Cloud-based MFT Solution
    Features & Pricing

    Unlock a new level of efficiency and peace of mind with our secure managed file transfer software, empowering you to confidently share and automate transfers of confidential files with clients and colleagues, knowing that every transfer is encrypted, monitored, and backed by our robust security features. Try it for 14 days, risk-free.

    Sharetru Custom Images_Site Settings
    Protect your Critical Information

    Who is it built for?

    For businesses in industries craving iron-clad data security like Healthcare, Aerospace and Defense, Financial Services, or IT, our solution is your lifeline. With heavyweight certifications like FedRAMP moderate authorized Iaas and PaaS, following the defintion for FedRAMP moderate equivalency like a NIST 800-53 System Security Plan (SSP) completed at the SaaS layer, and SOC II at every turn, we're the go-to Managed File Transfer platform for industries and businesses that won't settle for anything less than stringent security and compliance.

    Sharetru Custom Images_User Mana
    MFT with Advanced Security

    What security measures are built in?

    Unlock a myriad of features built directly into the platform to assist you with organizational security. For those on a mission to conquer complex security landscapes, Managed File Transfer platform is your secret weapon. Whether it's guarding Controlled Unclassified Information (CUI),  shielding HIPAA data, or Personally Identifiable Information (PII), we're a trusted partner to small businesses and some of the world's most respected companies.

    Top industry giants: They're putting their trust in us every single day

    Leaders in File Transfer for Almost 25 Years

    From bustling enterprises and rising startups to government bodies and nonprofits, we’ve got your back, no matter your size or security appetite.

    • Benchmark FIPS 140-2 Encryption end-to-end
    • Negotiable ToS on the Enterprise Plan
    • Best-in-Class Support NPS scores
    • 99.99% Uptime SLA
    • qorvo
    • Keysight_Technologies_Logo (2)
    • Cabot Corporation Logo
    • Hitachi Logo (2)
    • Puma Logo
    • Equitrans Midstream Logo
    • BCBS Logo (1)
    • Turner Construction Logo (1)
    • Boom Supersonic-1 (1)
    • Framatome Logo (1)

    Subscription Plans

    Annually SAVE 10%
    Monthly
    Growth
    From $180/month Discover the power of compliance at your fingertips with Sharetru's entry-level plan. Designed to equip you with the essential tools needed to meet key compliance standards with manual oversight.
    UserstooltipOnly Active Users (non-suspended) count against your quota
    • Check 10 Active Users Included
    • Check Expandable to 40 Active Users in affordable 10 user increments
    • Check More than 40 active Users? Upgrade to our Performance Plan
    Storagetooltip

    Here is a rough estimate of the number of files that can be stored in 10GB for several common file types:

    · Word files: Around 200,000 

    · PDF files: Around 10,000

    · CAD drawings: Around 1,000

    · JPEG photos: Around 5,000

    · MP3 music files: Around 2,000

    It's important to note that these are rough estimates based on average file size, and actual file sizes can vary depending on factors such as resolution, compression, and quality.

    • Check 10GB of storage included
    • Check Expandable to 20GB in affordable 10GB increments
    • Check Need more than 20GB? Upgrade to our Performance Plan
    Key Features
    • Check Native SFTP, FTPS, and FTPeS Integration
    • Check HTTPS Web Application
    • Check Guest Link File Sharing
    • Check Permanent Logs
    • Check Disaster Recovery
    • Check Virus and Malware Protection
    • Check Flexible User Permissions
    • Check Advanced Password Controls
    • Check Two-factor Authentication
    • Check User-based IP Restrictions
    • Check Failed Login Policies
    • Check Suspension by Date
    • Check Analytics and Reporting
    Performance
    From $450/month Introduce cutting-edge automation and enhancements to elevate your file sharing. Sharetru's Performance Plan caters to businesses seeking superior functions for seamless, efficient file exchanges.
    Userstooltip

    Only Active Users (non-suspended) count against your quota

    • Check 50 Active Users Included
    • Check Expandable to 250 Active Users in affordable 50 user increments
    • Check More than 250 users? Contact Sales for a quote of our Enterprise Plan
    Storagetooltip

    Here is a rough estimate of the number of files that can be stored in 25GB for several common file types:

    · Word files: Around 500,000

    · PDF files: Around 25,000

    · CAD drawings: Around 2,500

    · JPEG photos: Around 12,500

    · MP3 music files: Around 5,000

    It's important to note that these are rough estimates based on average file size, and actual file sizes can vary depending on factors such as resolution, compression, and quality

    • Check 25GB of storage included
    • Check Expandable to 250GB in affordable 25GB increments
    • Check Need more than 250GB? Contact Sales for a quote of our Enterprise Plan
    Growth Features +
    • Check Custom Domain Name Eligible
    • Check Single Sign-On Integration
    • Check Dual Authorization for User Creation
    • Check Automated File Retention
    • Check Workspace Email Notifications
    • Check Automated User Suspension
    • Check Automated User Deletion
    • Check Administrative API Access
    • ...and much more!
    Enterprise
    sales@sharetru.com Contact Sales Designed for firms prioritizing exclusive privacy and top-tier security, the Enterprise Plan offers your business dedicated server resources, ensuring unparalleled safety and performance to keep you moving forward.
    Users
    • Check Truly Unlimited Users from the start
    • Check Scale your operations without additional per-user costs


    Storagetooltip

    Here is a rough estimate of the number of files that can be stored in 250GB for several common file types:

    · Word files: Around 5,000,000

    · PDF files: Around 250,000

    · CAD drawings: Around 20,500

    · JPEG photos: Around 125,000

    · MP3 music files: Around 50,000

    It's important to note that these are rough estimates based on average file size, and actual file sizes can vary depending on factors such as resolution, compression, and quality

    • Check 250GB of storage included
    • Check Expandable in 250 Increments




    Performance Features +
    • Check Dedicated Infrastructure
    • Check Negotiable Terms of Service*
    • Costs Extra Deeply Discounted Additional Sites
    • Costs Extra Scalable Compute Resources

    Explore the Full Spectrum

    Unfold the table to uncover all the features that make Sharetru standout as a secure, compliant, and reliable MFT Solution

