Pricing

    SaaS File Sharing Plans

    Unlock a new level of efficiency and peace of mind with our secure file transfer software, empowering you to confidently share and automate transfers of confidential files with clients and colleagues, knowing that every transfer is encrypted, monitored, and backed by our robust security features. Try it for 14 days, risk-free.

    Growth
    $108/month* * when paid annually
    Users
    • Initial Quota - 10 Users
    • Upgrade Increment - 10 Users
    • Plan Limit - 40 Users
    Storage
    • Initial Quota - 10GB
    • Upgrade Increment - 10GB
    • Plan Limit - 20GB
    Concurrent Connections
    • Per User - 10
    • Per Remote IP Address - 10
    • Total - 25
    • Check Unlimited Bandwidth
    • No Customer Success Manager
    • No Dedicated Instance
    • No Scalable Compute Resources
    • No Advanced Security and Compliance
    Performance
    $270/month* * when paid annually
    Users
    • Initial Quota - 50 Users
    • Upgrade Increment - 50 Users
    • Plan Limit - 250 Users
    Storage
    • Initial Quota - 25GB
    • Upgrade Increment - 25GB
    • Plan Limit - 250GB
    Concurrent Connections
    • Per User - 25
    • Per Remote IP Address - 25
    • Total - 75
    • Check Unlimited Bandwidth
    • Check Customer Success Manager
    • No Dedicated Instance
    • No Scalable Compute Resources
    • Costs Extra Advanced Security and Compliance
    Enterprise
    Contact Sales (702) 850-2910 ext 1
    Users
    • Initial Quota - Unlimited Users
    • Upgrade Increment - Unlimited Users
    • Plan Limit - Unlimited Users
    Storage
    • Initial Quota - 250GB
    • Upgrade Increment - 250GB
    • Plan Limit - Unlimited
    Concurrent Connections
    • Per User - 25
    • Per Remote IP Address - No Limit
    • Total - Software Limit Removed
    • Check Unlimited Bandwidth
    • Check Customer Success Manager
    • Check Dedicated Instance
    • Costs Extra Scalable Compute Resources
    • Costs Extra Advanced Security and Compliance

    Platform Features

    Analytics & Reporting
    Immutable Logs tooltip
    Analytics & Reporting tooltip
    Automation
    Suspension by Date tooltip
    Suspension for Inactivity tooltip
    BCC Mailbox Journaling tooltip
    Folder-level File Retention tooltip
    Activity Notifications  tooltip
    Failed Login Policies tooltip
    Brand to Your Business
    White label w/Your Logo
    Customize Colors
    Customize Site Title
    Login Announcements tooltip
    Custom Domain Name tooltip
    Custom User Agreements tooltip
    Transfer Compatibility & File Sharing
    FTP, FTPS & SFTP Access tooltip
    Web Application Access tooltip
    Guest Link Sharing tooltip
    User Management & Authentication
    Site & Group Admin Roles 
    Flexible User Permissions tooltip
    Advanced Password Controls  tooltip
    SSH Key Authentication  tooltip
    Single Sign-On (SSO) tooltip
    User IP Restrictions tooltip
    Two-factor Authentication tooltip

    Growth

    Immutable Logs - Yes Mark
    Analytics & Reporting - Yes Mark
    Suspension by Date - Yes Mark
    Suspension for Inactivity - No Mark
    BCC Mailbox Journaling - No Mark
    Folder-level File Retention - No Mark
    Activity Notifications  - No Mark
    Failed Login Policies - No Mark
    White label w/Your Logo - Yes Mark
    Customize Colors - Yes Mark
    Customize Site Title - Yes Mark
    Login Announcements - No Mark
    Custom Domain Name - No Mark
    Custom User Agreements - No Mark
    FTP, FTPS & SFTP Access - Yes Mark
    Web Application Access - Yes Mark
    Guest Link Sharing - Yes Mark
    Site & Group Admin Roles  - Yes Mark
    Flexible User Permissions - Yes Mark
    Advanced Password Controls  - Yes Mark
    SSH Key Authentication  - Yes Mark
    Single Sign-On (SSO) - No Mark
    User IP Restrictions - No Mark
    Two-factor Authentication - No Mark

    Performance

    Immutable Logs - Yes Mark
    Analytics & Reporting - Yes Mark
    Suspension by Date - Yes Mark
    Suspension for Inactivity - Yes Mark
    BCC Mailbox Journaling - Yes Mark
    Folder-level File Retention - Yes Mark
    Activity Notifications  - Yes Mark
    Failed Login Policies - Yes Mark
    White label w/Your Logo - Yes Mark
    Customize Colors - Yes Mark
    Customize Site Title - Yes Mark
    Login Announcements - Yes Mark
    Custom Domain Name - Yes Mark
    Custom User Agreements - Yes Mark
    FTP, FTPS & SFTP Access - Yes Mark
    Web Application Access - Yes Mark
    Guest Link Sharing - Yes Mark
    Single Sign-On (SSO) - Yes Mark
    Site & Group Admin Roles  - Yes Mark
    Flexible User Permissions - Yes Mark
    Advanced Password Controls  - Yes Mark
    SSH Key Authentication  - Yes Mark
    User IP Restrictions - Yes Mark
    Two-factor Authentication - Yes Mark

