Your browser does not allow storing cookies. We recommend enabling them.

SSH

Secure File Transfer Protocol (SFTP)

The Secure File Transfer Protocol (SFTP) is a de facto industry standard for secure file transfers, and it is natively supported by the Tectia client/server solution.

SFTP allows secure copying, moving, editing, and removing of files over TCP/IP networks. Scripted file transfers between enterprise servers can be secured by using the Tectia command-line SFTP and SCP (Secure Copy) tools with automated and ad hoc file transfers. For secure interactive file transfers, Windows users have the Tectia Secure File Transfer GUI.

Migration to secure file transfer can be made gradually. The Tectia products can be configured to allow fallback to plaintext FTP, in case an SFTP connection cannot be established. This makes it possible to use SFTP where it is applicable, but still permits connections to those FTP servers that must remain operational, for example, on a third-party network.

SFTP features include:

File transfer resume

The file transfer resume feature allows resuming interrupted file transfers instead of restarting the whole operation. The file transfer resume uses file hashing to determine the point of resume. For increased performance, you can apply the checkpoint/restart mechanism for optimum handling of interruptions in large file transfers.

Anonymous secure file transfers

Tectia Server can be configured to allow anonymous file transfers in environments, where user authentication is not required. When anonymous authentication is in use, users do not need to type in a password.

Easy SFTP subsystem chrooting

Tectia Server can be easily configured to confine users to a specific directory tree (e.g., home directory) for added security and ease of use.


 

 
Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more