    Platform Features

    Growth Performance Enterprise
    Analytics & Reporting
    Permanent Logs
    tooltip A critical safeguard that's important for maintaining an accurate record of events, decisions, and actions taken, ensuring transparency, accountability, and the ability to track progress over time.
    yes-mark
    yes-mark
    Analytics & Reporting
    tooltip Analytics dashboard with historical trends plus exportable reports
    yes-mark
    yes-mark
    Transfer Compatibility & File Sharing
    SFTP, FTPS, and FTPeS Access
    tooltip Provides a robust and secure file transfer mechanism with no size limitations to help facilitate efficient data exchange, compatibility, security, automation, while supporting legacy systems. Configurable per user or at the site level
    yes-mark
    yes-mark
    HTTPS Web Application Access
    tooltip Robust administration and file transfer capabilities supporting all modern web browsers
    yes-mark
    yes-mark
    Guest Link Sharing
    tooltip Outbound and inbound file sharing links to send or receive files without creating a user account. Control link expiration by number of uses, and number of days. Password protect links and manage creation from an intuitive dashboard interface.
    yes-mark
    yes-mark
    Brand to Your Business
    White Label with Your Logo
    tooltip Establish a strong brand presence by customizing and branding the software with your own logo, effectively creating a seamless and consistent user experience that reinforces your identity
    yes-mark
    yes-mark
    Customize Colors
    yes-mark
    yes-mark
    Custom Site Title
    yes-mark
    yes-mark
    Login Announcements
    tooltip A critical legal and security notice used by organizations to establish clear boundaries, enforce compliance, and enhance overall security posture by promoting awareness and accountability among users
    yes-mark
    yes-mark
    Custom Domain Name
    tooltip Point your own subdomain (such as sftp.yourdomain.com) with a CNAME to your Sharetru subdomain with an SSL Certificate included at our expense
    yes-mark
    yes-mark
    Custom User Agreements
    tooltip Legally enforces terms of service or company policies for system use by requiring user acceptance before application access
    yes-mark
    yes-mark
    User Management & Authentication
    Site & Team Managers
    yes-mark
    yes-mark
    Flexible User Permissions
    tooltip An industry benchmark. Grant users specific access and privileges based on their roles and responsibilities regarding workspaces, ensuring data security and maintaining control over sensitive information
    yes-mark
    yes-mark
    Advanced Password Controls
    tooltip Implement robust controls that empower employees with complex and unique passwords. Require change intervals and re-use controls to shield your sensitive data and safeguard your organization's reputation
    yes-mark
    yes-mark
    SSH Key Authentication
    tooltip Automated systems and SFTP software can use public SSH-key authentication to replace a traditional password, thwarting unauthorized access attempts and mitigating the risk of brute force attacks
    yes-mark
    yes-mark
    User IP Restrictions
    tooltip User-based IP address and protocol restrictions can bolster security measures, protect against unauthorized access, and align with compliance requirements. Layer onto an SFTP connection for an additional security check
    yes-mark
    yes-mark
    Two-factor Authentication
    tooltip Indispensable security feature that fortifies your defenses and bolsters your peace of mind. Users can be required to use 2FA as text message, email, or through an authentication app, and admins can restrict the OTP method allowed for each user. Studies have shown 99% of breaches can be thwarted with MFA in place
    yes-mark
    yes-mark
    Dual Authorization for User Creation
    tooltip A crucial key to safeguarding your digital fortress: mandatory additional administrative approval is essential for user creation, effectively preventing unauthorized users from being generated, thwarting any attempts at unauthorized user entry
    yes-mark
    yes-mark
    Single Sign-On (SSO) Integration
    tooltip Integrate your organization's SSO to streamline the authentication process, minimize the risk of password-related vulnerabilities, and simplify user experiences
    yes-mark
    yes-mark
    Automation
    Failed Login Policies
    tooltip Essential defense mechanism that fortifies your system against unauthorized access attempts by IP address or username, effectively thwarting malicious actors, and reinforcing your organization's cybersecurity posture
    yes-mark
    yes-mark
    Suspension by Date
    tooltip Auto-suspend users based on a future date of an administrator's choosing
    yes-mark
    yes-mark
    Auto-Suspension for Inactivity
    tooltip Prevent unnecessary access and potential breaches by implementing a number of days of inactivity before automatic suspension, while maintaining a safe and secure environment for active users
    yes-mark
    yes-mark
    Auto-Delete Users
    tooltip Deletes users after an administrator-specified number of days of after suspension.
    yes-mark
    yes-mark
    Bcc Mailbox Journaling
    tooltip Journal all system notifications automatically to an internal email address of your choosing so they're always accessible, and easily searchable
    yes-mark
    yes-mark
    Folder-Level File Retention Policies
    tooltip Establish policies for file retention and daily purge at the individual folder level or site wide
    yes-mark
    yes-mark
    Folder-level Custom Activity Notifications
    tooltip Automatically send email notifications when a file is uploaded, downloaded, deleted, or when a storage threshold is reached
    yes-mark
    yes-mark
    API Access
    tooltip Leverage the powerful synergy of our internal and partner-based API, meticulously designed for user and site management by administrators. It offers the unmatched advantage of extracting comprehensive administrative and file logs.
    yes-mark
    yes-mark
    Concurrent Connections
    Per User
    tooltip The number of simultaneous FTPS or SFTP connections per username
    10 25 25
    Per Remote IP Address
    tooltip The number of simultaneous FTPS or SFTP connections per remote IP address (ex: single office location for multiple users)
    10 25 No Limit
    Total
    tooltip The total number of simultaneous FTPS or SFTP connections for all users at all locations
    25 75 Software Limit Removed

    Security and Compliance Controls

    Growth Performance Enterprise
    Compliance Enablement
    CMMC Basic and Advanced
    tooltip In depth Customer Responsibility Matrix (CRM) for CMMC 2.0 Level 2 for the sharing of CUI is available for Sharetru clients
    yes-mark
    yes-mark
    NIST SP 800-171
    yes-mark
    yes-mark
    Completed NIST 800-53 SSP
    tooltip Required for FedRAMP Moderate Equivalency as clarified in the CMMC rule-making process (32 CFR 170)
    yes-mark
    yes-mark
    CMMC Customer Responsibility Matrix
    tooltip Available to our customers, our CMMC CRM crosswalks the controls for NIST 800-171 Rev 2 with the correlating controls for NIST 800-53 to ensure you're meeting requirements for the sharing of FCI, CUI, CDI, and CTI.
    yes-mark
    yes-mark
    DFARS 252.204-7012
    tooltip The Defense Federal Acquisition Regulation Supplement (DFARS) clause 242.204-7012 mandates defense contractors to safeguard sensitive defense information and report cyber incidents in section C-G. It emphasizes adhering to NIST SP 800-171 security standards, timely cyber incident reporting to the DoD, and ensuring the entire supply chain, including subcontractors, complies with these requirements.
    yes-mark
    yes-mark
    ITAR | EAR
    tooltip All data is hosted in U.S. datacenters managed only by U.S. Citizens
    yes-mark
    yes-mark
    FERPA
    tooltip FERPA (Family Educational Rights and Privacy Act) is a United States federal law that governs the privacy and security of student educational records. FERPA is unique in its focus on protecting student information
    yes-mark
    yes-mark
    GLBA | SOX | PCI-DSS
    yes-mark
    yes-mark
    GDPR
    tooltip The General Data Protection Regulation (GDPR) allows for the transfer of personal data outside the European Economic Area (EEA) to countries that are deemed to have adequate data protection standards or with appropriate safeguards in place, such as a Data Processing Agreement or the use of Standard Contractual Clauses (SCCs).
    yes-mark
    yes-mark
    HIPAA | HITECH
    yes-mark
    yes-mark
    Cloud Partner Certifications
    FedRAMP Moderate Authorized
    tooltip Contact us for more information
    yes-mark
    yes-mark
    NIST 800-53 R4
    tooltip pivotal in establishing a comprehensive set of security controls for federal information systems, guiding organizations towards achieving and maintaining compliance with federal cybersecurity standards such as FedRAMP Moderate
    yes-mark
    yes-mark
    StateRAMP
    yes-mark
    yes-mark
    CSA STAR
    tooltip Provides a comprehensive framework and transparency in assessing and validating the security posture of cloud service providers, enabling informed decision-making and ensuring the protection of sensitive data
    yes-mark
    yes-mark
    ISO 27001
    yes-mark
    yes-mark
    HIPAA | HITECH
    yes-mark
    yes-mark
    SaaS Compliance
    FedRAMP Moderate Equivalency
    tooltip Sharetru has a fully documented and prepared SSP for FedRAMP Moderate, and meets FedRAMP Moderate controls pertaining to encryption, security, privacy and availability, following the definition of FedRAMP moderate equivalency provided by the federal government in 32 CFR 170
    yes-mark
    yes-mark
    SOC 2 Type II Certified
    tooltip The IaaS, PaaS, and SaaS layers of Sharetru's Advanced Security & Compliance Enablement Platform are SOC 2 Type II certified
    yes-mark
    yes-mark
    Infrastructure & Platform Security
    FIPS 140-2 Approved Encryption Modules
    tooltip FIPS 140-2 approved ciphers are an essential security feature due to their rigorous testing and validation process, ensuring that cryptographic algorithms meet stringent standards, thereby safeguarding sensitive information from potential breaches
    yes-mark
    yes-mark
    Next Generation Antivirus (NGAV)
    tooltip Next-generation antivirus utilizes machine learning algorithms to proactively identify and mitigate emerging threats by analyzing patterns and behaviors, enhancing cybersecurity defenses.
    yes-mark
    yes-mark
    Geo Fencing by Country
    tooltip An indispensable feature that enables you to fortify your defenses, restrict access to vulnerable regions, and effectively safeguard your data from malicious threats
    yes-mark
    yes-mark
    Dedicated Firewalls
    tooltip A critical safeguard that fortifies your network, protects sensitive data, and mitigates the ever-evolving threat landscape
    yes-mark
    yes-mark
    Intruder IP Blacklisting
    tooltip Empowers our software to proactively ward off malicious actors permanently, keeping your systems and sensitive data shielded from unauthorized access, breaches, and cyber threats
    yes-mark
    yes-mark
    Dedicated IP Address
    tooltip A critical security feature that proactively detects and prevents malicious activities within the network, ensuring constant protection against sophisticated cyber threats
    yes-mark
    yes-mark
    A+ Qualys SSL Rating
    tooltip A crucial security feature as it demonstrates an organization's commitment to maintaining the highest level of cybersecurity standards. Sharetru’s SSL configuration for HTTPS have earned a rating of A+ by world-renowned Qualys SSL Labs.
    yes-mark
    yes-mark
    Network IPS
    tooltip A critical security feature that proactively detects and prevents malicious activities within the network, ensuring constant protection against sophisticated cyber threats
    yes-mark
    yes-mark
    Host IDS
    tooltip A Host-based Intrusion Detection Service (HIDS) monitors for and issues alerts for any unauthorized operating system changes
    yes-mark
    yes-mark
    Dedicated Server
    tooltip A dedicated server for file transfer software in the cloud ensures consistent performance, reliability, and security, while allowing for efficient resource allocation and scalability to meet varying demands.
    no-mark
    yes-mark
    Business Continuity
    Daily Onsite Backup
    tooltip By keeping 30 days of backups within arm's reach, we eliminate the risks of relying solely on offsite solutions, ensuring immediate accessibility, swift recovery, and total control while bolstering your company's resilience to disaster.
    yes-mark
    yes-mark
    Built-In Disaster Recovery
    tooltip Keep your business thriving even in the face of unforeseen disruptions with a FedRAMP moderate authorized secondary datacenter on Warm Standby. By seamlessly transitioning to a ready-to-go secondary system, we minimize downtime, protect critical operations, and minimize business disruption.
    yes-mark
    yes-mark