    Enterprise

    Immutable Logs - Yes Mark
    Analytics & Reporting - Yes Mark
    Suspension by Date - Yes Mark
    Suspension for Inactivity - Yes Mark
    BCC Mailbox Journaling - Yes Mark
    Folder-level File Retention - Yes Mark
    Activity Notifications  - Yes Mark
    Failed Login Policies - Yes Mark
    White label w/Your Logo - Yes Mark
    Customize Colors - Yes Mark
    Customize Site Title - Yes Mark
    Login Announcements - Yes Mark
    Custom Domain Name - Yes Mark
    Custom User Agreements - Yes Mark
    FTP, FTPS & SFTP Access - Yes Mark
    Web Application Access - Yes Mark
    Guest Link Sharing - Yes Mark
    Single Sign-On (SSO) - Yes Mark
    Site & Group Admin Roles  - Yes Mark
    Flexible User Permissions - Yes Mark
    Advanced Password Controls  - Yes Mark
    SSH Key Authentication  - Yes Mark
    User IP Restrictions - Yes Mark
    Two-factor Authentication - Yes Mark

    Standard Security

    Cloud Partner Certifications
    SOC2 Type II Certified
    ISO 27001 Certified
    Encryption & Data Retention
    Encryption At-Rest tooltip
    Encryption in Transit tooltip
    FIPS 140-2 Approved
    Daily Offsite Backup tooltip
    Infrastructure & Platform Security
    Dedicated Firewalls tooltip
    High Availability IaaS tooltip
    Dedicated IP Address tooltip
    Intruder IP Blacklisting tooltip
    Geo Fencing by Country tooltip
    A+ Qualys SSL Rating tooltip

    Growth

    SOC2 Type II Certified - Yes Mark
    ISO 27001 Certified - Yes Mark
    Encryption At-Rest - Yes Mark
    Encryption in Transit - Yes Mark
    FIPS 140-2 Approved - Yes Mark
    Daily Offsite Backup - Yes Mark
    Dedicated Firewalls - Yes Mark
    High Availability IaaS - Yes Mark
    Dedicated IP Address - Yes Mark
    Intruder IP Blacklisting - Yes Mark
    Geo Fencing by Country - Yes Mark
    A+ Qualys SSL Rating - Yes Mark

    Performance

    SOC2 Type II Certified - Yes Mark
    ISO 27001 Certified - Yes Mark
    Encryption At-Rest - Yes Mark
    Encryption in Transit - Yes Mark
    FIPS 140-2 Approved - Yes Mark
    Daily Offsite Backup - Yes Mark
    Dedicated Firewalls - Yes Mark
    High Availability IaaS - Yes Mark
    Dedicated IP Address - Yes Mark
    Intruder IP Blacklisting - Yes Mark
    Geo Fencing by Country - Yes Mark
    A+ Qualys SSL Rating - Yes Mark

    Enterprise

    SOC2 Type II Certified - Yes Mark
    ISO 27001 Certified - Yes Mark
    Encryption At-Rest - Yes Mark
    Encryption in Transit - Yes Mark
    FIPS 140-2 Approved - Yes Mark
    Daily Offsite Backup - Yes Mark
    Dedicated Firewalls - Yes Mark
    High Availability IaaS - Yes Mark
    Dedicated IP Address - Yes Mark
    Intruder IP Blacklisting - Yes Mark
    Geo Fencing by Country - Yes Mark
    A+ Qualys SSL Rating - Yes Mark

    Advanced Security and Compliance Add-On

    Business Continuity
    Daily Onsite Backup tooltip
    Disaster Recovery tooltip
    Certifications: IaaS & PaaS
    FedRAMP Moderate
    NIST SP800-53 R4
    StateRAMP
    CSA STAR
    Certifications: SaaS
    SOC2 Type II Certified
    Compliance Enablement
    NIST SP 800-171
    DFARS 252.204-7012
    DFARS 252.204-7019
    DFARS 252.204-7020
    DFARS 252.204-7021
    CMMC 2.0 Levels 1 & 2
    ITAR / EAR
    FERPA
    GLBA | SOX | PCI-DSS
    HIPAA | HITECH
    GDPR tooltip
    Infrastructure & Platform Security
    Dedicated IP Address tooltip
    Network IPS tooltip
    Host IDS tooltip
    Malware Protection tooltip

