FTPS
File Transfer Protocol Secure

Does Thru support FTPS file transfers?
How do they work?

Yes. Thru is a cloud managed file transfer (MFT) solution, so there are no servers for your team to set up or maintain. You can use FTPS clients or servers as needed because Thru can act as a client or server.

Situation 1: Source FTPS Server to Target FTPS Server

Thru pulls files from a source FTPS server and pushes them to a target FTPS server.

Thru acts as a client to pulls and pushes secure file transfers from FTPS servers


FTPS client pushes and pulls secure file transfers to Thru

Situation 2: Source FTPS Client to Target FTPS Client

The source FTPS client endpoint pushes files to Thru, then the target FTPS client endpoint pulls them.


Situation 3: Source FTPS Server to Target FTPS Client

Thru pulls files from a source FTPS server endpoint. Then, the target client endpoint pulls files from Thru.

Thru pulls secure file transfers from FTPS and client pulls secure file transfer from Thru

Where can I have the FTPS server?

Thru can be deployed in our cloud or in your private Microsoft Azure or Amazon Web Services (AWS) cloud.

How much FTPS traffic can Thru handle?

Thru can handle a high volume of file traffic because it automatically scales with demand.

How do customers use FTPS endpoints in Thru?

Customers use FTPS endpoints to transfer files with partners and to transfer files between cloud applications.

Use Case 1: External File Transfer

A retailer wants to automatically transfer point-of-sale information from its stores around the world to its headquarters. The headquarters uses an FTPS server while the stores use a mix of FTPS client and server endpoints. Thru manages these transfers by acting as a client or server as needed.

FTPS client and servers used to automate secure file transfers from retailers to headquarter


Use Case 2: Transfers Between Cloud Applications

An enterprise wants to transfer information between two cloud applications: its customer relationship management (CRM) application and its enterprise resource management (ERP) system.

The process has 5 steps:

  1. The CRM generates reports.
  2. Those files are dropped into the source FTPS client endpoint.
  3. The source FTPS client pushes them to Thru.
  4. The target FTPS client, which is connected to the ERP system, pulls the files from Thru.
  5. The files land in the ERP.
secure file transfer between CRM and ERP cloud applications

Related Protocol Resources

Protocols Overview

To protect data in transit, it is important to pick a secure file transfer protocol.
See which secure file transfer protocol is best for your use cases »

SFTP Overview

Thru supports SFTP client and server endpoints to meet your requirements.
See how SFTP is used for internal and external secure file transfers »

HTTPS Overview

The Thru Node, our managed file transfer (MFT) agent, transfers files over HTTPS.
Get more details about how HTTPS works and its use cases »

Secure File Transfer Overview

Encrypted protocols are only part of how Thru keeps file transfers secure. See how authentication and monitoring capabilities give you complete control over security.

 

Have questions about security and compliance for file transfers?

Get answers, not a sales pitch. Since 2002, we have addressed and solved secure file transfer challenges.

 

Scroll to Top