    Terms & Agreements

    *Will accept Sharetru BAA and DPA as written unless negotiating Terms of Service

    Growth Performance Enterprise
    Standard Online Terms of Service (TOS)
    tooltip Accept our standard terms as a clickwrap agreement with by a checkbox agreement on the order
    yes-mark
    yes-mark
    Signed TOS & HIPAA BAA
    tooltip A critical safeguard that fortifies your network, protects sensitive data, and mitigates the ever-evolving threat landscape
    yes-mark
    yes-mark
    Signed TOS & Data Privacy Agreement (DPA)
    tooltip Establishes clear guidelines and safeguards for the handling, processing, and protection of personal data, ensuring privacy and security for individuals.
    yes-mark
    yes-mark
    Negotiation of TOS
    tooltip Negotiated and signed TOS. Requires a 3 year agreement.
    no-mark
    yes-mark

    Growth

    Performance

    Enterprise

    Platform Features

    Analytics & Reporting
    Permanent Logs
    A critical safeguard that's important for maintaining an accurate record of events, decisions, and actions taken, ensuring transparency, accountability, and the ability to track progress over time.
    yes-mark
    yes-mark
    Analytics & Reporting
    Analytics dashboard with historical trends plus exportable reports
    yes-mark
    yes-mark
    Transfer Compatibility & File Sharing
    SFTP, FTPS, and FTPeS Access
    Provides a robust and secure file transfer mechanism with no size limitations to help facilitate efficient data exchange, compatibility, security, automation, while supporting legacy systems. Configurable per user or at the site level
    yes-mark
    yes-mark
    HTTPS Web Application Access
    Robust administration and file transfer capabilities supporting all modern web browsers
    yes-mark
    yes-mark
    Guest Link Sharing
    Outbound and inbound file sharing links to send or receive files without creating a user account. Control link expiration by number of uses, and number of days. Password protect links and manage creation from an intuitive dashboard interface.
    yes-mark
    yes-mark
    Brand to Your Business
    White Label with Your Logo
    Establish a strong brand presence by customizing and branding the software with your own logo, effectively creating a seamless and consistent user experience that reinforces your identity
    yes-mark
    yes-mark
    Customize Colors
    yes-mark
    yes-mark
    Custom Site Title
    yes-mark
    yes-mark
    Login Announcements
    A critical legal and security notice used by organizations to establish clear boundaries, enforce compliance, and enhance overall security posture by promoting awareness and accountability among users
    yes-mark
    yes-mark
    Custom Domain Name
    Point your own subdomain (such as sftp.yourdomain.com) with a CNAME to your Sharetru subdomain with an SSL Certificate included at our expense
    yes-mark
    yes-mark
    Custom User Agreements
    Legally enforces terms of service or company policies for system use by requiring user acceptance before application access
    yes-mark
    yes-mark
    User Management & Authentication
    Site & Team Managers
    yes-mark
    yes-mark
    Flexible User Permissions
    An industry benchmark. Grant users specific access and privileges based on their roles and responsibilities regarding workspaces, ensuring data security and maintaining control over sensitive information
    yes-mark
    yes-mark
    Advanced Password Controls
    Implement robust controls that empower employees with complex and unique passwords. Require change intervals and re-use controls to shield your sensitive data and safeguard your organization's reputation
    yes-mark
    yes-mark
    SSH Key Authentication
    Automated systems and SFTP software can use public SSH-key authentication to replace a traditional password, thwarting unauthorized access attempts and mitigating the risk of brute force attacks
    yes-mark
    yes-mark
    User IP Restrictions
    User-based IP address and protocol restrictions can bolster security measures, protect against unauthorized access, and align with compliance requirements. Layer onto an SFTP connection for an additional security check
    yes-mark
    yes-mark
    Two-factor Authentication
    Indispensable security feature that fortifies your defenses and bolsters your peace of mind. Users can be required to use 2FA as text message, email, or through an authentication app, and admins can restrict the OTP method allowed for each user. Studies have shown 99% of breaches can be thwarted with MFA in place
    yes-mark
    yes-mark
    Dual Authorization for User Creation
    A crucial key to safeguarding your digital fortress: mandatory additional administrative approval is essential for user creation, effectively preventing unauthorized users from being generated, thwarting any attempts at unauthorized user entry
    yes-mark
    yes-mark
    Single Sign-On (SSO) Integration
    Integrate your organization's SSO to streamline the authentication process, minimize the risk of password-related vulnerabilities, and simplify user experiences
    yes-mark
    yes-mark
    Automation
    Failed Login Policies
    Essential defense mechanism that fortifies your system against unauthorized access attempts by IP address or username, effectively thwarting malicious actors, and reinforcing your organization's cybersecurity posture
    yes-mark
    yes-mark
    Suspension by Date
    Auto-suspend users based on a future date of an administrator's choosing
    yes-mark
    yes-mark
    Auto-Suspension for Inactivity
    Prevent unnecessary access and potential breaches by implementing a number of days of inactivity before automatic suspension, while maintaining a safe and secure environment for active users
    yes-mark
    yes-mark
    Auto-Delete Users
    Deletes users after an administrator-specified number of days of after suspension.
    yes-mark
    yes-mark
    Bcc Mailbox Journaling
    Journal all system notifications automatically to an internal email address of your choosing so they're always accessible, and easily searchable
    yes-mark
    yes-mark
    Folder-Level File Retention Policies
    Establish policies for file retention and daily purge at the individual folder level or site wide
    yes-mark
    yes-mark
    Folder-level Custom Activity Notifications
    Automatically send email notifications when a file is uploaded, downloaded, deleted, or when a storage threshold is reached
    yes-mark
    yes-mark
    API Access
    Leverage the powerful synergy of our internal and partner-based API, meticulously designed for user and site management by administrators. It offers the unmatched advantage of extracting comprehensive administrative and file logs.
    yes-mark
    yes-mark
    Concurrent Connections
    Per User
    The number of simultaneous FTPS or SFTP connections per username
    10
    25
    25
    Per Remote IP Address
    The number of simultaneous FTPS or SFTP connections per remote IP address (ex: single office location for multiple users)
    10
    25
    No Limit
    Total
    The total number of simultaneous FTPS or SFTP connections for all users at all locations
    25
    75
    Software Limit Removed

