September 8, 2017, by
Posted in Secure File Transfer, Security

Are you looking for the best way to send encrypted files from your business applications and mobile devices? This post will explain how Thru’s encrypted file exchange service enables top companies like VMware and Visa to securely exchange information within and outside the organization.

Secure File Transfer - Thru Inc

In today’s digital world, it is now vital to ensure that your corporate data is being transferred and stored online in the most secure way possible to avoid data breaches and also meet compliance with requirements like HIPAA and GDPR. By far one of the most important aspects for securing data online is by using encryption for all online file exchanges both within and outside the organization.

FTP, Standard Email and Consumer File Storage Apps Put Corporate Data at Risk

Many organizations are still using outdated and unsecure methods for transferring files that do not encrypt files out-of-the-box (e.g. FTP, email and free consumer file storage apps). When using these solutions to collaborate on projects containing sensitive information, that information is at high risk of being retrieved by cybercriminals and is also a violation against common data security standards and requirements like PCI and HIPAA.

The Best Way to Send Encrypted Files from Any Device

So what can your business do to ensure that all file exchanges are encrypted on any device? By far the most comprehensive solution for your secure file sharing needs is Thru. With Thru, your company can send and share encrypted files and attachments from your existing business applications and devices. One big advantages of Thru over other file sharing services is the number of end points you can use to send encrypted files and the flexible integration capabilities. Here are some of the end points you can use to send encrypted files with Thru:

  • Web Browser Application (Desktop and Mobile)
  • Email Add-Ins (Outlook and IBM Notes)
  • Business Applications (Salesforce and SharePoint)
  • Desktop Sync
  • Mobile Apps (iOS and Android)
  • FTP/SFTP/FTPS Clients
  • Third Party Applications with Thru API & Tools

The image below shows an example of the the Thru Add-In for Microsoft Outlook interface. This add-in is one of the most popular because it allows users to send encrypted attachments (both files and folders) from within Outlook and also has a side panel feature for users to access and view files they have stored in Thru. Users simply open a new email and select a “Send with Thru” button to send encrypted files.

When files are sent from Thru applications, the files are uploaded to Thru servers (cloud or on-premises) and a secure link is sent to recipients in their inbox where they can securely download the encrypted files and folders. Senders of Thru messages can also choose to require recipients to log in and download the files to prevent files from being forwarded and they can also attached an encrypted message that can only be viewed by the recipient. After recipients download the files, Thru sends you a “read receipt” message to your inbox letting you know your files have been accessed.

Send Encrypted Attachments from Microsoft Outlook - Thru Inc

According to Gartner in the 2017 Magic Quadrant for Content Collaboration Platforms, “Thru is the right choice for midsize and large organizations aiming to improve collaboration through secure exchange of large files between departments, customers and partners.” It’s because of this fact that large organizations with high security standards like Visa have chosen Thru as a platform for encrypted file transfer and sharing.

Visa Uses Thru for Encrypted File Transfers

Some of Thru’s other security features and capabilities that make Thru one of the leaders for secure file exchange are:

  • Full audit tracking for file and user activities (with reporting)
  • Rule-based alerts
  • Thru Dropbox tool for external users to upload files securely without having to register for an account
  • Single-Sign-On (SSO) authentication via Thru Active Directory SSO Client, Integration with SAML 2.0 Identity Providers, and Azure Active Directory Integration
  • Managed Firewalls and Intrusion Prevention Systems (IPS) that monitor network activities for malicious patterns

To learn more about using Thru for secure file sharing, watch the webinar or download the Thru Security Overview.

Encrypted File Sharing Service - Thru Inc

Be the first to comment.

Leave a Reply


You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

*


2017 Gartner Magic Quadrant for Content Collaboration Platforms