Ad hoc file sharing, also known as public file sharing, refers to one-off or occasional file transfers initiated by a user without preconfigured accounts or folders. On a file transfer protocol (FTP) server, this method allows external partners or employees to upload or download specific files through time-limited credentials, secure links or private drop zones while providing IT staff with tools like full audit trails and quota controls.
Managed File Transfer Glossary
Definitions of words and abbreviations you need to know to successfully understand and build for the web
Advanced Encryption Standard (AES)
The Advanced Encryption Standard (AES) is a symmetric-key encryption algorithm that’s widely used to secure data during transfer and storage. In the context of file transfer protocol (FTP) and managed file transfer (MFT) servers, AES helps protect files by encrypting their contents and preventing unauthorized access during transmission.
Automated file transfer
Automated file transfer (AFT) is the scheduling, management and execution of file transfers between systems without manual intervention. AFT enables reliable, repeatable delivery of data by using triggers, scripts or workflows to move files between locations. Automated transfers can reduce human error, improve efficiency and support compliance during transfer operations by maintaining consistent data movement across internal and external endpoints. Automated file transfer solutions typically allow organizations to configure rules and events to streamline secure file exchange processes.
B2B file transfer
A B2B file transfer is when businesses share data between each other. These transfers will typically involve moving structured data such as invoices, purchase orders or large datasets from one organization’s internal network, through an external network (such as a series of web servers) and into another organization’s internal network. B2B file transfer is typically accomplished with a tool like a file transfer protocol (FTP) server using encrypted protocols like HTTPS or SFTP. The FTP server acts as a centralized location where files can be uploaded, downloaded and managed under strict access controls between the organizations.
Cloud managed file transfer
Cloud managed file transfer (MFT) is a method that allows you to safely transfer data using a cloud-hosted service that centralizes control, automation and monitoring of file exchanges. Cloud MFT generally supports common file transfer protocols like FTP/S, SFTP and HTTPS and allows an organization to move files between systems, partners and users without maintaining on-premises infrastructure. This file transfer method is generally used to improve scalability and reduce operational overhead.
Compression
Compression is the process of reducing the size of a file before transferring it over a network. File compression helps lower storage demands and speeds up transfers by reducing bandwidth usage. Compression can be applied automatically by a file server or manually by the user. Common file compression formats include ZIP, GZIP and TAR.
Data Encryption Standard
The Data Encryption Standard (DES) is a symmetric-key block cipher that emerged as one of the first U.S. federal standards for data encryption in the 1970s, but it has since been replaced with more secure encryption algorithms such as the Advanced Encryption Standard (AES). Advances in computing power throughout the 1990s led to DES’s deprecation due to brute-force attacks in the early 2000s.
Decompression
Decompression is the process of restoring a compressed file back to its original size and state. It’s usually a required step for the receiving user of a file transfer, as files are typically compressed to reduce transmission time or storage space. Decompression allows the recipient system to recover the file’s full content and ensures the data is usable after it’s been transferred.
Decryption
Decryption turns encrypted data back into its original form. It makes the content readable again. S/FTP and managed file transfer (MFT) servers encrypt files before sending them. They use specific methods to scramble the data. This keeps the files safe from people without the key. To use the files, you must unlock them. A key is used to reverse the encryption. This key may be shared or created during the process. Once the data is decrypted, you can open and read the file.
Encryption
Encryption changes readable data into an unreadable format using cryptographic algorithms. It protects information while stored or being sent. This process helps keep sensitive files safe from unauthorized access, which lowers the risk of data exposure in vital file transfer systems and keeps organizations in compliance with data protection requirements.
End-to-end encryption
End-to-end encryption (E2EE) is a security method that protects data between two endpoints. It creates an encrypted path from the sender to the recipient. Only those two parties can decrypt the message. This keeps others from accessing the content. Internet providers and service platforms cannot read the data. Even if someone intercepts it, they cannot understand it. This method helps meet industry rules and data privacy laws. It supports secure communication in regulated environments.
Enterprise file transfer (EFT)
Enterprise file transfer (EFT) is a broad term used to describe the secure and automated movement of large volumes of data between systems, users and organizations. EFT is typically accomplished through multi-protocol MFT servers that include features such as encryption, access controls, automation and auditing to meet business and compliance needs. As such, system-to-system communication, partner exchanges and secure file distribution across corporate networks form the core of any EFT environment.