    Growth

    Performance

    Enterprise

    Security and Compliance Controls

    Compliance Enablement
    CMMC Basic and Advanced
    In depth Customer Responsibility Matrix (CRM) for CMMC 2.0 Level 2 for the sharing of CUI is available for Sharetru clients
    yes-mark
    yes-mark
    NIST SP 800-171
    yes-mark
    yes-mark
    Completed NIST 800-53 SSP
    Required for FedRAMP Moderate Equivalency as clarified in the CMMC rule-making process (32 CFR 170)
    yes-mark
    yes-mark
    CMMC Customer Responsibility Matrix
    Available to our customers, our CMMC CRM crosswalks the controls for NIST 800-171 Rev 2 with the correlating controls for NIST 800-53 to ensure you're meeting requirements for the sharing of FCI, CUI, CDI, and CTI.
    yes-mark
    yes-mark
    DFARS 252.204-7012
    The Defense Federal Acquisition Regulation Supplement (DFARS) clause 242.204-7012 mandates defense contractors to safeguard sensitive defense information and report cyber incidents in section C-G. It emphasizes adhering to NIST SP 800-171 security standards, timely cyber incident reporting to the DoD, and ensuring the entire supply chain, including subcontractors, complies with these requirements.
    yes-mark
    yes-mark
    ITAR | EAR
    All data is hosted in U.S. datacenters managed only by U.S. Citizens
    yes-mark
    yes-mark
    FERPA
    FERPA (Family Educational Rights and Privacy Act) is a United States federal law that governs the privacy and security of student educational records. FERPA is unique in its focus on protecting student information
    yes-mark
    yes-mark
    GLBA | SOX | PCI-DSS
    yes-mark
    yes-mark
    GDPR
    The General Data Protection Regulation (GDPR) allows for the transfer of personal data outside the European Economic Area (EEA) to countries that are deemed to have adequate data protection standards or with appropriate safeguards in place, such as a Data Processing Agreement or the use of Standard Contractual Clauses (SCCs).
    yes-mark
    yes-mark
    HIPAA | HITECH
    yes-mark
    yes-mark
    Cloud Partner Certifications
    FedRAMP Moderate Authorized
    Contact us for more information
    yes-mark
    yes-mark
    NIST 800-53 R4
    pivotal in establishing a comprehensive set of security controls for federal information systems, guiding organizations towards achieving and maintaining compliance with federal cybersecurity standards such as FedRAMP Moderate
    yes-mark
    yes-mark
    StateRAMP
    yes-mark
    yes-mark
    CSA STAR
    Provides a comprehensive framework and transparency in assessing and validating the security posture of cloud service providers, enabling informed decision-making and ensuring the protection of sensitive data
    yes-mark
    yes-mark
    ISO 27001
    yes-mark
    yes-mark
    HIPAA | HITECH
    yes-mark
    yes-mark
    SaaS Compliance
    FedRAMP Moderate Equivalency
    Sharetru has a fully documented and prepared SSP for FedRAMP Moderate, and meets FedRAMP Moderate controls pertaining to encryption, security, privacy and availability, following the definition of FedRAMP moderate equivalency provided by the federal government in 32 CFR 170
    yes-mark
    yes-mark
    SOC 2 Type II Certified
    The IaaS, PaaS, and SaaS layers of Sharetru's Advanced Security & Compliance Enablement Platform are SOC 2 Type II certified
    yes-mark
    yes-mark
    Infrastructure & Platform Security
    FIPS 140-2 Approved Encryption Modules
    FIPS 140-2 approved ciphers are an essential security feature due to their rigorous testing and validation process, ensuring that cryptographic algorithms meet stringent standards, thereby safeguarding sensitive information from potential breaches
    yes-mark
    yes-mark
    Next Generation Antivirus (NGAV)
    Next-generation antivirus utilizes machine learning algorithms to proactively identify and mitigate emerging threats by analyzing patterns and behaviors, enhancing cybersecurity defenses.
    yes-mark
    yes-mark
    Geo Fencing by Country
    An indispensable feature that enables you to fortify your defenses, restrict access to vulnerable regions, and effectively safeguard your data from malicious threats
    yes-mark
    yes-mark
    Dedicated Firewalls
    A critical safeguard that fortifies your network, protects sensitive data, and mitigates the ever-evolving threat landscape
    yes-mark
    yes-mark
    Intruder IP Blacklisting
    Empowers our software to proactively ward off malicious actors permanently, keeping your systems and sensitive data shielded from unauthorized access, breaches, and cyber threats
    yes-mark
    yes-mark
    Dedicated IP Address
    A critical security feature that proactively detects and prevents malicious activities within the network, ensuring constant protection against sophisticated cyber threats
    yes-mark
    yes-mark
    A+ Qualys SSL Rating
    A crucial security feature as it demonstrates an organization's commitment to maintaining the highest level of cybersecurity standards. Sharetru’s SSL configuration for HTTPS have earned a rating of A+ by world-renowned Qualys SSL Labs.
    yes-mark
    yes-mark
    Network IPS
    A critical security feature that proactively detects and prevents malicious activities within the network, ensuring constant protection against sophisticated cyber threats
    yes-mark
    yes-mark
    Host IDS
    A Host-based Intrusion Detection Service (HIDS) monitors for and issues alerts for any unauthorized operating system changes
    yes-mark
    yes-mark
    Dedicated Server
    A dedicated server for file transfer software in the cloud ensures consistent performance, reliability, and security, while allowing for efficient resource allocation and scalability to meet varying demands.
    no-mark
    yes-mark
    Business Continuity
    Daily Onsite Backup
    By keeping 30 days of backups within arm's reach, we eliminate the risks of relying solely on offsite solutions, ensuring immediate accessibility, swift recovery, and total control while bolstering your company's resilience to disaster.
    yes-mark
    yes-mark
    Built-In Disaster Recovery
    Keep your business thriving even in the face of unforeseen disruptions with a FedRAMP moderate authorized secondary datacenter on Warm Standby. By seamlessly transitioning to a ready-to-go secondary system, we minimize downtime, protect critical operations, and minimize business disruption.
    yes-mark
    yes-mark

    Growth

    Performance

    Enterprise

    Terms & Agreements

    *Will accept Sharetru BAA and DPA as written unless negotiating Terms of Service

    Standard Online Terms of Service (TOS)
    Accept our standard terms as a clickwrap agreement with by a checkbox agreement on the order
    yes-mark
    yes-mark
    Signed TOS & HIPAA BAA
    A critical safeguard that fortifies your network, protects sensitive data, and mitigates the ever-evolving threat landscape
    yes-mark
    yes-mark
    Signed TOS & Data Privacy Agreement (DPA)
    Establishes clear guidelines and safeguards for the handling, processing, and protection of personal data, ensuring privacy and security for individuals.
    yes-mark
    yes-mark
    Negotiation of TOS
    Negotiated and signed TOS. Requires a 3 year agreement.
    no-mark
    yes-mark

    Growth

    Performance

    Enterprise

    Platform Features

    Analytics & Reporting
    Permanent Logs
    A critical safeguard that's important for maintaining an accurate record of events, decisions, and actions taken, ensuring transparency, accountability, and the ability to track progress over time.
    yes-mark
    yes-mark
    Analytics & Reporting
    Analytics dashboard with historical trends plus exportable reports
    yes-mark
    yes-mark
    Transfer Compatibility & File Sharing
    SFTP, FTPS, and FTPeS Access
    Provides a robust and secure file transfer mechanism with no size limitations to help facilitate efficient data exchange, compatibility, security, automation, while supporting legacy systems. Configurable per user or at the site level
    yes-mark
    yes-mark
    HTTPS Web Application Access
    Robust administration and file transfer capabilities supporting all modern web browsers
    yes-mark
    yes-mark
    Guest Link Sharing
    Outbound and inbound file sharing links to send or receive files without creating a user account. Control link expiration by number of uses, and number of days. Password protect links and manage creation from an intuitive dashboard interface.
    yes-mark
    yes-mark
    Brand to Your Business
    White Label with Your Logo
    Establish a strong brand presence by customizing and branding the software with your own logo, effectively creating a seamless and consistent user experience that reinforces your identity
    yes-mark
    yes-mark
    Customize Colors
    yes-mark
    yes-mark
    Custom Site Title
    yes-mark
    yes-mark
    Login Announcements
    A critical legal and security notice used by organizations to establish clear boundaries, enforce compliance, and enhance overall security posture by promoting awareness and accountability among users
    yes-mark
    yes-mark
    Custom Domain Name
    Point your own subdomain (such as sftp.yourdomain.com) with a CNAME to your Sharetru subdomain with an SSL Certificate included at our expense
    yes-mark
    yes-mark
    Custom User Agreements
    Legally enforces terms of service or company policies for system use by requiring user acceptance before application access
    yes-mark
    yes-mark
    User Management & Authentication
    Site & Team Managers
    yes-mark
    yes-mark
    Flexible User Permissions
    An industry benchmark. Grant users specific access and privileges based on their roles and responsibilities regarding workspaces, ensuring data security and maintaining control over sensitive information
    yes-mark
    yes-mark
    Advanced Password Controls
    Implement robust controls that empower employees with complex and unique passwords. Require change intervals and re-use controls to shield your sensitive data and safeguard your organization's reputation
    yes-mark
    yes-mark
    SSH Key Authentication
    Automated systems and SFTP software can use public SSH-key authentication to replace a traditional password, thwarting unauthorized access attempts and mitigating the risk of brute force attacks
    yes-mark
    yes-mark
    User IP Restrictions
    User-based IP address and protocol restrictions can bolster security measures, protect against unauthorized access, and align with compliance requirements. Layer onto an SFTP connection for an additional security check
    yes-mark
    yes-mark
    Two-factor Authentication
    Indispensable security feature that fortifies your defenses and bolsters your peace of mind. Users can be required to use 2FA as text message, email, or through an authentication app, and admins can restrict the OTP method allowed for each user. Studies have shown 99% of breaches can be thwarted with MFA in place
    yes-mark
    yes-mark
    Dual Authorization for User Creation
    A crucial key to safeguarding your digital fortress: mandatory additional administrative approval is essential for user creation, effectively preventing unauthorized users from being generated, thwarting any attempts at unauthorized user entry
    yes-mark
    yes-mark
    Single Sign-On (SSO) Integration
    Integrate your organization's SSO to streamline the authentication process, minimize the risk of password-related vulnerabilities, and simplify user experiences
    yes-mark
    yes-mark
    Automation
    Failed Login Policies
    Essential defense mechanism that fortifies your system against unauthorized access attempts by IP address or username, effectively thwarting malicious actors, and reinforcing your organization's cybersecurity posture
    yes-mark
    yes-mark
    Suspension by Date
    Auto-suspend users based on a future date of an administrator's choosing
    yes-mark
    yes-mark
    Auto-Suspension for Inactivity
    Prevent unnecessary access and potential breaches by implementing a number of days of inactivity before automatic suspension, while maintaining a safe and secure environment for active users
    yes-mark
    yes-mark
    Auto-Delete Users
    Deletes users after an administrator-specified number of days of after suspension.
    yes-mark
    yes-mark
    Bcc Mailbox Journaling
    Journal all system notifications automatically to an internal email address of your choosing so they're always accessible, and easily searchable
    yes-mark
    yes-mark
    Folder-Level File Retention Policies
    Establish policies for file retention and daily purge at the individual folder level or site wide
    yes-mark
    yes-mark
    Folder-level Custom Activity Notifications
    Automatically send email notifications when a file is uploaded, downloaded, deleted, or when a storage threshold is reached
    yes-mark
    yes-mark
    API Access
    Leverage the powerful synergy of our internal and partner-based API, meticulously designed for user and site management by administrators. It offers the unmatched advantage of extracting comprehensive administrative and file logs.
    yes-mark
    yes-mark
    Concurrent Connections
    Per User
    The number of simultaneous FTPS or SFTP connections per username
    10
    25
    25
    Per Remote IP Address
    The number of simultaneous FTPS or SFTP connections per remote IP address (ex: single office location for multiple users)
    10
    25
    No Limit
    Total
    The total number of simultaneous FTPS or SFTP connections for all users at all locations
    25
    75
    Software Limit Removed

