Secure File Transfer Protocol (SFTP)
Hackers are constantly looking for a way to exploit a vulnerability or weakness within your IT infrastructure. Data transfers without secure connectivity and authentication can expose your organization to unnecessary risk. With the Secure File Transfer Protocol (SFTP) module for EFT, Globalscape’s managed file transfer solution, you can minimize attack vectors with authentication and secure data transfers through SFTP-ready FTP clients.
What Is SFTP?
SFTP is a platform-independent, secure transfer protocol preferred by IT professionals worldwide. SFTP provides a single connection port for easy firewall navigation, password and public key authentication, and strong data encryption, which prevents login, data, and session information from being intercepted and/or modified in transit. The SFTP module for the Enhanced File Transfer (EFT) platform enables authentication and secure file transfers with SFTP-ready FTP clients, such as CuteFTP® file transfer software.
With the SFTP module for EFT organizations can:
- Minimize attack vectors
- Ensure ongoing compliance with regulations
- Achieve easy security configuration
- Protect data at rest and in transit
- Control access to data
Ease of Administration and Integration
SFTP provides a single connection port for transversal of firewalls, with one-click setup, cross platform support, maximum connectivity coverage, enhanced management of keys, ciphers, and MACs, and greater identity protection through public key authentication. Built-in data checking mechanisms and detailed logging determine exact reasons for success or failure of SFTP sessions.
See Also: Secure FTP & SFTP Server Integration with EFT SMB, Globalscape’s SMB managed file transfer solution.
You can choose whether connecting clients and trading partners supply a public key (identify file) for dual-factor authentication, in addition to standard password authentication. EFT with the SFTP module validates the integrity of transmitted data, allows certain encryption algorithms for maximum security, or allows all available types for maximum flexibility. You can create key pairs, manage keys, import/export keys and specify the allowed key (identify file) for a user account.