Event-driven managed file transfer (MFT)
Event-driven managed file transfer (MFT) automates file movement based on triggers such as file activity, time-based schedules, system events or user actions. Instead of relying on manual processes, this approach initiates workflows when specific conditions, called events, are met. In file transfer protocol (FTP) server environments, event-driven MFT improves operational efficiency, reduces delays and supports consistent, rule-based file handling across systems.
External file transfer
External file transfer sends files outside the organization. This includes vendors, customers or partners. It helps organizations safely share important data. Many use file transfer protocol (FTP) servers or managed file transfer (MFT) systems to do this work. They rely on tools like SFTP, FTPS or HTTPS. These keep files safe while moving across networks. The process needs login checks and encryption. It also limits who can open the files. This helps stop mistakes and keeps data from leaking.
Extreme file transfer (XFT)
Extreme file transfer (XFT) refers to moving very large files or large amounts of data at high speed. It often takes place in settings that need strong security and reliable performance. XFT happens in environments like file transfer protocol (FTP) or managed file transfer (MFT) systems. These setups use special tools and infrastructure to keep transfers fast and stable. Features may include compression, automation or encryption. XFT is useful for moving media files, research data or important business files.
File transfer protocol (FTP)
File transfer protocol (FTP) is a largely deprecated method that organizations used to exchange files over a TCP/IP network. The protocol allows users to upload, download, delete or change files on remote systems, but it does not encrypt exchanged credentials or data. As such, secure options like FTPS and SFTP have replaced FTP for most file transfer requirements.
FIPS 140-2
FIPS stands for Federal Information Processing Standard. These publications list rules for keeping government data secure. FIPS 140-2 gives the steps for testing cryptographic tools made by private sectors. It checks if those tools meet federal security rules. This version of the standard will stay in use until September 2026. After that, FIPS 140-3 will replace it.
FIPS 140-3
Federal Information Processing Standard (FIPS) publications set U.S. government cybersecurity standards for data encryption. Publication 140-3 establishes functional requirements and an accreditation program for cryptographic modules that replaces the prior FIPS 140-2 and mirrors global rule ISO/IEC 19790:2012. Federal agencies, their contractors, their service providers and any other organization that handles sensitive data or protected information in the administration of a federal program must be FIPS compliant.
FIPS compliance
Federal Information Processing Standards (FIPS) compliant means that a hardware component or software application, such as a file transfer server, uses cryptographic modules validated by NIST’s Cryptographic Module Validation Program (CMVP) to protect its systems and data. FIPS-compliant systems receive a third-party validation that confirms that their algorithms, key management and physical protections meet FIPS 140-2 or 140-3 standards for handling sensitive but unclassified data. In managed file transfer (MFT) and file transfer protocol (FTP) software, FIPS compliance ensures SFTP, FTPS and HTTPS services rely on tested cryptography libraries, which helps regulated organizations meet federal security mandates.
FTP file transfer
File transfer protocol (FTP) file transfer is the process of moving files between a client and a server over TCP/IP using the FTP protocol. FTP commands allow users to upload, download, manipulate files and view directory contents. FTP supports user authentication, passive or active ports, binary or ASCII data types and resume capability. However, the protocol lacks native encryption and has largely been deprecated in favor of FTPS or SFTP for secure workflows.
FTP over SSL
FTP over SSL, also known as FTP secure or FTPS, secures traditional FTP-based sessions by encrypting control and data channels with transport layer security (TLS) or its predecessor SSL. The method adds improved authentication through digital certificates and supports explicit or implicit security modes to help organizations meet data security mandates while using familiar FTP commands.
FTP port
A file transfer protocol (FTP) port is the numbered gateway that carries protocol traffic between an FTP client and an FTP server. By default, port 21 handles the control channel that exchanges login credentials and commands, while port 20 or a negotiated high port carries file data in active or passive mode. Administrators can, however, remap, restrict, forward or monitor their FTP ports to meet firewall rules and security policies.
FTP secure (FTPS)
FTP secure (also known as FTP over SSL or FTPS) secures traditional file transfer protocol (FTP)-based sessions by adding transport layer security (TLS) encryption to protect credentials and data as they move between clients and servers. FTPS can operate in explicit mode, where the TLS handshake starts after the USER command, and implicit mode, which upgrades the connection immediately upon connection. IT teams often choose FTPS to support legacy FTP workflows while meeting compliance rules for data security.
