Automate Secure FTP

Today's integrated environment requires that large amounts of information can be shared easily between organizations and their trading partners, customers and vendors. It is critical that these transfers are secured and audited to safeguard sensitive data and meet compliance requirements.


Secure FTP protects the confidentiality of sensitive file transfers using strong encryption technology and modern authentication methods.  The three secure FTP standards are:

  • SFTP - FTP over SSH
  • FTPS - FTP over SSL/TLS
  • SCP - Secure Copy

By establishing an encrypted tunnel between client and server systems, Secure FTP protects all information that flows through the connection including user ids, passwords, keys and file contents. It also maintains the integrity of the files through hash functions, ensuring that the data packets sent will match the data packets received.

Both GoAnywhere Director and GoAnywhere Services help organizations to fully automate and audit their Secure FTP activity.

GoAnywhere Director

GoAnywhere Director automates and streamlines file transfer processes with support for SFTP, FTPS and SCP secure protocols. It will help provide guaranteed delivery for file transfers with support for auto-retry of connections, auto-resume for interrupted file transfers, and integrity checks of data packages. File transfers can be fully automated using GoAnywhere Director's integrated scheduler or from command-line calls within your applications. Detailed audit logs are easily viewed through an intuitive browser-based dashboard and can be exported or directed to a central SYSLOG server.

GoAnywhere Services

The GoAnywhere Services Secure FTP Server also supports SFTP, FTPS and SCP protocols for trading partners and others who need to initiate file transfers with your organization. Files can be quickly uploaded into (or downloaded from) GoAnywhere Services secure environment using any popular FTP client software. Accounts for trading partners are easy to set up with private and shared folder support, granular permission levels, IP whitelists, AD and LDAP authentication. All activity is tracked through robust audit logs. Systems can be clustered with support for Active-Active failover and Load Balancing.