    Growth

    Performance

    Enterprise

    Security and Compliance Controls

    Compliance Enablement
    CMMC Basic and Advanced
    In depth Customer Responsibility Matrix (CRM) for CMMC 2.0 Level 2 for the sharing of CUI is available for Sharetru clients
    yes-mark
    yes-mark
    NIST SP 800-171
    yes-mark
    yes-mark
    Completed NIST 800-53 SSP
    Required for FedRAMP Moderate Equivalency as clarified in the CMMC rule-making process (32 CFR 170)
    yes-mark
    yes-mark
    CMMC Customer Responsibility Matrix
    Available to our customers, our CMMC CRM crosswalks the controls for NIST 800-171 Rev 2 with the correlating controls for NIST 800-53 to ensure you're meeting requirements for the sharing of FCI, CUI, CDI, and CTI.
    yes-mark
    yes-mark
    DFARS 252.204-7012
    The Defense Federal Acquisition Regulation Supplement (DFARS) clause 242.204-7012 mandates defense contractors to safeguard sensitive defense information and report cyber incidents in section C-G. It emphasizes adhering to NIST SP 800-171 security standards, timely cyber incident reporting to the DoD, and ensuring the entire supply chain, including subcontractors, complies with these requirements.
    yes-mark
    yes-mark
    ITAR | EAR
    All data is hosted in U.S. datacenters managed only by U.S. Citizens
    yes-mark
    yes-mark
    FERPA
    FERPA (Family Educational Rights and Privacy Act) is a United States federal law that governs the privacy and security of student educational records. FERPA is unique in its focus on protecting student information
    yes-mark
    yes-mark
    GLBA | SOX | PCI-DSS
    yes-mark
    yes-mark
    GDPR
    The General Data Protection Regulation (GDPR) allows for the transfer of personal data outside the European Economic Area (EEA) to countries that are deemed to have adequate data protection standards or with appropriate safeguards in place, such as a Data Processing Agreement or the use of Standard Contractual Clauses (SCCs).
    yes-mark
    yes-mark
    HIPAA | HITECH
    yes-mark
    yes-mark
    Cloud Partner Certifications
    FedRAMP Moderate Authorized
    Contact us for more information
    yes-mark
    yes-mark
    NIST 800-53 R4
    pivotal in establishing a comprehensive set of security controls for federal information systems, guiding organizations towards achieving and maintaining compliance with federal cybersecurity standards such as FedRAMP Moderate
    yes-mark
    yes-mark
    StateRAMP
    yes-mark
    yes-mark
    CSA STAR
    Provides a comprehensive framework and transparency in assessing and validating the security posture of cloud service providers, enabling informed decision-making and ensuring the protection of sensitive data
    yes-mark
    yes-mark
    ISO 27001
    yes-mark
    yes-mark
    HIPAA | HITECH
    yes-mark
    yes-mark
    SaaS Compliance
    FedRAMP Moderate Equivalency
    Sharetru has a fully documented and prepared SSP for FedRAMP Moderate, and meets FedRAMP Moderate controls pertaining to encryption, security, privacy and availability, following the definition of FedRAMP moderate equivalency provided by the federal government in 32 CFR 170
    yes-mark
    yes-mark
    SOC 2 Type II Certified
    The IaaS, PaaS, and SaaS layers of Sharetru's Advanced Security & Compliance Enablement Platform are SOC 2 Type II certified
    yes-mark
    yes-mark
    Infrastructure & Platform Security
    FIPS 140-2 Approved Encryption Modules
    FIPS 140-2 approved ciphers are an essential security feature due to their rigorous testing and validation process, ensuring that cryptographic algorithms meet stringent standards, thereby safeguarding sensitive information from potential breaches
    yes-mark
    yes-mark
    Next Generation Antivirus (NGAV)
    Next-generation antivirus utilizes machine learning algorithms to proactively identify and mitigate emerging threats by analyzing patterns and behaviors, enhancing cybersecurity defenses.
    yes-mark
    yes-mark
    Geo Fencing by Country
    An indispensable feature that enables you to fortify your defenses, restrict access to vulnerable regions, and effectively safeguard your data from malicious threats
    yes-mark
    yes-mark
    Dedicated Firewalls
    A critical safeguard that fortifies your network, protects sensitive data, and mitigates the ever-evolving threat landscape
    yes-mark
    yes-mark
    Intruder IP Blacklisting
    Empowers our software to proactively ward off malicious actors permanently, keeping your systems and sensitive data shielded from unauthorized access, breaches, and cyber threats
    yes-mark
    yes-mark
    Dedicated IP Address
    A critical security feature that proactively detects and prevents malicious activities within the network, ensuring constant protection against sophisticated cyber threats
    yes-mark
    yes-mark
    A+ Qualys SSL Rating
    A crucial security feature as it demonstrates an organization's commitment to maintaining the highest level of cybersecurity standards. Sharetru’s SSL configuration for HTTPS have earned a rating of A+ by world-renowned Qualys SSL Labs.
    yes-mark
    yes-mark
    Network IPS
    A critical security feature that proactively detects and prevents malicious activities within the network, ensuring constant protection against sophisticated cyber threats
    yes-mark
    yes-mark
    Host IDS
    A Host-based Intrusion Detection Service (HIDS) monitors for and issues alerts for any unauthorized operating system changes
    yes-mark
    yes-mark
    Dedicated Server
    A dedicated server for file transfer software in the cloud ensures consistent performance, reliability, and security, while allowing for efficient resource allocation and scalability to meet varying demands.
    no-mark
    yes-mark
    Business Continuity
    Daily Onsite Backup
    By keeping 30 days of backups within arm's reach, we eliminate the risks of relying solely on offsite solutions, ensuring immediate accessibility, swift recovery, and total control while bolstering your company's resilience to disaster.
    yes-mark
    yes-mark
    Built-In Disaster Recovery
    Keep your business thriving even in the face of unforeseen disruptions with a FedRAMP moderate authorized secondary datacenter on Warm Standby. By seamlessly transitioning to a ready-to-go secondary system, we minimize downtime, protect critical operations, and minimize business disruption.
    yes-mark
    yes-mark

    Growth

    Performance

    Enterprise

    Terms & Agreements

    *Will accept Sharetru BAA and DPA as written unless negotiating Terms of Service

    Standard Online Terms of Service (TOS)
    Accept our standard terms as a clickwrap agreement with by a checkbox agreement on the order
    yes-mark
    yes-mark
    Signed TOS & HIPAA BAA
    A critical safeguard that fortifies your network, protects sensitive data, and mitigates the ever-evolving threat landscape
    yes-mark
    yes-mark
    Signed TOS & Data Privacy Agreement (DPA)
    Establishes clear guidelines and safeguards for the handling, processing, and protection of personal data, ensuring privacy and security for individuals.
    yes-mark
    yes-mark
    Negotiation of TOS
    Negotiated and signed TOS. Requires a 3 year agreement.
    no-mark
    yes-mark

