Secure File Transfer and Compliance
Safeguard sensitive data with end-to-end encryption. Defend against intruders with rigorous access controls. Secure protocols to remain compliant and secure.
File Transfer Encryption for Data
Secure your data and stay compliant.
Data in Transit:
Secure file transfer protocols such as SFTP (SSH File Transfer protocol), FTPS (File Transfer Protocol Over SSL/TLS) and HTTPS (HTTP over SSL) use strong encryption algorithms to prevent man-in-the-middle attacks ensuring your data is securely transferred.
Encrypt your files using Pretty Good Privacy (PGP).
Data at Rest:
All data stored in Thru is secured by AES 256-bit encryption. Only customers can access and decrypt their data.
Effective Authentication Methods for Secure File Transfer
Prevent unauthorized access to your data.
Control access to actions, workflows and data with role-based access control.
Thru supports password and public key infrastructure (PKI) authentication for SFTP and FTPS endpoints. The Thru Node (our managed file transfer agent) uses HTTPS to transfer files and has strong authentication with Thru.
Monitoring File Transfers
Identify issues fast and prevent business disruption.
Resolve issues fast with automatic alerts and detailed dashboards.
Use our monitoring API to connect Thru to your security information and event management (SIEM) system.
Real-time antivirus scanning of code, data areas and files prevents cyberattacks. Infected files are automatically quarantined to eliminate security threats.
Multi-level retention policies can keep files in place, archive them or purge them.
Remain compliant with legal and industry regulations.
By securing data in transit and at rest, Thru helps you remain General Data Protection Regulation (GDPR) compliant.
Thru helps you maintain Health Insurance Portability and Accountability Act (HIPAA) compliance with its tracking and monitoring capabilities.
Thru runs in certified Microsoft Azure data centers.
Our standard service level agreement (SLA) is 99.9%.
Thru Cloud Security
We monitor global infrastructure and security events with security information and event management (SIEM) software 24/7.
Weekly automated scanning of Thru’s cloud infrastructure in all service geographies.
Thru Application Security
Web Portal Security
Protection against OWASP Top 10 web application security risks. Portals are scanned for security vulnerabilities on a regular basis.
Public API Protection
Secured by secure tokens.
- Weekly automated vulnerability assessments of Thru platform
- Periodic penetration testing by third-party security vendors
- Static application security testing is performed in all phases of Thru’s SDLC with triage and remediation
- Dynamic application security testing is performed at the testing and release SDLC phases using automated cloud security tools
FAQs about Secure File Transfer
What is the difference between FTP and MFT?
What is SFTP?
What is the most secure file transfer protocol?
How long should data be retained?
How do I send a secure email attachment?
How do I securely send confidential information over email?
What is the best way to send files securely?
How can I make a bring your own device (BYOD) policy that is secure and simple?
Need to know more about data security and compliance for file transfers?
Get answers, not a sales pitch. Since 2002, we have analyzed, discussed and solved secure file transfer challenges.