What is the Thru Node?
How do HTTPS file transfers work in Thru?
How to Use HTTPS to Securely Transfer Files
Situation 1: Node to Server
The node pushes files to Thru, which pushes them to a target server endpoint.
Situation 2: Node to Client
The node pushes files to Thru, then the target client endpoint pulls them.
How do customers use Thru Node?
Use Case 1: External File Transfers
Several hundred wholesalers frequently transfer files detailing inventory levels and orders to a manufacturer. The wholesalers have little IT expertise or time to set up or maintain servers. The manufacturer asks each wholesaler to install a lightweight Thru node. With the nodes, each wholesaler drops files into a folder on their laptop to automatically transfer them.
Use Case 2: Internal File Transfers
An enterprise stores signed contracts on two servers in different geographic locations so that it always has a backup copy. A Thru node is installed on each server. Node A transfers the signed contracts to Node B.
Related Protocol Resources
To protect data in transit, it is important to pick a secure file transfer protocol.
See which secure file transfer protocol is best for your use cases »
Thru also supports file transfers with FTPS client or server endpoints.
See how Thru works with FTPS »
Thru supports SFTP client and server endpoints to meet your requirements.
See how SFTP is used for internal and external file transfers »
Secure File Transfer Overview
Encrypted protocols are only part of how Thru keeps file transfers secure. See how authentication and monitoring capabilities give you complete control over security.