    Growth

    Daily Onsite Backup - No Mark
    Disaster Recovery - No Mark
    FedRAMP Moderate - No Mark
    NIST SP800-53 R4 - No Mark
    StateRAMP - No Mark
    CSA STAR - No Mark
    SOC2 Type II Certified - Yes Mark
    NIST SP 800-171 - No Mark
    DFARS 252.204-7012 - No Mark
    DFARS 252.204-7019 - No Mark
    DFARS 252.204-7020 - No Mark
    DFARS 252.204-7021 - No Mark
    CMMC 2.0 Levels 1 & 2 - No Mark
    ITAR / EAR - No Mark
    FERPA - No Mark
    GLBA | SOX | PCI-DSS - No Mark
    HIPAA | HITECH - No Mark
    GDPR - No Mark
    Network IPS - No Mark
    Host IDS - No Mark
    Malware Protection - No Mark
    Dedicated IP Address - Specialty Icon

    Performance

    Daily Onsite Backup - Specialty Icon
    Disaster Recovery - Specialty Icon
    FedRAMP Moderate - Specialty Icon
    NIST SP800-53 R4 - Specialty Icon
    StateRAMP - Specialty Icon
    CSA STAR - Specialty Icon
    SOC2 Type II Certified - Yes Mark
    NIST SP 800-171 - Specialty Icon
    DFARS 252.204-7012 - Specialty Icon
    DFARS 252.204-7019 - Specialty Icon
    DFARS 252.204-7020 - Specialty Icon
    DFARS 252.204-7021 - Specialty Icon
    CMMC 2.0 Levels 1 & 2 - Specialty Icon
    ITAR / EAR - Specialty Icon
    FERPA - Specialty Icon
    GLBA | SOX | PCI-DSS - Specialty Icon
    HIPAA | HITECH - Specialty Icon
    GDPR - Specialty Icon
    Network IPS - Specialty Icon
    Host IDS - Specialty Icon
    Malware Protection - Specialty Icon
    Dedicated IP Address - Specialty Icon

    Enterprise

    Daily Onsite Backup - Specialty Icon
    Disaster Recovery - Specialty Icon
    FedRAMP Moderate - Specialty Icon
    NIST SP800-53 R4 - Specialty Icon
    StateRAMP - Specialty Icon
    CSA STAR - Specialty Icon
    SOC2 Type II Certified - Yes Mark
    NIST SP 800-171 - Specialty Icon
    DFARS 252.204-7012 - Specialty Icon
    DFARS 252.204-7019 - Specialty Icon
    DFARS 252.204-7020 - Specialty Icon
    DFARS 252.204-7021 - Specialty Icon
    CMMC 2.0 Levels 1 & 2 - Specialty Icon
    ITAR / EAR - Specialty Icon
    FERPA - Specialty Icon
    GLBA | SOX | PCI-DSS - Specialty Icon
    HIPAA | HITECH - Specialty Icon
    GDPR - Specialty Icon
    Network IPS - Specialty Icon
    Host IDS - Specialty Icon
    Malware Protection - Specialty Icon
    Dedicated IP Address - Specialty Icon

    Terms & Agreements

    Standard Online Terms of Service
    Consideration of Changes to Terms of Service tooltip
    Signed HIPAA BAA tooltip
    Signed Privacy DPA tooltip

    Growth

    Standard Online Terms of Service - Yes Mark
    Consideration of Changes to Terms of Service - No Mark
    Signed HIPAA BAA - No Mark
    Signed Privacy DPA - No Mark

    Performance

    Standard Online Terms of Service - Yes Mark
    Consideration of Changes to Terms of Service - No Mark
    Signed HIPAA BAA - Specialty Icon
    Signed Privacy DPA - Specialty Icon

    Enterprise

    Standard Online Terms of Service - Yes Mark
    Consideration of Changes to Terms of Service - Yes Mark
    Signed HIPAA BAA - Specialty Icon
    Signed Privacy DPA - Specialty Icon
    Growth

