE trust deficit signal.
OPSWAT Blog
Confirms GoAnywhere holds a G2 Leaders Grid position while the category is actively adding new Leader-tier entrants, increasing competitive pressure from multiple directions.
Public review summary
Review sentiment is broadly positive on protocol support and compliance depth, but recent reviews on G2 and GetApp surface clear pricing friction and security fatigue. Volume is highest on G2 (372-plus reviews) with moderate presence on GetApp and Capterra.

Toarn AI
Public signal synthesis
Grade B · Strong functional ratings are weighed down by credible, recent complaints about forced subscription pricing and the CVE track record, which lower overall confidence in the vendor relationship.
Sources: G2, GetApp, Capterra, PeerSpot
Executive summary · Read this first
GoAnywhere holds a G2 Leaders position and claims more than 3,000 enterprise and mid-market customers. On paper that is a strong installed base. In practice, the CVE track record from 2023 through Q3 2025 has made security-sensitive buyers treat every renewal as a re-evaluation.
The forced migration from perpetual to subscription licensing has compounded this. Reviewers on G2 cite effective price doubling when maintenance fees are converted to subscription rates. That combination of security anxiety and sticker shock is the clearest displacement signal in the category right now.
The product roadmap is signaling a UI modernization and AI-assisted workflow building for 2026, which acknowledges the dated admin experience that reviewers flag consistently. But roadmap promises do not undo two years of exploitation headlines, and Kiteworks and Progress MOVEit are actively using those headlines in their own positioning.
The window for challengers is not a feature gap. It is a trust gap. Any MFT vendor that can credibly prove a cleaner security posture and simpler pricing will win the renewal conversations GoAnywhere is now losing.
Progress released MOVEit 2025.1 in late 2025, adding OpenID Connect SSO across Transfer, Automation, and Cloud, and file aging alerts for proactive SLA monitoring.
Kiteworks acquired secure email platform Zivver in mid-2025, expanding its Private Data Network to unify MFT, SFTP, secure email, and web forms on a single governed platform.
Axway MFT held a G2 Spring 2026 Leaders Grid placement alongside GoAnywhere, MOVEit, and Kiteworks, with 60 percent of its reviewer base categorized as enterprise segment.
Noise
Product · Q1 2023 to Q1 2026
Security posture deteriorating relative to peersGoAnywhere has been hit by three high-severity CVEs in as many years: CVE-2023-0669 (exploited by the Cl0p ransomware group, breaching 130 companies), CVE-2024-0204 (CVSS 9.8, authentication bypass), and CVE-2025-10035 (CVSS 10.0, exploited as a zero-day before public disclosure, linked to Storm-1175 ransomware operators deploying Medusa).
Enterprise security buyers in regulated verticals now treat GoAnywhere renewals as mandatory re-evaluations. A CISO who approved the tool in 2022 has to explain to their board why they kept it through three critical exploits. That is a career-risk conversation, and it shortens the sales cycle for any credible alternative.
This is not bad luck. Three critical CVEs in three years in the same product's admin surface is an architecture signal, not a patch cadence issue. Vendors that can show a structurally hardened deployment model (e.g., zero public admin console exposure by design) have a concrete technical wedge, not just a marketing one.
High impact
Strong: all three CVEs are publicly documented by Fortra, CISA, and Microsoft Threat Intelligence, with confirmed in-the-wild exploitation for CVE-2023-0669 and CVE-2025-10035.
Build a one-page CVE comparison card for your sales team. Name the incidents, name the ransomware groups. Use it in every displacement conversation.
Pricing and packaging · Q4 2024 to Q1 2026
Pricing disruption creating churn surfaceGoAnywhere has begun requiring perpetual license holders to convert to subscription. Reviewers on G2 publicly describe the effective cost as doubling when the prior perpetual maintenance fee is converted to a subscription rate. Fortra's own responses on G2 confirm the model change and frame it as industry standard.
The mid-market buyers GoAnywhere targets are budget-constrained. A forced price increase at renewal, arriving in the same cycle as a CVSS 10.0 exploit, is the highest-intent displacement signal available. Buyers are actively shopping alternatives right now, not in 12 months.
Fortra is executing a recurring revenue conversion that is rational from a business model standpoint but poorly timed against the CVE backdrop. Competitors with transparent, stable pricing have a two-quarter window to capture the resentful renewals before GoAnywhere's improved product narrative (AI workflows, UI refresh) matures.
High impact
Strong: the pricing complaint is documented in multiple G2 reviews with vendor-confirmed responses, and the pricing page confirms the quote-based model with module-based add-ons.
Price against their subscription equivalent in every proposal. Show a three-year total cost comparison with your renewal terms locked.
Product · Q4 2025 to Q1 2026
Catch-up investment, not category leadershipGoAnywhere's own team acknowledged on G2 in late 2025 that the admin UI is not at 2026 standards. They announced plans to ship a modernized web client interface and AI-assisted natural-language workflow building throughout 2026.
The announcement confirms what reviewers on G2, SourceForge, and GetApp have flagged for two years: the interface is dated, and advanced workflow setup has a steep learning curve. If the roadmap ships on time, GoAnywhere closes a real retention risk. If it slips, the complaint surface grows and competitors have fresh material.
Treat this as a retention move, not a competitive advance. The AI workflow feature is the only genuinely forward-looking item. Competitors that already ship modern UX and workflow builders without a 2026 roadmap dependency can position now, before the update lands.
Medium impact
Moderate: the roadmap announcement is a public response on G2, not a formal product release note. Delivery timing is unconfirmed.
Demo your workflow builder now. Do not wait for GoAnywhere to ship theirs.
Ongoing competitor monitoring
B2B SaaS founders and product leaders at MFT software companies competing with or displacing GoAnywhere MFT in mid-market and enterprise accounts.
Signal-based, publicly observable claims only. All CVE data sourced from Fortra security advisories, Microsoft Security Blog, and CISA-confirmed disclosures. Pricing and review claims sourced from G2, GetApp, Capterra, and PeerSpot. No private or leaked information used.
Sources consulted: GoAnywhere homepage and pricing page, Fortra security advisory portal, G2 reviews and pricing page, GetApp, Capterra, PeerSpot, SourceForge, Microsoft Security Blog, OPSWAT G2 Grid commentary, Kiteworks press releases, Progress MOVEit product blog. Archive comparisons used to track pricing page language drift. Minimum six independent surface types consulted.
Not affiliated with GoAnywhere MFT or Fortra. This report is compiled from publicly available sources only. No personal information was collected or processed. All analysis reflects editorial interpretation of public signals, not statements of fact. No guarantee is made as to accuracy, completeness, or timeliness. Business decisions based on this report are solely the reader's responsibility. Toarn accepts no liability for outcomes resulting from reliance on this analysis.
Q1 2026 · Updated Apr 10, 2026