Secure File Transfer and Compliance

Safeguard sensitive data with end-to-end encryption. Defend against intruders with rigorous access controls. Secure protocols to remain compliant and secure.

 

File Transfer Encryption for Data

Secure your data and stay compliant.

Data in Transit:

Secure file transfer protocols such as SFTP (SSH File Transfer protocol), FTPS (File Transfer Protocol Over SSL/TLS) and HTTPS (HTTP over SSL) use strong encryption algorithms to prevent man-in-the-middle attacks ensuring your data is securely transferred.

File-level Encryption:

Encrypt your files using Pretty Good Privacy (PGP).

Data at Rest:

All data stored in Thru is secured by AES 256-bit encryption. Only customers can access and decrypt their data.

Effective Authentication Methods for Secure File Transfer

Prevent unauthorized access to your data.

authentication for secure file transfer

Application Authentication

Password authentication is required to access any part of Thru. Increase security by implementing multi-factor authentication with text (SMS) or simplify login with single sign-on via SAML 2.0.

User Authentication

Control access to actions, workflows and data with role-based access control.

Endpoint Authentication

Thru supports password and public key infrastructure (PKI) authentication for SFTP and FTPS endpoints. The Thru Node (our managed file transfer agent) uses HTTPS to transfer files and has strong authentication with Thru.

Monitoring File Transfers

Identify issues fast and prevent business disruption.

Visibility

Resolve issues fast with automatic alerts and detailed dashboards.

Use our monitoring API to connect Thru to your security information and event management (SIEM) system.

Antivirus Scanning

Real-time antivirus scanning of code, data areas and files prevents cyberattacks. Infected files are automatically quarantined to eliminate security threats.

Retention

Multi-level retention policies can keep files in place, archive them or purge them.

monitoring and compliance for secure file transfer

Compliance

Remain compliant with legal and industry regulations.

GDPR

By securing data in transit and at rest, Thru helps you remain General Data Protection Regulation (GDPR) compliant.

HIPAA

Thru helps you maintain Health Insurance Portability and Accountability Act (HIPAA) compliance with its tracking and monitoring capabilities.

Data Centers

Thru runs in certified Microsoft Azure data centers.

SLA

Our standard service level agreement (SLA) is 99.9%.

.

Thru Cloud Security

Network Protection

High availability for all network components

Multiple zones deployed for access controls and traffic logging

Dedicated VPN tunnels with multi-factor authentication for access into production systems by operations personnel

Intrusion protection / detection software

Domain access control by Active Directory in each deployed geography

Whitelisting and connection management of Thru’s server endpoints protect against security scanning and denial of service attacks

System Monitoring

We monitor global infrastructure and security events with security information and event management (SIEM) software 24/7.

Infrastructure Scanning

Weekly automated scanning of Thru’s cloud infrastructure in all service geographies.

Thru Application Security

Thru secure file transfer application cloud surveillance

Web Portal Security

Protection against OWASP Top 10 web application security risks. Portals are scanned for security vulnerabilities on a regular basis.

Public API Protection

Secured by secure tokens.

Testing

  • Weekly automated vulnerability assessments of Thru platform
  • Periodic penetration testing by third-party security vendors

Software Development

  • Static application security testing is performed in all phases of Thru’s SDLC with triage and remediation
  • Dynamic application security testing is performed at the testing and release SDLC phases using automated cloud security tools

FAQs about Secure File Transfer

What is the difference between FTP and MFT?

If an IT team uses on-premises FTP servers, they cannot easily see which files were delivered or resolve issues. Managed file transfer (MFT) solutions provide one place to manage and monitor file transfers. Read more about the differences between MFT and FTP »

What is SFTP?

SFTP stands for SSH File Transfer Protocol. It is a secure file transfer protocol because it uses SSH (Secure Shell) to encrypt files as they are transferred. Check out how SFTP secures file transfers and see how it is different from FTPS »

What is the most secure file transfer protocol?

SFTP, FTPS and HTTPS are relatively equal in security, but SFTP is the most secure. SFTP is the most secure because the connection is encrypted from the beginning. FTPS uses too many ports for file transfer and HTTPS was not built for file transfer. See why SFTP, FTPS and HTTPS are more secure »

How long should data be retained?

There is no easy answer to this question. You cannot keep data forever because it is expensive and sometimes against the law. Good retention policies are based on a few factors, including government regulations, industry regulations and business cycles. Discover other factors to consider when creating data retention policies »

How do I send a secure email attachment?

Use our file sharing solution to securely send files within Outlook. Thru encrypts the file and sends recipient(s) a secure link. After recipients download the files, Thru sends a “read receipt” message to your inbox.

How do I securely send confidential information over email?

Secure messages are typically used to securely send sensitive information like passwords, social security numbers or financial information. In Thru, you can add a private message on a separate tab before sending the email. See how to send encrypted messages with Thru »

What is the best way to send files securely?

With Thru, it is easy to send and share encrypted files and attachments from your existing business applications and devices. See how to securely send files »

How can I make a bring your own device (BYOD) policy that is secure and simple?

We identified four steps to make a good BYOD policy: Create comprehensive guidelines, implement security policies, ensure data governance and train employees. Dive deeper into secure file transfer from mobile devices »

Related Secure File Transfer Resources

Plus500 logo

Plus500 Protects Customers’ Sensitive Financial Data

Plus500 customers frequently upload sensitive financial data to its servers. After switching to Thru, it was easy for Plus500 to satisfy all security and compliance requirements.
Read more of Plus500’s story »

Berghof Group Replaces FTP Server With a More Secure Solution

Using an FTP server for file transfers did not give Berghof Group the control and the efficiency it needed. Now, the organization has detailed insights into what files are shared and who is accessing them.
Read more about Berghof Group’s success »

antivirus scanning for secure file transfer

Dive Deeper into Thru’s Security Stance

For a more detailed explanation of how we ensure cloud, application and data security, download our datasheet.
Download the Thru Data Security and Compliance Datasheet »

 

Need to know more about data security and compliance for file transfers?
Get answers, not a sales pitch. Since 2002, we have analyzed, discussed and solved secure file transfer challenges.

 

Scroll to Top