    Platform Features

    Analytics & Reporting
    Immutable Logs
    An irrefutable source of truth. Immutable file and admin logs provide invaluable protection against data tampering or unauthorized modifications, and enable comprehensive forensic analysis and incident response
    Immutable Logs - Yes Mark
    Analytics & Reporting
    Analytics dashboard with historical trends plus exportable reports
    Analytics & Reporting - Yes Mark
    Automation
    Suspension by Date
    Auto-suspend users based on a future date of an administrator's choosing
    Suspension by Date - Yes Mark
    Suspension for Inactivity
    Prevent unnecessary access and potential breaches by implementing a number of days of inactivity before automatic suspension, while maintaining a safe and secure environment for active users.
    Suspension for Inactivity - No Mark
    BCC Mailbox Journaling
    Journal all system notifications automatically to an internal email address of your choosing so they're always accessible, and easily searchable
    BCC Mailbox Journaling - No Mark
    Folder-level File Retention
    Establish policies for file retention and daily purge at the individual folder level or site wide
    Folder-level File Retention - No Mark
    Activity Notifications 
    Automatically send email notifications when a file is uploaded, downloaded, deleted, or when a storage threshold is reached
    Activity Notifications  - No Mark
    Failed Login Policies
    Essential defense mechanism that fortifies your system against unauthorized access attempts by IP address or username, effectively thwarting malicious actors, and reinforcing your organization's cybersecurity posture
    Failed Login Policies - No Mark
    Brand to Your Business
    White label w/Your Logo
    White label w/Your Logo - Yes Mark
    Customize Colors
    Customize Colors - Yes Mark
    Customize Site Title
    Customize Site Title - Yes Mark
    Login Announcements
    A critical legal and security notice used by organizations to establish clear boundaries, enforce compliance, and enhance overall security posture by promoting awareness and accountability among users.
    Login Announcements - No Mark
    Custom Domain Name
    Point your own subdomain (such as sftp.yourdomain.com) with a CNAME to your Sharetru subdomain with an SSL Certificate included at our expense
    Custom Domain Name - No Mark
    Custom User Agreements
    Legally enforces terms of service or company policies for system use by requiring user acceptance before application access
    Custom User Agreements - No Mark
    Transfer Compatibility & File Sharing
    FTP, FTPS & SFTP Access
    Configurable standard file transfer protocols for automation and power users
    FTP, FTPS & SFTP Access - Yes Mark
    Web Application Access
    Robust administration and file transfer capabilities supporting all modern web browsers
    Web Application Access - Yes Mark
    Guest Link Sharing
    Outbound and inbound file sharing links to send or receive files without creating a user account
    Guest Link Sharing - Yes Mark
    User Management & Authentication
    Site & Group Admin Roles 
    Site & Group Admin Roles  - Yes Mark
    Flexible User Permissions
    Control folder access and user permissions for upload, download, delete, and viewing file names by folder for each user
    Flexible User Permissions - Yes Mark
    Advanced Password Controls 
    Implement robust controls that empower employees with complex and unique passwords. Require change intervals and re-use controls to shield your sensitive data and safeguard your organization's reputation
    Advanced Password Controls  - Yes Mark
    SSH Key Authentication 
    Automated systems and SFTP software can use public SSH-key authentication to replace a tradition password, thwarting unauthorized access attempts and mitigating the risk of brute force attacks
    SSH Key Authentication  - Yes Mark
    Single Sign-On (SSO)
    Integrate your organization's SSO to streamline the authentication process, minimize the risk of password-related vulnerabilities, and simplify user experiences
    Single Sign-On (SSO) - No Mark
    User IP Restrictions
    Restrict each user by protocol and/or by their remote IP address for tight security. Layer onto an SFTP connection for an additional security check
    User IP Restrictions - No Mark
    Two-factor Authentication
    Indispensable security feature that fortifies your defenses and bolsters your peace of mind. Users can be required to use 2FA and admins can restrict the OTP method allowed for each user. indispensable security feature that fortifies your defenses and bolsters your peace of mind. By combining the power of multiple authentication factors you create a barrier that malicious actors cannot breach.
    Two-factor Authentication - No Mark

    Standard Security

    Cloud Partner Certifications
    SOC2 Type II Certified
    SOC2 Type II Certified - Yes Mark
    ISO 27001 Certified
    ISO 27001 Certified - Yes Mark
    Encryption & Data Retention
    Encryption At-Rest
    NIST approved AES-256 encryption is widely regarded as the benchmark for secure symmetric encryption, and is used on all Sharetru storage systems
    Encryption At-Rest - Yes Mark
    Encryption in Transit
    Crucial for ensuring secure and private communication over the internet, shielding sensitive data from interception and unauthorized access. TLS 1.2 and NIST approved AES-256 and AES-128 on all protocols
    Encryption in Transit - Yes Mark
    FIPS 140-2 Approved
    FIPS 140-2 Approved - Yes Mark
    Daily Offsite Backup
    Standard Security has 7 days of backups. If you're in need of disaster recovery on warm standby, please refer to the Advanced Compliance and Enablement offering
    Daily Offsite Backup - Yes Mark
    Infrastructure & Platform Security
    Dedicated Firewalls
    A critical safeguard that fortifies your network, protects sensitive data, and mitigates the ever-evolving threat landscape
    Dedicated Firewalls - Yes Mark
    High Availability IaaS
    Ensures seamless performance, maximum uptime, uninterrupted user experiences, and reliability
    High Availability IaaS - Yes Mark
    Dedicated IP Address
    An essential asset that enhances reliability, strengthens security measures, and boosts reputation, providing you with a distinct identity and trustworthiness when operating our software
    Dedicated IP Address - Yes Mark
    Intruder IP Blacklisting
    Empowers our software to proactively ward off malicious actors permanently, keeping your systems and sensitive data shielded from unauthorized access, breaches, and cyber threats
    Intruder IP Blacklisting - Yes Mark
    Geo Fencing by Country
    An indispensable feature that enables you to fortify your defenses, restrict access to vulnerable regions, and effectively safeguard your data from malicious threats
    Geo Fencing by Country - Yes Mark
    A+ Qualys SSL Rating
    Sharetru’s SSL configuration for HTTPS have earned a rating of A+ by world-renowned Qualys SSL Labs
    A+ Qualys SSL Rating - Yes Mark