FTP server
A file transfer protocol (FTP) server is network software used to negotiate data and file transfer requests between clients and data storage. It publishes directories, enforces user permissions and supports secure file transfer variants such as FTPS and SFTP. Organizations deploy FTP servers to automate bulk uploads, share large files and integrate legacy workflows with modern encryption and auditing controls.
FTP with PGP
File transfer protocol (FTP) servers with Pretty Good Privacy (PGP) encryption protect files at rest and in motion. Data is packaged into PGP-encrypted archives before transmission, then moved over FTP or secure variants like FTPS or SFTP and decrypted at the client destination. This approach lets organizations maintain familiar FTP workflows while adding strong public key encryption, signing and integrity checks that meet compliance demands across regulated industries.
FTPS file transfer
FTPS file transfer is a secure extension of the file transfer protocol (FTP) that incorporates transport layer security (TLS) over the standard control and data channels. Clients and servers can negotiate explicit TLS on port 21 or use implicit TLS on port 990 with X.509 certificates to verify identity. Encryption masks credentials and payloads from interception and tampering so organizations can satisfy data security requirements from regulations such as HIPAA, GDPR and SOX requirements while keeping familiar file transfer operations in place.
High availability (HA)
High availability (HA) in a secure file transfer server describes an architecture that keeps file transfer services operational in the event of network issues, hardware malfunctions, security attacks or other challenges. HA is typically created through a combination of hardware redundancy, failover clustering, load balancing and automatic session recovery.
HTTP file transfer
HTTP (hypertext transfer protocol) moves files between clients and servers over TCP port 80 or 443. Unlike a file transfer protocol’s (FTP) separate control and data channels, an HTTP transfer embeds commands and payload in a single stream that passes easily through firewalls and proxies. Some managed file transfer (MFT) solutions add HTTP and HTTPS endpoints so users can offer browser-based upload and downloads. Web browsers are by far the most common HTTP client, and the protocol is ideal for lighter-weight data transfer of mixed content.
HTTPS file transfer
HTTPS file transfer uses the hypertext transfer protocol over transport layer security (TLS) to move files through a secure, browser-based connection. Unlike plain HTTP, HTTPS encrypts commands and data in transit to protect credentials and payloads against interception without the need for significant firewall configuration. Modern managed file transfer (MFT) servers support HTTPS to give users a familiar web interface for uploads and downloads and to support API-based workstreams.
Hypertext transfer protocol (HTTP)
Hypertext transfer protocol (HTTP) is the original file transfer protocol for data exchanged between clients and servers during a web browsing session. It has been superseded by its encrypted variant HTTPS, but both protocols let users upload, download and manage files through a web browser instead of a file transfer protocol (FTP) client.
Hypertext transfer protocol secure (HTTPS)
Hypertext transfer protocol secure (HTTPS) is the encrypted version of HTTP that’s used to transmit data securely over the internet. HTTPS is most commonly used for uploads and downloads of multimedia content (text, images and video) via a web browser client, and it uses transport layer security (TLS) to protect credentials and content during a session. HTTPS support in secure file transfer environments is often used to provide streamlined, user-friendly file transfer operations that can be performed over a browser without any additional software requirements.
Internal file transfer
Internal file transfer refers to the controlled movement of data between systems, users and applications inside an organization’s network using protocols such as FTPS, SFTP or HTTPS. Unlike external exchanges, internal file transfer keeps traffic behind an organization’s firewall. Organizations may apply different policies for authentication, access controls and audit trails depending on their compliance requirements.
Internet protocol suite
The internet protocol suite, commonly called TCP/IP for the most frequently used transport and internet layers, is the foundational set of communication protocols used for network interactions and data exchange over computer networks (including the internet). File transfer protocol (FTP) servers rely on TCP/IP to structure data into standardized packets and route transmissions efficiently across networks to their destination while maintaining reliable connectivity.
IPv6
IPv6, also known as Internet Protocol version six, is the internet standard used for providing IP addresses to devices accessing the internet and routing traffic to those destinations. Every device receives a unique IP address, and the IPv6 standard governs how those numbers are generated and assigned. In addition, IPv6 handles packet routing and processing for data transmission across networks.
Managed file transfer (MFT)
Managed file transfer (MFT) refers to a secure, policy-driven approach to moving data between systems inside or outside an organization. MFT applications commonly combine transfer protocols such as SFTP, FTPS and HTTPS with centralized automation, authentication, encryption and auditing features. Unlike basic file transfer protocol (FTP) servers, MFT provides scheduling, role-based access control and detailed logging that help meet compliance mandates while reducing manual administration.