    Growth

    Performance

    Enterprise

    Platform Features

    Analytics & Reporting
    Permanent Logs
    A critical safeguard that's important for maintaining an accurate record of events, decisions, and actions taken, ensuring transparency, accountability, and the ability to track progress over time.
    yes-mark
    yes-mark
    Analytics & Reporting
    Analytics dashboard with historical trends plus exportable reports
    yes-mark
    yes-mark
    Transfer Compatibility & File Sharing
    SFTP, FTPS, and FTPeS Access
    Provides a robust and secure file transfer mechanism with no size limitations to help facilitate efficient data exchange, compatibility, security, automation, while supporting legacy systems. Configurable per user or at the site level
    yes-mark
    yes-mark
    HTTPS Web Application Access
    Robust administration and file transfer capabilities supporting all modern web browsers
    yes-mark
    yes-mark
    Guest Link Sharing
    Outbound and inbound file sharing links to send or receive files without creating a user account. Control link expiration by number of uses, and number of days. Password protect links and manage creation from an intuitive dashboard interface.
    yes-mark
    yes-mark
    Brand to Your Business
    White Label with Your Logo
    Establish a strong brand presence by customizing and branding the software with your own logo, effectively creating a seamless and consistent user experience that reinforces your identity
    yes-mark
    yes-mark
    Customize Colors
    yes-mark
    yes-mark
    Custom Site Title
    yes-mark
    yes-mark
    Login Announcements
    A critical legal and security notice used by organizations to establish clear boundaries, enforce compliance, and enhance overall security posture by promoting awareness and accountability among users
    yes-mark
    yes-mark
    Custom Domain Name
    Point your own subdomain (such as sftp.yourdomain.com) with a CNAME to your Sharetru subdomain with an SSL Certificate included at our expense
    yes-mark
    yes-mark
    Custom User Agreements
    Legally enforces terms of service or company policies for system use by requiring user acceptance before application access
    yes-mark
    yes-mark
    User Management & Authentication
    Site & Team Managers
    yes-mark
    yes-mark
    Flexible User Permissions
    An industry benchmark. Grant users specific access and privileges based on their roles and responsibilities regarding workspaces, ensuring data security and maintaining control over sensitive information
    yes-mark
    yes-mark
    Advanced Password Controls
    Implement robust controls that empower employees with complex and unique passwords. Require change intervals and re-use controls to shield your sensitive data and safeguard your organization's reputation
    yes-mark
    yes-mark
    SSH Key Authentication
    Automated systems and SFTP software can use public SSH-key authentication to replace a traditional password, thwarting unauthorized access attempts and mitigating the risk of brute force attacks
    yes-mark
    yes-mark
    User IP Restrictions
    User-based IP address and protocol restrictions can bolster security measures, protect against unauthorized access, and align with compliance requirements. Layer onto an SFTP connection for an additional security check
    yes-mark
    yes-mark
    Two-factor Authentication
    Indispensable security feature that fortifies your defenses and bolsters your peace of mind. Users can be required to use 2FA as text message, email, or through an authentication app, and admins can restrict the OTP method allowed for each user. Studies have shown 99% of breaches can be thwarted with MFA in place
    yes-mark
    yes-mark
    Dual Authorization for User Creation
    A crucial key to safeguarding your digital fortress: mandatory additional administrative approval is essential for user creation, effectively preventing unauthorized users from being generated, thwarting any attempts at unauthorized user entry
    yes-mark
    yes-mark
    Single Sign-On (SSO) Integration
    Integrate your organization's SSO to streamline the authentication process, minimize the risk of password-related vulnerabilities, and simplify user experiences
    yes-mark
    yes-mark
    Automation
    Failed Login Policies
    Essential defense mechanism that fortifies your system against unauthorized access attempts by IP address or username, effectively thwarting malicious actors, and reinforcing your organization's cybersecurity posture
    yes-mark
    yes-mark
    Suspension by Date
    Auto-suspend users based on a future date of an administrator's choosing
    yes-mark
    yes-mark
    Auto-Suspension for Inactivity
    Prevent unnecessary access and potential breaches by implementing a number of days of inactivity before automatic suspension, while maintaining a safe and secure environment for active users
    yes-mark
    yes-mark
    Auto-Delete Users
    Deletes users after an administrator-specified number of days of after suspension.
    yes-mark
    yes-mark
    Bcc Mailbox Journaling
    Journal all system notifications automatically to an internal email address of your choosing so they're always accessible, and easily searchable
    yes-mark
    yes-mark
    Folder-Level File Retention Policies
    Establish policies for file retention and daily purge at the individual folder level or site wide
    yes-mark
    yes-mark
    Folder-level Custom Activity Notifications
    Automatically send email notifications when a file is uploaded, downloaded, deleted, or when a storage threshold is reached
    yes-mark
    yes-mark
    API Access
    Leverage the powerful synergy of our internal and partner-based API, meticulously designed for user and site management by administrators. It offers the unmatched advantage of extracting comprehensive administrative and file logs.
    yes-mark
    yes-mark
    Concurrent Connections
    Per User
    The number of simultaneous FTPS or SFTP connections per username
    10
    25
    25
    Per Remote IP Address
    The number of simultaneous FTPS or SFTP connections per remote IP address (ex: single office location for multiple users)
    10
    25
    No Limit
    Total
    The total number of simultaneous FTPS or SFTP connections for all users at all locations
    25
    75
    Software Limit Removed