    Advanced Security and Compliance Add-On

    Business Continuity
    Daily Onsite Backup
    By keeping 30 days of backups within arm's reach, we eliminate the risks of relying solely on offsite solutions, ensuring immediate accessibility, swift recovery, and total control while bolstering your company's resilience to disaster.
    Daily Onsite Backup - No Mark
    Disaster Recovery
    Keep your business thriving even in the face of unforeseen disruptions with FedRAMP moderate authorized IaaS and PaaS on Warm Standby. By seamlessly transitioning to a ready-to-go secondary system, we minimize downtime, protect critical operations, and minimize business disruption.
    Disaster Recovery - No Mark
    Certifications: IaaS & PaaS
    FedRAMP Moderate
    FedRAMP Moderate - No Mark
    NIST SP800-53 R4
    NIST SP800-53 R4 - No Mark
    StateRAMP
    StateRAMP - No Mark
    CSA STAR
    CSA STAR - No Mark
    Certifications: SaaS
    SOC2 Type II Certified
    SOC2 Type II Certified - Yes Mark
    Compliance Enablement
    NIST SP 800-171
    NIST SP 800-171 - No Mark
    DFARS 252.204-7012
    DFARS 252.204-7012 - No Mark
    DFARS 252.204-7019
    DFARS 252.204-7019 - No Mark
    DFARS 252.204-7020
    DFARS 252.204-7020 - No Mark
    DFARS 252.204-7021
    DFARS 252.204-7021 - No Mark
    CMMC 2.0 Levels 1 & 2
    CMMC 2.0 Levels 1 & 2 - No Mark
    ITAR / EAR
    ITAR / EAR - No Mark
    FERPA
    FERPA - No Mark
    GLBA | SOX | PCI-DSS
    GLBA | SOX | PCI-DSS - No Mark
    HIPAA | HITECH
    HIPAA | HITECH - No Mark
    GDPR
    The General Data Protection Regulation (GDPR) allows for the transfer of personal data outside the European Economic Area (EEA) to countries that are deemed to have adequate data protection standards or with appropriate safeguards in place, such as a Data Processing Agreement or the use of Standard Contractual Clauses (SCCs).
    GDPR - No Mark
    Infrastructure & Platform Security
    Dedicated IP Address
    Sharetru provides a dedicated IP Address for both Production and Disaster Recovery
    Dedicated IP Address - Specialty Icon
    Network IPS
    A critical security feature that proactively detects and prevents malicious activities within the network, ensuring constant protection against sophisticated cyber threats
    Network IPS - No Mark
    Host IDS
    A Host-based Intrusion Detection Service (HIDS) monitors for and issues alerts for any unauthorized operating system changes
    Host IDS - No Mark
    Malware Protection
    Comprehensive real-time protection preventing viruses, spyware, and other Web threats to internal or external endpoints
    Malware Protection - No Mark

    Terms & Agreements

    Options
    Standard Online Terms of Service
    Standard Online Terms of Service - Yes Mark
    Consideration of Changes to Terms of Service
    Negotiated, written and signed Terms of Service
    Consideration of Changes to Terms of Service - No Mark
    Signed HIPAA BAA
    Ensures that any third-party entities or organizations handling protected health information (PHI) are legally bound to safeguard the data, maintain its confidentiality, and comply with HIPAA regulations. Requires Advanced Security and Compliance add-on
    Signed HIPAA BAA - No Mark
    Signed Privacy DPA
    Establishes clear guidelines and safeguards for the handling, processing, and protection of personal data, ensuring privacy and security for individuals. Requires Advanced Security and Compliance add-on
    Signed Privacy DPA - No Mark
    Performance

