Secure copying, moving, editing and removing of files with SFTP
The SFTP (Secure File Transfer Protocol) functionality of SSH Tectia Client and Server provides a secure, drop-in replacement for plaintext FTP, allowing secure copying, moving, editing, and removing of files over TCP/IP networks.
Scripted file transfers
SSH Tectia Client and Server include versatile command line SFTP and SCP (Secure Copy) tools for easy scripting of automated and ad-hoc file transfers between enterprise servers.
Easy-to-use graphical user interface for Windows allows users to securely drag-and-drop files between local Windows and remote Unix, Linux, Windows, and mainframe systems.
File transfer resume
The file transfer resume feature allows resuming interrupted file transfers instead of restarting the whole operation. File transfer resume uses file hashing to determine the point of resume. For better performance, the EFT Expansion Pack offers a checkpoint/restart mechanism for optimum handling of interruptions in large file transfers.
Anonymous secure file transfers
SSH Tectia Server can be configured to allow anonymous file transfers in environments, where user authentication is not required. When anonymous authentication is in use, users do not need to type in a password.
MVS dataset listing
When used in conjunction with SSH Tectia Server for IBM z/OS, users of SSH Tectia Client can list IBM MVS (Multiple Virtual Storage) datasets as files and folders, facilitating seamless cross-platform file transfer between mainframe and non-mainframe systems.
Easy SFTP subsystem chrooting
SSH Tectia Server can be easily configured to confine users to a specific directory tree (e.g. home directory) for added security and ease of use.
OpenSSH SCP support
SSH Tectia supports the legacy OpenSSH SCP implementation for easy migration of OpenSSH environments to SSH Tectia, creating a smoother transition to ensure seamless connectivity during the migration period.
What to read next:
Reduce Secure Shell risk. Get to know the NIST 7966.
The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
ISACA Practitioner Guide for SSH
With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.