HTTPS
Hypertext Transfer Protocol Secure
Does Thru support HTTPS file transfers?
How do they work?
Yes. Thru supports HTTPS file transfers with the Thru Node.
What is the Thru Node?
The Thru Node is a command line agent that is installed on your or your partners’ computers. It is orchestrated from the cloud but installed on-premises.
How do HTTPS file transfers work in Thru?
Because Thru can act as a client or server, the node can always be used as an endpoint.
How to Use HTTPS to Securely Transfer Files
Situation 1: Node to Server
The node pushes files to Thru, which pushes them to a target server endpoint.
Situation 2: Node to Client
The node pushes files to Thru, then the target client endpoint pulls them.
How do customers use Thru Node?
Customers use the node for external and internal file transfers.
Use Case 1: External File Transfers
Several hundred wholesalers frequently transfer files detailing inventory levels and orders to a manufacturer. The wholesalers have little IT expertise or time to set up or maintain servers. The manufacturer asks each wholesaler to install a lightweight Thru node. With the nodes, each wholesaler drops files into a folder on their laptop to automatically transfer them.
Use Case 2: Internal File Transfers
An enterprise stores signed contracts on two servers in different geographic locations so that it always has a backup copy. A Thru node is installed on each server. Node A transfers the signed contracts to Node B.
Related Protocol Resources
Protocols Overview
To protect data in transit, it is important to pick a secure file transfer protocol.
See which secure file transfer protocol is best for your use cases »
FTPS Overview
Thru also supports file transfers with FTPS client or server endpoints.
See how Thru works with FTPS »
SFTP Overview
Thru supports SFTP client and server endpoints to meet your requirements.
See how SFTP is used for internal and external file transfers »
Secure File Transfer Overview
Encrypted protocols are only part of how Thru keeps file transfers secure. See how authentication and monitoring capabilities give you complete control over security.