Cerberus FTP Server

What is SCP?

The Secure Copy Protocol (SCP) is a simple file transfer protocol that can send or retrieve a single file at a time, and is ideal for straightforward use cases such as securely copying files to a remote location, e.g. for a firmware update. An SCP file transfer begins by opening an SSH connection to the remote destination. Once connection is established, files are exchanged securely and the connection is pulled down and terminated upon transfer completion.

Ideal for Remote Updates and Installs

Executable via command line

Because of SCP’s limitations, folder/directory uploads and downloads via SCP must be done recursively, and the protocol does not natively support a GUI. If you want to provide a user interface and the ability for users to browse a folder, you’ll need to use an SFTP server instead.

Full Feature List

Cerberus FTP Server HIPAA Compliance Icon

Protocols

FTP, FTP/S, SFTP, SCP, HTTP/S

Transfer Security

SSH, SSL, FIPS 140-2

MFT Automation

Event, Alert & Sync Tools

Cerberus FTP Server Automated File Transfer Event Manager Icon

Environment

Windows Server, Cloud & Virtual

Access Protection

IP, User & Protocol Restriction Tools

Account Management

AD, LDAP, 2FA, SSO & More

Auditing and Reporting

File Access, User & Admin Logging

Cerberus FTP Server Automated File Transfer Event Manager Icon

Administration Tools

API, Sync Manager, & Other Tools

Cerberus FTP Server Editions

Professional

Secure file transfer server for Windows

  • FTP, FTPS, SFTP & SCP
  • IP access controls
  • Groups & virtual directories
  • Web admin & SOAP API
  • AD/LDAP integration
  • FIPS 140-2 encryption
  • Server replication
  • Phone & email support

$999 / year

View Professional

Enterprise

Enhanced automation & security

  • All Professional features
  • HTTP/S web client
  • Okta & Entra ID SSO support
  • Event automation & alerts
  • File retention policies
  • Ad hoc file sharing with OTPs
  • Advanced stats & reporting
  • Phone & email support

$2,499 / year

View Enterprise

Cerberus FTP Server Five Star CNET Reviews

Enterprise Plus

Mission-critical performance & support

  • All Enterprise features
  • Scalable global solution
  • 24/7/365 severity 1 support
  • Rogue transfer detection
  • Performance testing
  • Automated network scanning
  • Upgrade & migration support
  • DR, test & dev licenses

$4,999 / year

View Enterprise Plus

Cerberus FTP Server 5 Star G2 Reviews

Raved and Reviewed

 

Here’s what a few of our many satisfied customers have to say about Cerberus FTP Server.

“Our users have found Cerberus to be straightforward.  We have handled many service tickets over the past three years, and Cerberus has had the least number of issues, by far.”

James Fayson

IT Service Owner, PACE, OASIS, Duke Health Technology Solutions

“We’ve been using Cerberus for at least five years, and it’s been awesome. Everything’s been very simple and easy, and we haven’t come across any limitations. It always just seems to work.”

Jake Cloward

Support Manager, Companion Corporation

“It’s not designed to be complicated, and it doesn’t need to be managed. I can hire someone new and they can be up to speed in minutes. Everyone on the team loves it.”

Tim Klein

Systems Administrator, Netalytics/Methasoft

Latest News

How to Secure an FTP or SFTP Server – 8 Essential Tips

Companies are a favorite target of today’s hackers, and one of the most common threat vectors is an organization’s file transfer system. To help you protect your business, we’ve put together these eight essential tips for securing an FTP or SFTP server. Step 1: Use...

Which File Transfer Protocols Should You Support? 

If you’re planning to install a secure file server to allow your clients or employees to securely share files, but you’re not sure which protocols to support, you have a lot of options. This article will help you figure out the right protocols to support.

A Guide to ISO 27001-Compliant File Transfer

The International Organization for Standardization (ISO) 27001 standard defines requirements that an organization’s information security management system must meet for the organization to receive third-party certification for its information security practices. ...