We provide products for secure, managed file transfer. With support for all the main open standard protocols and main operating systems in use by enterprises both large and small, we can provide a cost effective solution for your needs.
This section provides an introduction to the main features and functionality. There are additional features and custom settings that are detailed in our documentation. The capabilities of the product suit most environments and work flows that we have encountered. But please don't hesitate to contact us if you would like more detailed information or to ask how a specific scenario can be accomplished. We'd love to hear your scenario as well as provide access to detailed offline documentation and a free trial of the software.
The product is designed to be totally automated, prompt-less, and without interaction. Once installed and configured properly, it should operate in the background and need no direct attention from the user or the administrator.
Security, correctness, functionality, ease-of-use, and performance are all important factors for SFTPPlus and we focus on them in this order.
Information related to standards and regulations such as FIPS 140-2, HIPAA/HITECH, ISO27001, and GPG 13 is located in the User's Guides.
The server-side module is passive and is the repository for the files that are pushed to or pulled from it.
The server-side module supports all main open standard file transfer protocols including:
For more details, see the server-side features
The client-side module is used to push files to the Server or pull files from the Server. It is designed for automated transfers (not interactive transfers) that are executed at configured events or at a scheduled time. All of this is managed from a single place.
The client-side module supports all main open standard file transfer protocols including:
The client monitors local or remote folders and triggers transfers or other actions as soon as files are found in the monitored folders. It can be set up to:
All actions are fully automated and the client runs as a system server / daemon, without any need of manual intervention during the process.
For more details please see the client-side features.
It is available for installation on a wide range of operating systems and platforms. For a complete list of supported systems, check the dedicated page from the documentation. Here is a brief, non-exhaustive list:
Configuration is done using a plain text file and / or a web browser graphical configuration tool using a JSON-RPC based API.
Account credentials can be retrieved from the operating system accounts, (including support for Active Directory, Centrify, NIS, etc) or from an application specific accounts database. Authentication can be performed based on username and password / SSH keys / SSL PKI certificates.
All actions are recorded using structured logging inside a detailed audit trail. Logs can be persisted as:
For more details, see the administration features.