Managed file transfer as a service (MFTaaS)
Managed file transfer as a service (MFTaaS) refers to a cloud-hosted secure file transfer platform that handles the scheduling, governance and automation of file exchanges without the need for on-premises hardware. MFTaaS providers will typically manage the infrastructure, patching, access control, encryption, auditing and compliance features related to file transfer so organizations can move data between partners, applications and storage services without spending significant time configuring their own solutions.
Managed file transfer service
A managed file transfer (MFT) service is a hosted platform that automates, secures and audits the exchange of data between systems or partners over protocols such as FTP/S, SFTP and HTTPS. These solutions typically provide encryption, role-based access, activity logs, scheduling and alerting under a single interface. Offloading infrastructure tasks to a managed file transfer service helps organizations gain predictable costs and continuous updates while focusing on improving their file transfer operations.
MFT agent
A managed file transfer (MFT) agent is a lightweight software component installed on remote servers, endpoints or cloud instances that executes MFT tasks requested by a central control server. They are typically employed in distributed computing environments that must regularly pass data back and forth between a central system. An MFT agent allows IT administrators to automate transfers, move files behind firewalls and maintain compliance across distributed systems.
MFT FTP server
A managed file transfer (MFT) FTP server is a term for an MFT server that includes support for the FTP/S protocol. These applications combine standard file transfer protocol services with policy-based controls, automation features, advanced security and detailed audit logging to move sensitive data reliably across internal networks and partner channels. These servers are typically used to centralize user authentication, automate workflows such as scheduled uploads or integrity checks and record immutable session reports to support compliance frameworks like PCI DSS and HIPAA.
MFT protocol
Managed file transfer (MFT) does not use a singular protocol, as it relies on existing protocols such as FTPS, SFTP and HTTPS to perform data transport. MFT typically refers to the automation, policy, account and integration settings that wrap around the core transfer protocols..
Odette file transfer protocol (OFTP)
The Odette file transfer protocol (OFTP) is a peer-to-peer file transfer standard originally built for European automotive supply chains that creates electronic data interchange (EDI) as a replacement for physical documents. OFTP lets partners exchange documents such as purchase orders, invoices and engineering data in digital format using a common set of receipt acknowledgements.
Odette file transfer protocol version two (OFTP2)
Odette file transfer protocol version two (OFTP2) is a secure file transfer protocol used primarily in Europe for electronic data interchange (EDI). It operates over TCP/IP networks and supports strong encryption, digital signatures and file compression. OFTP2 can transfer files over the internet and legacy protocols such as ISDN or X.25 and is designed for large-scale, automated data exchanges between trading partners.
PeSIT protocol
PeSIT is a file transfer protocol developed for secure and reliable data exchange between European banking and financial institutions. It supports error detection, session resumption and transfer integrity. PeSIT remains in use in a number of transfer categories where strict transactional consistency is required.
SCP file transfer
Secure copy protocol (SCP) file transfer is a simple way to move files between a local host and a remote server. It relies on secure shell (SSH) to protect both authentication and data during the transfer. The method works well for basic file movement without extra requirements. It does not provide advanced functions such as logging or file management that exist in managed file transfer (MFT) or file transfer protocol (FTP) server solutions.
Secure copy protocol (SCP)
Secure copy protocol (SCP) is a network method for moving files between a local system and a remote server. It works over secure shell (SSH). The process includes encrypted authentication and encrypted transfer. This protects files from being read during transmission. SCP is common for command-line file transfers. It is valued for speed and security. It does not include advanced features like file resume. It also does not provide detailed logging. Modern managed file transfer (MFT) tools address those needs.
Secure enterprise file transfer
Secure enterprise file transfer refers to the controlled movement of larger volumes of business data across internal systems and external partners. These processes will commonly authenticate encrypted protocols such as SFTP, FTPS or HTTPS within managed file transfer (MFT) or file transfer protocol (FTP) server platforms. These platforms provide additional administrative tools like granular access control, audit logging and automation to meet operational requirements for access controls, compliance and efficiency.
Secure file transfer
Secure file transfer is the protected movement of data between systems or external parties using encryption, authentication and integrity checks to reduce exposure to interception, support access control, auditing and policy-based automation for regulated exchanges. This transfer can be performed through a number of channels, including command-line prompts, built-in operating system tools or via file transfer protocol (FTP) or managed file transfer (MFT) server applications, and it will most commonly use secure protocols such as FTPS, SFTP or HTTPS.
