Secure File Transfer

Important data and intellectual property in business and the enterprise are susceptible to theft. The most common form of file transfer, sending files as email attachments, does not provide sufficient protection for sensitive corporate data. Thru provides a secure and convenient solution to empower knowledge workers and secure file transfers.


Security

Secure File Transfer

Thru secures corporate data in transfer and at rest with much more than just encryption. Comprehensive network protection and application security ensure that data is secured at all times and business continues. File transfers are protected by multiple features which can be locked down from a policy perspective or adjusted by the end user as necessary.

  • Encryption using FIPS 140-2 compliant AES 256-bit encryption for data at rest
  • Encryption using AES 256-bit SSL/TLS encryption for data in transit
  • Set an expiration date for files, notifications on download of files, and an optional require a password
  • Multiple options for changing security settings or replacing or removing files after sending
  • Optional recipient authentication by policy or user discretion
  • Full antivirus scanning of every file in the system

Convenience

A secure file transfer solution should be convenient and easy to use to increase adoption. Thru provides an effortless experience for both the sender and the recipient, ensuring that almost anyone can use the solution without training or special software.

  • Enterprise connectors, desktop and web application for access from any location
  • Recipients do not need accounts
  • File downloads using Browser or Java
  • File uploads using Browser, Java, Active-X, or HTML5
Convenience Ease
Control

Data Control

Files are often scattered about the enterprise with little visibility or reporting on who has accessed each file and when. Consolidating these files not only makes it much easier to report, but it also makes it easier to secure. Thru empowers businesses to manage how sensitive information is sent between partners, customers, employees, and systems, while providing controls needed to help meet regulations such as HIPPA, GLBA, PCI and SOX.

  • Visibility into all file activities
  • Schedule file deletion using retention rules
  • Each file transfer is assigned a unique tracking number for reference and reporting
  • Comprehensive reporting for all activities on any file

Flexible Platform

Rather than adjusting business processes to utilize a solution, Thru adapts to fit your unique business processes. Enterprise connectors, an extensive API, multiple protocols and deployment options enable Thru to provide a comprehensive solution, eliminating the need for multiple file transfer deployments for different use cases.

  • Connectors for Outlook, IBM Notes, Salesforce.com, and SharePoint
  • Multiple file transfer protocols: HTTP, HTTPS, FTP, SFTP, and FTPS
  • Extensive API for custom integrations and programmatic file transfers
  • Cloud, on-premises, or hybrid deployment options
Flexibility