    Growth

    Performance

    Enterprise

    Security and Compliance Controls

    Compliance Enablement
    CMMC Basic and Advanced
    In depth Customer Responsibility Matrix (CRM) for CMMC 2.0 Level 2 for the sharing of CUI is available for Sharetru clients
    yes-mark
    yes-mark
    NIST SP 800-171
    yes-mark
    yes-mark
    Completed NIST 800-53 SSP
    Required for FedRAMP Moderate Equivalency as clarified in the CMMC rule-making process (32 CFR 170)
    yes-mark
    yes-mark
    CMMC Customer Responsibility Matrix
    Available to our customers, our CMMC CRM crosswalks the controls for NIST 800-171 Rev 2 with the correlating controls for NIST 800-53 to ensure you're meeting requirements for the sharing of FCI, CUI, CDI, and CTI.
    yes-mark
    yes-mark
    DFARS 252.204-7012
    The Defense Federal Acquisition Regulation Supplement (DFARS) clause 242.204-7012 mandates defense contractors to safeguard sensitive defense information and report cyber incidents in section C-G. It emphasizes adhering to NIST SP 800-171 security standards, timely cyber incident reporting to the DoD, and ensuring the entire supply chain, including subcontractors, complies with these requirements.
    yes-mark
    yes-mark
    ITAR | EAR
    All data is hosted in U.S. datacenters managed only by U.S. Citizens
    yes-mark
    yes-mark
    FERPA
    FERPA (Family Educational Rights and Privacy Act) is a United States federal law that governs the privacy and security of student educational records. FERPA is unique in its focus on protecting student information
    yes-mark
    yes-mark
    GLBA | SOX | PCI-DSS
    yes-mark
    yes-mark
    GDPR
    The General Data Protection Regulation (GDPR) allows for the transfer of personal data outside the European Economic Area (EEA) to countries that are deemed to have adequate data protection standards or with appropriate safeguards in place, such as a Data Processing Agreement or the use of Standard Contractual Clauses (SCCs).
    yes-mark
    yes-mark
    HIPAA | HITECH
    yes-mark
    yes-mark
    Cloud Partner Certifications
    FedRAMP Moderate Authorized
    Contact us for more information
    yes-mark
    yes-mark
    NIST 800-53 R4
    pivotal in establishing a comprehensive set of security controls for federal information systems, guiding organizations towards achieving and maintaining compliance with federal cybersecurity standards such as FedRAMP Moderate
    yes-mark
    yes-mark
    StateRAMP
    yes-mark
    yes-mark
    CSA STAR
    Provides a comprehensive framework and transparency in assessing and validating the security posture of cloud service providers, enabling informed decision-making and ensuring the protection of sensitive data
    yes-mark
    yes-mark
    ISO 27001
    yes-mark
    yes-mark
    HIPAA | HITECH
    yes-mark
    yes-mark
    SaaS Compliance
    FedRAMP Moderate Equivalency
    Sharetru has a fully documented and prepared SSP for FedRAMP Moderate, and meets FedRAMP Moderate controls pertaining to encryption, security, privacy and availability, following the definition of FedRAMP moderate equivalency provided by the federal government in 32 CFR 170
    yes-mark
    yes-mark
    SOC 2 Type II Certified
    The IaaS, PaaS, and SaaS layers of Sharetru's Advanced Security & Compliance Enablement Platform are SOC 2 Type II certified
    yes-mark
    yes-mark
    Infrastructure & Platform Security
    FIPS 140-2 Approved Encryption Modules
    FIPS 140-2 approved ciphers are an essential security feature due to their rigorous testing and validation process, ensuring that cryptographic algorithms meet stringent standards, thereby safeguarding sensitive information from potential breaches
    yes-mark
    yes-mark
    Next Generation Antivirus (NGAV)
    Next-generation antivirus utilizes machine learning algorithms to proactively identify and mitigate emerging threats by analyzing patterns and behaviors, enhancing cybersecurity defenses.
    yes-mark
    yes-mark
    Geo Fencing by Country
    An indispensable feature that enables you to fortify your defenses, restrict access to vulnerable regions, and effectively safeguard your data from malicious threats
    yes-mark
    yes-mark
    Dedicated Firewalls
    A critical safeguard that fortifies your network, protects sensitive data, and mitigates the ever-evolving threat landscape
    yes-mark
    yes-mark
    Intruder IP Blacklisting
    Empowers our software to proactively ward off malicious actors permanently, keeping your systems and sensitive data shielded from unauthorized access, breaches, and cyber threats
    yes-mark
    yes-mark
    Dedicated IP Address
    A critical security feature that proactively detects and prevents malicious activities within the network, ensuring constant protection against sophisticated cyber threats
    yes-mark
    yes-mark
    A+ Qualys SSL Rating
    A crucial security feature as it demonstrates an organization's commitment to maintaining the highest level of cybersecurity standards. Sharetru’s SSL configuration for HTTPS have earned a rating of A+ by world-renowned Qualys SSL Labs.
    yes-mark
    yes-mark
    Network IPS
    A critical security feature that proactively detects and prevents malicious activities within the network, ensuring constant protection against sophisticated cyber threats
    yes-mark
    yes-mark
    Host IDS
    A Host-based Intrusion Detection Service (HIDS) monitors for and issues alerts for any unauthorized operating system changes
    yes-mark
    yes-mark
    Dedicated Server
    A dedicated server for file transfer software in the cloud ensures consistent performance, reliability, and security, while allowing for efficient resource allocation and scalability to meet varying demands.
    no-mark
    yes-mark
    Business Continuity
    Daily Onsite Backup
    By keeping 30 days of backups within arm's reach, we eliminate the risks of relying solely on offsite solutions, ensuring immediate accessibility, swift recovery, and total control while bolstering your company's resilience to disaster.
    yes-mark
    yes-mark
    Built-In Disaster Recovery
    Keep your business thriving even in the face of unforeseen disruptions with a FedRAMP moderate authorized secondary datacenter on Warm Standby. By seamlessly transitioning to a ready-to-go secondary system, we minimize downtime, protect critical operations, and minimize business disruption.
    yes-mark
    yes-mark

    Growth

    Performance

    Enterprise

    Terms & Agreements

    *Will accept Sharetru BAA and DPA as written unless negotiating Terms of Service

    Standard Online Terms of Service (TOS)
    Accept our standard terms as a clickwrap agreement with by a checkbox agreement on the order
    yes-mark
    yes-mark
    Signed TOS & HIPAA BAA
    A critical safeguard that fortifies your network, protects sensitive data, and mitigates the ever-evolving threat landscape
    yes-mark
    yes-mark
    Signed TOS & Data Privacy Agreement (DPA)
    Establishes clear guidelines and safeguards for the handling, processing, and protection of personal data, ensuring privacy and security for individuals.
    yes-mark
    yes-mark
    Negotiation of TOS
    Negotiated and signed TOS. Requires a 3 year agreement.
    no-mark
    yes-mark

    Quotes From Our Valued Partners

    Andy Hagen Headshot
    quote-icons

    Easy Auditing

    For us as an aersopace and defense contractor it's a very easy to use tool for us to share data with customers. We needed a portal that meets our strict security compliance. The auditing and reporting features are nice in the event we need to leverage that data.

    Andy Hagen | Manager of Information Technology

    Armando Montalvo Headshot
    quote-icons

    Protection for CUI

    ...Sharetru's intuitive interface and advanced security measures, such as encryption and access controls, enable seamless file sharing and collaboration while fortifying the safeguarding of valuable information while adhering to DDTC guidelines. With Sharetru as our trusted ally, we've significantly improved efficiency and security, reaching new heights in data protection and user satisfaction for our employees and clients.

     

    Armando Montalvo | Information Security & Compliance Manager

    temp-avatar
    quote-icons

    Cost Effective

    The US has some of the most challenging regulations to satisfy and I've been able to ensure global compliance for my organization utilizing Sharetru's Advanced Security and Compliance Platform, without breaking the bank!

    Mike Clarence | Operations Security Manager

    Frequently Asked Questions

    F.A.Q.

    Why should I outsource File Transfer Services?

    Choosing a MFTaaS like Sharetru offers distinct advantages over hosting your own server. With Sharetru, you benefit from optimal bandwidth for multiple connections without the exorbitant costs. Our servers boast redundant internet connections, eliminating single points of failure you might encounter with an in-house server. Hosting your own solution means you're in charge of the entire file transfer supply chain from top to bottom. In addition, you might expose your network to security risks and potential hacker attacks. Additionally, Sharetru servers are specialized for high-performance file transfers, whereas an in-house solution could be spread thin serving multiple purposes. Managing your own server can bring about substantial costs, ranging from dedicated internet circuits, software maintenance, to allocating resources and personnel for server management. Moreover, in-house file transfer can monopolize bandwidth, slowing down other internet activities like browsing and email.

    What is Managed File Transfer as a Service?

    Managed File Transfer as a Service (MFTaaS) is a file transfer site on the internet to store files for delivery to other persons or applications. One person uploads (copies) the files from their computer to the site, then the other person downloads (copies) the files from the file transfer site to their computer. Either person can then delete the files from the site if the permissions allow.

    Is Sharetru SOC 2 Type II Certified?

    Yes, we're pleased to inform you that Sharetru is SOC 2 Type II certified across all layers of our services: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). This certification underscores our unwavering commitment to maintaining the highest standards of security and operational excellence for our clients. If you're in the discovery phase and considering Sharetru for your needs, we'd be more than happy to share our SOC 2 Type II report with you. It's a testament to our dedication to transparency and trustworthiness in all our operations

    Can Sharetru provide a data sheet for it's offerings?

    Certainly! Sharetru is more than happy to provide you with a datasheet.  To obtain the datasheet, simply reach out to us by sending an email to sales@sharetru.com. Our dedicated team will promptly assist you with your request and answer any questions you may have, ensuring you have all the information you need to make an informed decision.

    What encryption does Sharetru employ?

    Sharetru employs state-of-the-art encryption techniques to ensure the utmost security of your data. For data at rest, we utilize Advanced Encryption Standard (AES) with a 256-bit key length, one of the most secure encryption methods available. When it comes to data in transit, we rely on Transport Layer Security (TLS) 1.2 to safeguard your information as it moves between systems. If you're interested in encrypting at the file level, it's essential to note that this requires specific training for your users before uploading files. We've consciously chosen not to encrypt at the file level because having access to your encryption keys can pose a security risk for you. Our priority is to strike the right balance between accessibility and security, always keeping your best interests at the forefront.

    Where does Sharetru host your data?

    At Sharetru, we prioritize the security and integrity of your data. We are proud to affirm that all our data is exclusively hosted in U.S. datacenters. Furthermore, on our Advanced Security and Compliance Platform, even our disaster recovery datacenter is located within the U.S. To bolster our commitment to data security, since our inception, every single employee at Sharetru has been a U.S. citizen. This ensures a consistent understanding and adherence to U.S. data protection standards. You can rest assured knowing that with Sharetru, your data remains on American soil, managed by a team deeply rooted in the values and regulations of the U.S.

    How long does it really take to set up Sharetru?

    We know that software solutions can sometimes be difficult to setup. That's why we have dedicated customer success team members to assist you with onboarding, training, and be there with you every step of the way. Every company is different but there are best practices we can assist with while also bringing in resources from multiple departments to help you configure it correctly for high adoption. The 14 day free trial can roll directly into your subscription, too, so you won't lose your work!