Secure file transfer protocol (SFTP)
Secure file transfer protocol (SFTP) is a protocol that transfers data using secure shell (SSH) to encrypt authentication and file data in transit. SFTP is one of the most popular file transfer protocols in managed file transfer (MFT) environments due to its straightforward network setup, high levels of encryption and command flexibility.
Secure managed file transfer
Secure managed file transfer (MFT) refers to a controlled, policy‑driven approach to moving data that combines encryption, authentication, automation and auditing to protect files in motion and at rest. Unlike basic file transfer protocol (FTP) servers, a secure MFT platform centralizes user access, protocol support and compliance logging to safeguard sensitive information across internal and external workflows.
Secure shell (SSH)
Secure shell (SSH) is a cryptographic network protocol that secures session data passed over open networks through built-in public key authentication and data encryption. SFTP operates over SSH, which allows file transfers to operate through a single encrypted channel.
Secure sockets layer (SSL)
Secure sockets layer (SSL) is a deprecated cryptographic protocol that encrypts data exchanged between a client and server and requires a server to present a validated certificate before a client exchanges information. During the initial handshake in an FTPS or HTTPS connection, SSL authenticates the server and forms a secure session. It has since been replaced by transport layer security (TLS), which provides the same functions along with a number of security improvements.
SMTP
Simple mail transfer protocol (SMTP) is the standard protocol used to send email across a network In managed file transfer (MFT) and file transfer protocol (FTP) servers. SMTP mainly delivers operational information about things like system alerts, transfer receipts and audit reports (as opposed to being used for file transfer). IT administrators tie MFT solutions to an SMTP relay to notify users of upload failures, quota limits or policy events and to maintain compliance records.
SSH file transfer
SSH file transfer is the encrypted file exchange method built on secure shell (SSH), most often implemented as SFTP over TCP port 22. SFTP provides authentication, integrity and confidentiality for manual and automated transfers and is one of the most commonly used protocols in file transfer protocol (FTP) server and managed file transfer (MFT) environments.
SSH file transfer protocol
SSH file transfer protocol, also known as secure file transfer protocol or SFTP, is a network protocol that moves files through an encrypted secure shell (SSH) tunnel over port 22 for confidentiality and integrity. SFTP’s strong encryption and flexibility have made it a standard for managed file transfer (MFT) workflows that must meet compliance mandates like FIPS 140-2 or 3.
Transmission control protocol (TCP)
Transmission control protocol (TCP) is a fundamental transport layer protocol that enables information to travel across the internet. It establishes connections between a client and server, breaks transmitted data into ordered segments, numbers these packets and ensures error-checked delivery through acknowledgments and retransmissions. Most secure file transfer protocols and applications rely on TCP to open control and data channels, manage data flow and detect errors during file movement.
Transport layer security (TLS)
Transport layer security, or TLS, is a tool that protects data in transit. It scrambles the data so others cannot read it. It also checks that nothing in the transfer has been changed. TLS is used in protocols like FTPS and HTTPS. It replaced SSL, which is now outdated. Many organizations use TLS to follow security mandates and to share files safely with partners or internal departments.
Triple DES
Triple DES (3DES) was a symmetric-key encryption algorithm that applies the older Data Encryption Standard (DES) cipher three times to each data block to increase key bit length and improve security. It was used in some file transfer protocols to protect sensitive data during transmission, but it has since been replaced by stronger algorithms like AES.
Trivial file transfer protocol (TFTP)
Trivial file transfer protocol (TFTP) is a lightweight file transfer protocol typically used for bootstrapping devices or transferring configuration files in closed networks. TFTP supports only basic read and write operations, and it does not include authentication or encryption, which makes it unsuitable for secure managed file transfer (MFT) environments.
Web client
A web client is a browser-based file transfer interface that allows users to securely upload, download and manage files without installing additional software. It connects to a server using HTTPS in order to support encrypted file transfers, user authentication and access control. Web clients are commonly used in managed file transfer (MFT) systems to provide easy user file and directory access across devices while maintaining compliance with security protocols.
Zero trust
Zero trust is a security model that requires all users, devices and systems to be authenticated, authorized and continuously validated before gaining or maintaining access to network resources. In file transfer protocol (FTP) servers and managed file transfer (MFT) environments, zero trust limits exposure by restricting access based on identity, context and policy rather than assuming trust based on network location or credentials alone.