    Platform Features

    Analytics & Reporting
    Immutable Logs
    An irrefutable source of truth. Immutable file and admin logs provide invaluable protection against data tampering or unauthorized modifications, and enable comprehensive forensic analysis and incident response
    Immutable Logs - Yes Mark
    Analytics & Reporting
    Analytics dashboard with historical trends plus exportable reports
    Analytics & Reporting - Yes Mark
    Automation
    Suspension by Date
    Auto-suspend users based on a future date of an administrator's choosing
    Suspension by Date - Yes Mark
    Suspension for Inactivity
    Prevent unnecessary access and potential breaches by implementing a number of days of inactivity before automatic suspension, while maintaining a safe and secure environment for active users.
    Suspension for Inactivity - Yes Mark
    BCC Mailbox Journaling
    Journal all system notifications automatically to an internal email address of your choosing so they're always accessible, and easily searchable
    BCC Mailbox Journaling - Yes Mark
    Folder-level File Retention
    Establish policies for file retention and daily purge at the individual folder level or site wide
    Folder-level File Retention - Yes Mark
    Activity Notifications 
    Automatically send email notifications when a file is uploaded, downloaded, deleted, or when a storage threshold is reached
    Activity Notifications  - Yes Mark
    Failed Login Policies
    Essential defense mechanism that fortifies your system against unauthorized access attempts by IP address or username, effectively thwarting malicious actors, and reinforcing your organization's cybersecurity posture
    Failed Login Policies - Yes Mark
    Brand to Your Business
    White label w/Your Logo
    White label w/Your Logo - Yes Mark
    Customize Colors
    Customize Colors - Yes Mark
    Customize Site Title
    Customize Site Title - Yes Mark
    Login Announcements
    A critical legal and security notice used by organizations to establish clear boundaries, enforce compliance, and enhance overall security posture by promoting awareness and accountability among users.
    Login Announcements - Yes Mark
    Custom Domain Name
    Point your own subdomain (such as sftp.yourdomain.com) with a CNAME to your Sharetru subdomain with an SSL Certificate included at our expense
    Custom Domain Name - Yes Mark
    Custom User Agreements
    Legally enforces terms of service or company policies for system use by requiring user acceptance before application access
    Custom User Agreements - Yes Mark
    Transfer Compatibility & File Sharing
    FTP, FTPS & SFTP Access
    Configurable standard file transfer protocols for automation and power users
    FTP, FTPS & SFTP Access - Yes Mark
    Web Application Access
    Robust administration and file transfer capabilities supporting all modern web browsers
    Web Application Access - Yes Mark
    Guest Link Sharing
    Outbound and inbound file sharing links to send or receive files without creating a user account
    Guest Link Sharing - Yes Mark
    User Management & Authentication
    Single Sign-On (SSO)
    Integrate your organization's SSO to streamline the authentication process, minimize the risk of password-related vulnerabilities, and simplify user experiences
    Single Sign-On (SSO) - Yes Mark
    Site & Group Admin Roles 
    Site & Group Admin Roles  - Yes Mark
    Flexible User Permissions
    Control folder access and user permissions for upload, download, delete, and viewing file names by folder for each user
    Flexible User Permissions - Yes Mark
    Advanced Password Controls 
    Implement robust controls that empower employees with complex and unique passwords. Require change intervals and re-use controls to shield your sensitive data and safeguard your organization's reputation
    Advanced Password Controls  - Yes Mark
    SSH Key Authentication 
    Automated systems and SFTP software can use public SSH-key authentication to replace a tradition password, thwarting unauthorized access attempts and mitigating the risk of brute force attacks
    SSH Key Authentication  - Yes Mark
    User IP Restrictions
    Restrict each user by protocol and/or by their remote IP address for tight security. Layer onto an SFTP connection for an additional security check
    User IP Restrictions - Yes Mark
    Two-factor Authentication
    Indispensable security feature that fortifies your defenses and bolsters your peace of mind. Users can be required to use 2FA and admins can restrict the OTP method allowed for each user. indispensable security feature that fortifies your defenses and bolsters your peace of mind. By combining the power of multiple authentication factors you create a barrier that malicious actors cannot breach.
    Two-factor Authentication - Yes Mark

    Standard Security

    Cloud Partner Certifications
    SOC2 Type II Certified
    SOC2 Type II Certified - Yes Mark
    ISO 27001 Certified
    ISO 27001 Certified - Yes Mark
    Encryption & Data Retention
    Encryption At-Rest
    NIST approved AES-256 encryption is widely regarded as the benchmark for secure symmetric encryption, and is used on all Sharetru storage systems
    Encryption At-Rest - Yes Mark
    Encryption in Transit
    Crucial for ensuring secure and private communication over the internet, shielding sensitive data from interception and unauthorized access. TLS 1.2 and NIST approved AES-256 and AES-128 on all protocols
    Encryption in Transit - Yes Mark
    FIPS 140-2 Approved
    FIPS 140-2 Approved - Yes Mark
    Daily Offsite Backup
    Standard Security has 7 days of backups. If you're in need of disaster recovery on warm standby, please refer to the Advanced Compliance and Enablement offering
    Daily Offsite Backup - Yes Mark
    Infrastructure & Platform Security
    Dedicated Firewalls
    A critical safeguard that fortifies your network, protects sensitive data, and mitigates the ever-evolving threat landscape
    Dedicated Firewalls - Yes Mark
    High Availability IaaS
    Ensures seamless performance, maximum uptime, uninterrupted user experiences, and reliability
    High Availability IaaS - Yes Mark
    Dedicated IP Address
    An essential asset that enhances reliability, strengthens security measures, and boosts reputation, providing you with a distinct identity and trustworthiness when operating our software
    Dedicated IP Address - Yes Mark
    Intruder IP Blacklisting
    Empowers our software to proactively ward off malicious actors permanently, keeping your systems and sensitive data shielded from unauthorized access, breaches, and cyber threats
    Intruder IP Blacklisting - Yes Mark
    Geo Fencing by Country
    An indispensable feature that enables you to fortify your defenses, restrict access to vulnerable regions, and effectively safeguard your data from malicious threats
    Geo Fencing by Country - Yes Mark
    A+ Qualys SSL Rating
    Sharetru’s SSL configuration for HTTPS have earned a rating of A+ by world-renowned Qualys SSL Labs
    A+ Qualys SSL Rating - Yes Mark