    Hard drives are cheap. Why isn't your storage?

    At Sharetru, we provide you with unlimited bandwidth transfer monthly at no extra charge, recognizing that our customers heavily utilize this resource, making it our primary operational expense. While many FTP sites frequently refresh their data storage – some daily or even multiple times a day – remember, every file transfer essentially happens twice: once for uploading and once for downloading, directly impacting our operational costs. Also, only some hard drives are cheap. Unlike services that rely on more affordable storage solutions or cheap cloud object storage, we pride ourselves on using high-performance drives. Our RAID arrays are designed to replicate every byte across several drives, ensuring maximum reliability and facilitating swift recovery from any drive failures. Lastly, every file you store on our FTP site gets backed up, with a minimum of 7 days of backup retained. This means we're essentially storing several times more than what you see on the FTP server itself.

    Will my users need a desktop client?

    Your users are not forced to purchase or install any FTP client software. Sharetru provides a WebApp as part of the hosted FTP service. However, should your users prefer to use a third-party FTP client software tool, they will find that your FTP site from Sharetru is fully compatible with almost all of them. More information on compatibility and some recommendations can be found here.

    Will Sharetru sign a GDPR DPA?

    When it comes to the General Data Protection Regulation (GDPR) Data Processing Agreement (DPA), Sharetru will only sign a DPA that we provide. The reason for this is that our DPA is built upon our terms of service, ensuring a consistent and comprehensive understanding of our commitments and responsibilities. Furthermore, it's important to highlight that our DPA doesn't just cater to GDPR. It encompasses many other data privacy frameworks, offering a broad spectrum of protection and compliance. We've taken meticulous steps to ensure our DPA aligns with various global standards, providing you with a robust and holistic approach to data privacy.

    Will Sharetru sign a customer's HIPAA BAA?

    While we recognize the significance of Business Associate Agreements (BAAs) in the context of HIPAA compliance, Sharetru will only sign a BAA that is provided by us. This is because our BAA has our terms of service as the foundational agreement. It's worth noting that our BAA was meticulously crafted by some of the leading HIPAA attorneys in the industry, who played instrumental roles in drafting the HIPAA HITECH rules. As such, we have utmost confidence in its structure and its capability to safeguard your electronic protected health information (ePHI). We believe our BAA offers both clarity and robust protection, ensuring compliance while prioritizing the security of your data.

    Do you offer a free trial? How does it work?

    Yes, we offer 14-day free trials for both our Growth and Performance plans directly through our checkout form. Enterprise plans are on a dedicated virtual machine that requires a custom build, so we don't offer a free trial on this plan. If you are interested in our Enterprise offering but would like to try us first, then we recommend starting a trial on our Performance plan. The free trial site becomes a live, paid subscription automatically. We do this because many of our customers decide early in the trial that our platform is the right fit, and this allows them to keep the configurations from the trial period.

    Is Sharetru FedRAMP Authorized?
    We're committed to ensuring the highest standards of security and compliance for our customers. To that end, our MFT platform employs Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) that are both FedRAMP moderate authorized. We understand the critical importance of this authorization, especially for clients navigating the stringent requirements of sharing CUI. Recognizing this, we've initiated the process of obtaining FedRAMP moderate authorization for our Software as a Service (SaaS) layer as well. Additionally, we've developed a System Security Plan (SSP) for FedRAMP moderate equivalency, and a Customer Responsibility Matrix aligning to the FedRAMP equivalency definition in 32 CFR 170 to further solidifying our dedication to helping you meet and exceed the rigorous standards set by DFARS 242.204-7012 and NIST 800-53
    Does Sharetru complete Security Questionnaires?

    While we understand the importance of security questionnaires in assessing vendor compliance and security measures, Sharetru typically completes these questionnaires only in rare circumstances. Specifically, if a customer is on our Enterprise plan, we may consider fulfilling such a request. However, our preferred method of demonstrating our unwavering commitment to security is by providing our SOC 2 Type II certification. This certification is a testament to our rigorous security practices and standards, and we believe it offers a comprehensive overview of our dedication to safeguarding your data.

    What counts as an active user on Sharetru's MFT platform?

    An active user on Sharetru is defined as any individual who possesses a username and password, allowing them to log in (authenticate) to our platform. It's essential to note that if a user is suspended for any reason, they are not considered active. We prioritize transparency and fairness in our user count, so rest assured that suspended users will not be counted against your user quota. This approach ensures you get the most value out of your plan while maintaining clarity on user limits.

    Are there any setup fees?

    When you sign up with Sharetru, we believe in starting our relationship on the right foot. One of the ways we ensure this is by eliminating any initial barriers or hidden costs. That's why we're proud to say there are absolutely no setup fees attached to our services. We want to make the onboarding process as smooth and welcoming as possible, allowing you to focus on leveraging our services rather than worrying about upfront costs. At Sharetru, transparency and customer satisfaction take the front seat from the very beginning

    Is it easy to upgrade users and storage on Sharetru?

    Absolutely! Upgrading users and storage on Sharetru is a straightforward process. If you find yourself needing additional storage or more user accounts, all you have to do is open a support ticket informing us of your requirements. Our team will promptly respond with a few clarifying questions to ensure we're tailoring the upgrade to best suit your needs and position you for success. Once we've gathered the necessary details and received your approval, the changes are typically implemented on the very same day. We're here to make sure your experience is seamless and efficient every step of the way.

    How fast and reliable is the Sharetru network?

    Using the latest advanced routing protocols, Sharetru's network allows your data to travel over the optimal path to reach its destination. Instead of making your data wander around, we find the best and fastest route for it. Think of it like having VIP passes to the internet's major highways, thanks to our connections with the big players out there. What does this mean for you? A super-speedy, sturdy, and safe connection from your place to your customers'. And trust us, we're always on the lookout for the next big thing to make sure we keep giving you the fastest and most reliable service possible!

    Do you provide 24x7 support?

    At Sharetru, we prioritize seamless communication with our support team by offering an online ticketing system, a comprehensive knowledge base, and a corporate contact number available to you and all your end users. Instead of outsourcing our technical support abroad just to claim round-the-clock availability, our proficient team is on-hand during work hours that effectively span all U.S. time zones. Should there be any after-hours emergencies, like verified server outages, we've got you covered with a messaging system linked to our toll-free number, ensuring a senior support technician can assist you anytime, any day of the year.

    What is unlimited transfer or unlimited bandwidth?

    Often, 'transfer' and 'bandwidth' are terms that get used interchangeably, even by us on our pricing page because it's the industry standard. To be precise, 'transfer' refers to bandwidth usage, or the amount of data your FTP site uploads and downloads monthly. While some providers might cap this or charge extra once you exceed a certain limit, and others claim to offer “unlimited” usage but might penalize excessive consumption, Sharetru genuinely offers unlimited monthly bandwidth transfer. On the other hand, 'bandwidth' denotes the speed of this transfer, think of it as the “size of the pipe” or its maximum flow rate. At Sharetru, each site can tap into a robust 1 Gigabit of bandwidth at our gateway firewall, and all our internal ethernet connections match this speed.

    Are there any file size limitations?

    Sharetru servers come without any file size restrictions. This means you can upload as large a file as you want, with the only constraint being the remaining space on your chosen plan's storage capacity. That said, a heads-up: sometimes, it's the browsers that play the spoiler. Some of them might have their own file size limitations, so you might want to check that out before you start your a large HTTPS upload. If it is a large file, we recommend using SFTP instead.

    *Does Sharetru negotiate its Terms of Service (TOS)?

    In reference to the pricing card asterisk above, yes, Sharetru is open to negotiating our terms of service, but there are specific criteria to be met. We offer this flexibility exclusively to our clients on the Enterprise plan. Additionally, any negotiation of the terms requires a commitment to a minimum 3-year contract, which must be paid on an annual basis. We believe in fostering strong partnerships with our Enterprise clients and are willing to discuss terms that align with both our objectives and yours, ensuring a mutually beneficial relationship.

    Does Sharetru integrate with other platforms for file transfers?

    Absolutely! Sharetru is designed to seamlessly integrate with other platforms for efficient file transfers. If you're looking to move files between platforms, you can leverage SFTP scripting, FTPS, or FTPeS on our Advanced Security and Compliance Platform. The only requirement is that the application you're integrating with has a connector. It's worth noting that many of our customers handle bulk data transfers, and in such scenarios, SFTP proves to be far superior and more efficient than an API.

    sharetru-symbol-white

    Why Sharetru?

    From compliance enablement to responsive customer support, encryption and data retention, audits and reporting, we've got you covered. But don't just take our word for it. Schedule your demo today and see our platform in action.