FTPS is a common method of securing an FTP connection. File Transfer Protocol (FTP) was originally designed to allow users to browse directories and transfer files between computer systems. The problem is that the FTP protocol has no provisions for security, and all information, including usernames, passwords and file data, is transmitted unencrypted. So anyone on the same network can easily examine the data as it is sent between machines.
More Secure than FTP
Available in all versions
FTPS (FTP over SSL/TLS) solves this problem by first securing the connection using SSL or TLS encryption, before any user or file data is exchanged.
What Types of FTPS Exist?
There are generally two modes of secure FTP available:
- FTPS uses implicit SSL/TLS to establish a secure connection before the FTP session begins, very similar to HTTPS. Regular FTP commands are then sent over the secure connection and protected by the TLS/SSL protocol.
- FTPES uses newer FTP commands to explicitily upgrade an unencrypted FTP connection to a secure connection during the initial authentication step. The FTPES protocol is somewhat more firewall friendly that the FTPS protocol, and allows the server and client to negotiate different levels of encryption and integrity protection on the control and data channels.
Is FTPS the Same as SFTP?
Another method of establishing secure connections and exchanging files is called SSH File Transfer Protocol (SFTP), but despite the name similarity, SFTP is an entirely different protocol than FTPS.
Full Feature List
Protocols
FTP, FTP/S, SFTP, SCP, HTTP/S
Advanced Security
SSH, SSL, FIPS 140-2
MFT Automation
Event, Alert & Sync Tools
Environments
Windows Server, Cloud & Virtual
Access Protection
IP, User & Protocol Restriction Tools
Account Management
AD, LDAP, 2FA, SSO & More
Auditing and Reporting
File Access, User and Admin Logging
Administration Tools
API, Sync Manager, & Other Tools
HTTPS Web Portal
Browser-Based Transfer from Any Device
Monitoring & Testing
Automated Network, Load and Access Testing
Regulatory Compliance
Auditing, Retention, & Encryption Tools
Award-Winning Support
Phone, Email, & 24/7/365
Industry Solutions
Cerberus FTP Server Editions
Professional
Secure file transfer server for Windows
- FTP, FTPS, SFTP & SCP
- IP access controls
- Groups & virtual directories
- Web admin & SOAP API
- AD/LDAP integration
- FIPS 140-2 encryption
- Server replication
- Phone & email support
$999 / year
Enterprise
Enhanced automation & security
- All Professional features
- HTTP/S web client
- Azure AD SSO support
- Event automation & alerts
- File retention policies
- Ad hoc file sharing
- Advanced stats & reporting
- Phone & email support
$2,499 / year
Enterprise Plus
Mission-critical performance & support
- All Enterprise features
- Scalable global solution
- 24/7/365 severity 1 support
- Rogue transfer detection
- Performance testing
- Automated network scanning
- Upgrade & migration support
- DR, test & dev licenses
$4,999 / year
Raved and Reviewed
Here’s what a few of our many satisfied customers have to say about Cerberus FTP Server.
“Our users have found Cerberus to be straightforward. We have handled many service tickets over the past three years, and Cerberus has had the least number of issues, by far.”
“We’ve been using Cerberus for at least five years, and it’s been awesome. Everything’s been very simple and easy, and we haven’t come across any limitations. It always just seems to work.”
“It’s not designed to be complicated, and it doesn’t need to be managed. I can hire someone new and they can be up to speed in minutes. Everyone on the team loves it.”
Latest News
Four benefits of using a reverse proxy server
Four benefits of using a reverse proxy server We recently wrote an overview to help understand proxy servers that touched on reverse proxy servers. Because reverse proxy servers are such a valuable tool in your network security arsenal, we wanted to spend a bit more...
Can your file transfer provider resolve a zero-day breach?
Can your file transfer provider resolve a zero-day breach? Zero-day breaches strike fear into the hearts of any cybersecurity department, as they are the most difficult to prepare for due to their unknown threat vector. Worse, a zero-day exploit may require a rush...
How common are file transfer data breaches?
Did you know that organizations saw 6.3 trillion intrusion attempts last year? Or that 2024 will likely end with around $9.5 trillion in damages from cybercrime? Data breaches have unfortunately grown in frequency as a result, with industries that deal with sensitive...