    Advanced Security and Compliance Add-On

    Business Continuity
    Daily Onsite Backup
    By keeping 30 days of backups within arm's reach, we eliminate the risks of relying solely on offsite solutions, ensuring immediate accessibility, swift recovery, and total control while bolstering your company's resilience to disaster.
    Daily Onsite Backup - Specialty Icon
    Disaster Recovery
    Keep your business thriving even in the face of unforeseen disruptions with FedRAMP moderate authorized IaaS and PaaS on Warm Standby. By seamlessly transitioning to a ready-to-go secondary system, we minimize downtime, protect critical operations, and minimize business disruption.
    Disaster Recovery - Specialty Icon
    Certifications: IaaS & PaaS
    FedRAMP Moderate
    FedRAMP Moderate - Specialty Icon
    NIST SP800-53 R4
    NIST SP800-53 R4 - Specialty Icon
    StateRAMP
    StateRAMP - Specialty Icon
    CSA STAR
    CSA STAR - Specialty Icon
    Certifications: SaaS
    SOC2 Type II Certified
    SOC2 Type II Certified - Yes Mark
    Compliance Enablement
    NIST SP 800-171
    NIST SP 800-171 - Specialty Icon
    DFARS 252.204-7012
    DFARS 252.204-7012 - Specialty Icon
    DFARS 252.204-7019
    DFARS 252.204-7019 - Specialty Icon
    DFARS 252.204-7020
    DFARS 252.204-7020 - Specialty Icon
    DFARS 252.204-7021
    DFARS 252.204-7021 - Specialty Icon
    CMMC 2.0 Levels 1 & 2
    CMMC 2.0 Levels 1 & 2 - Specialty Icon
    ITAR / EAR
    ITAR / EAR - Specialty Icon
    FERPA
    FERPA - Specialty Icon
    GLBA | SOX | PCI-DSS
    GLBA | SOX | PCI-DSS - Specialty Icon
    HIPAA | HITECH
    HIPAA | HITECH - Specialty Icon
    GDPR
    The General Data Protection Regulation (GDPR) allows for the transfer of personal data outside the European Economic Area (EEA) to countries that are deemed to have adequate data protection standards or with appropriate safeguards in place, such as a Data Processing Agreement or the use of Standard Contractual Clauses (SCCs).
    GDPR - Specialty Icon
    Infrastructure & Platform Security
    Network IPS
    A critical security feature that proactively detects and prevents malicious activities within the network, ensuring constant protection against sophisticated cyber threats
    Network IPS - Specialty Icon
    Host IDS
    A Host-based Intrusion Detection Service (HIDS) monitors for and issues alerts for any unauthorized operating system changes
    Host IDS - Specialty Icon
    Malware Protection
    Comprehensive real-time protection preventing viruses, spyware, and other Web threats to internal or external endpoints
    Malware Protection - Specialty Icon
    Dedicated IP Address
    Sharetru provides a dedicated IP Address for both Production and Disaster Recovery
    Dedicated IP Address - Specialty Icon

    Terms & Agreements

    Options
    Standard Online Terms of Service
    Standard Online Terms of Service - Yes Mark
    Signed HIPAA BAA
    Ensures that any third-party entities or organizations handling protected health information (PHI) are legally bound to safeguard the data, maintain its confidentiality, and comply with HIPAA regulations. Requires Advanced Security and Compliance add-on
    Signed HIPAA BAA - Specialty Icon
    Signed Privacy DPA
    Establishes clear guidelines and safeguards for the handling, processing, and protection of personal data, ensuring privacy and security for individuals. Requires Advanced Security and Compliance add-on
    Signed Privacy DPA - Specialty Icon
    Consideration of Changes to Terms of Service
    Negotiated, written and signed Terms of Service
    Consideration of Changes to Terms of Service - No Mark
    Enterprise

