Your browser does not allow storing cookies. We recommend enabling them.


Secure File Transfer Protocol (SFTP)

The Secure File Transfer Protocol (SFTP) is a de facto industry standard for secure file transfers, and it is natively supported by the Tectia client/server solution.

SFTP allows secure copying, moving, editing, and removing of files over TCP/IP networks. Scripted file transfers between enterprise servers can be secured by using the Tectia command-line SFTP and SCP (Secure Copy) tools with automated and ad hoc file transfers. For secure interactive file transfers, Windows users have the Tectia Secure File Transfer GUI.

Migration to secure file transfer can be made gradually. The Tectia products can be configured to allow fallback to plaintext FTP, in case an SFTP connection cannot be established. This makes it possible to use SFTP where it is applicable, but still permits connections to those FTP servers that must remain operational, for example, on a third-party network.

Tectia supports the legacy OpenSSH SCP implementation for easy migration of OpenSSH environments to Tectia, creating a smoother transition to ensure seamless connectivity during the migration period.

SFTP features include:

File transfer resume

The file transfer resume feature allows resuming interrupted file transfers instead of restarting the whole operation. The file transfer resume uses file hashing to determine the point of resume. For increased performance, you can apply the checkpoint/restart mechanism for optimum handling of interruptions in large file transfers.

Anonymous secure file transfers

Tectia Server can be configured to allow anonymous file transfers in environments, where user authentication is not required. When anonymous authentication is in use, users do not need to type in a password.

Easy SFTP subsystem chrooting

Tectia Server can be easily configured to confine users to a specific directory tree (e.g., home directory) for added security and ease of use.

Want to see how PrivX can help your organisation?

Are you a DEVELOPER accessing cloud hosts, are you a IT ADMIN managing access & credentials in your corporation, are you BUSINESS MANAGER and want to save money or are you responsible of IT SECURITY in DevOps