What Is Secure File Transfer?
A secure file transfer solution is the result of incorporating a combination of security measures, including encryption, authentication, access controls and auditing, to protect files shared within or between enterprise networks.
Share Files Using Secure File Transfer Protocols
Businesses share sensitive files using common protocols such as SFTP, FTPS and HTTPS. Therefore, a secure file transfer solution needs to be protocol-agnostic, meaning it can exchange a variety of files, internally or externally, regardless of protocol, file type or file size.
SSH or Secure File Transfer Protocol (SFTP)
SFTP is a secure file transfer protocol that uses SSH to encrypt files. The connection is encrypted before any files are shared. SFTP is one of the most used protocols for file transfers.
Hypertext Transfer Protocol over SSL (HTTPS)
HTTPS uses the Transport Layer Security (TLS) protocol to encrypt files. Recipients can download files directly from a web browser. HTTPS file transfers are handled by our Thru Node, which is a lightweight managed file transfer (MFT) agent.
File Transfer Protocol over SSL/TLS 1.2/1.3 (FTPS)
Like HTTPS, FTPS uses the TLS protocol to encrypt files. FTPS has two modes: one explicit and one implicit. Administrators choose between the modes based on their file security requirements and partners’ requirements.
Top Methods of Encrypting File Transfers
The best way to protect files is complete end-to-end encryption: Files are encrypted at the file level in addition to using encrypted protocols during transit and storage encryption at rest.
File Payload Encryption
How are file payloads secured?
Encrypt files all the way to its destination using the OpenPGP standard, based on Pretty Good Privacy (PGP) software. Thru’s MFT solution supports customer creation, import and management of keys and tokens.
Data Encryption in Transit
How is data in transit secured?
Data Encryption at Rest
How is data at rest secured in the cloud?
All files stored in Thru cloud platform are encrypted by AES 256-bit FIPS-compliant encryption with redundant and transparent policy and cryptographic key management.
How SFTP and MFT Work Together to Deliver Files
SFTP Secures Files
SFTP has become synonymous with secure file transfer. SFTP servers are ubiquitously used by organizations to exchange files with partners. Relying just on SFTP alone may be adequate for some types of file transfers, but sensitive, business-critical file transactions require additional enterprise-grade protection, control and visibility.
MFT Adds Control to SFTP Transfers
An MFT solution enhances secure file sharing by providing this required functionality. MFT is a file transfer system that utilizes multiple protocols including SFTP and is able to act as a client or server to enable push or pull connectivity between the MFT system and its endpoints. Readily available capabilities of MFT include comprehensive end-to-end security; tracking, logging and retention settings; and high availability.
Why You Need a Secure File Transfer Solution
As sharing data electronically continues to grow so does the number of regulations requiring stricter data security and privacy protection. Our MFT solution provides a proven means for businesses to achieve their goals of remaining compliant and strengthening data security.
Compliance and Standards
Corporate governance policies and industry security standards place additional requirements on data sharing and file transfers that our MFT service is designed to meet.
Data Center & Application
Mitigate distributed denial-of-service (DDoS) attacks and security breaches. Antimalware and antivirus scanning protect files from potential threats along every step in the transfer.
Automated File Transfers
Automating file transfers reduces human access and errors. Securely schedule and transfer files within or outside your network or to/from an integration platform.
How To Find Best File Sharing Solution
To find the best solution to securely transfer files, look for a comprehensive MFT solution with core functionality that includes
- End-to-end encryption to protect sensitive information.
- Advanced authentication to validate identities of users and connections—human, API, application and system.
- Role-based access controls (RBAC) to prevent unauthorized users from modifying endpoints or workflows.
- Multiple endpoints to programmatically transfer files.