    Platform Features

    Analytics & Reporting
    Immutable Logs
    An irrefutable source of truth. Immutable file and admin logs provide invaluable protection against data tampering or unauthorized modifications, and enable comprehensive forensic analysis and incident response
    Immutable Logs - Yes Mark
    Analytics & Reporting
    Analytics dashboard with historical trends plus exportable reports
    Analytics & Reporting - Yes Mark
    Automation
    Suspension by Date
    Auto-suspend users based on a future date of an administrator's choosing
    Suspension by Date - Yes Mark
    Suspension for Inactivity
    Prevent unnecessary access and potential breaches by implementing a number of days of inactivity before automatic suspension, while maintaining a safe and secure environment for active users.
    Suspension for Inactivity - Yes Mark
    BCC Mailbox Journaling
    Journal all system notifications automatically to an internal email address of your choosing so they're always accessible, and easily searchable
    BCC Mailbox Journaling - Yes Mark
    Folder-level File Retention
    Establish policies for file retention and daily purge at the individual folder level or site wide
    Folder-level File Retention - Yes Mark
    Activity Notifications 
    Automatically send email notifications when a file is uploaded, downloaded, deleted, or when a storage threshold is reached
    Activity Notifications  - Yes Mark
    Failed Login Policies
    Essential defense mechanism that fortifies your system against unauthorized access attempts by IP address or username, effectively thwarting malicious actors, and reinforcing your organization's cybersecurity posture
    Failed Login Policies - Yes Mark
    Brand to Your Business
    White label w/Your Logo
    White label w/Your Logo - Yes Mark
    Customize Colors
    Customize Colors - Yes Mark
    Customize Site Title
    Customize Site Title - Yes Mark
    Login Announcements
    A critical legal and security notice used by organizations to establish clear boundaries, enforce compliance, and enhance overall security posture by promoting awareness and accountability among users.
    Login Announcements - Yes Mark
    Custom Domain Name
    Point your own subdomain (such as sftp.yourdomain.com) with a CNAME to your Sharetru subdomain with an SSL Certificate included at our expense
    Custom Domain Name - Yes Mark
    Custom User Agreements
    Legally enforces terms of service or company policies for system use by requiring user acceptance before application access
    Custom User Agreements - Yes Mark
    Transfer Compatibility & File Sharing
    FTP, FTPS & SFTP Access
    Configurable standard file transfer protocols for automation and power users
    FTP, FTPS & SFTP Access - Yes Mark
    Web Application Access
    Robust administration and file transfer capabilities supporting all modern web browsers
    Web Application Access - Yes Mark
    Guest Link Sharing
    Outbound and inbound file sharing links to send or receive files without creating a user account
    Guest Link Sharing - Yes Mark
    User Management & Authentication
    Single Sign-On (SSO)
    Integrate your organization's SSO to streamline the authentication process, minimize the risk of password-related vulnerabilities, and simplify user experiences
    Single Sign-On (SSO) - Yes Mark
    Site & Group Admin Roles 
    Site & Group Admin Roles  - Yes Mark
    Flexible User Permissions
    Control folder access and user permissions for upload, download, delete, and viewing file names by folder for each user
    Flexible User Permissions - Yes Mark
    Advanced Password Controls 
    Implement robust controls that empower employees with complex and unique passwords. Require change intervals and re-use controls to shield your sensitive data and safeguard your organization's reputation
    Advanced Password Controls  - Yes Mark
    SSH Key Authentication 
    Automated systems and SFTP software can use public SSH-key authentication to replace a tradition password, thwarting unauthorized access attempts and mitigating the risk of brute force attacks
    SSH Key Authentication  - Yes Mark
    User IP Restrictions
    Restrict each user by protocol and/or by their remote IP address for tight security. Layer onto an SFTP connection for an additional security check
    User IP Restrictions - Yes Mark
    Two-factor Authentication
    Indispensable security feature that fortifies your defenses and bolsters your peace of mind. Users can be required to use 2FA and admins can restrict the OTP method allowed for each user. indispensable security feature that fortifies your defenses and bolsters your peace of mind. By combining the power of multiple authentication factors you create a barrier that malicious actors cannot breach.
    Two-factor Authentication - Yes Mark

    Standard Security

    Cloud Partner Certifications
    SOC2 Type II Certified
    SOC2 Type II Certified - Yes Mark
    ISO 27001 Certified
    ISO 27001 Certified - Yes Mark
    Encryption & Data Retention
    Encryption At-Rest
    NIST approved AES-256 encryption is widely regarded as the benchmark for secure symmetric encryption, and is used on all Sharetru storage systems
    Encryption At-Rest - Yes Mark
    Encryption in Transit
    Crucial for ensuring secure and private communication over the internet, shielding sensitive data from interception and unauthorized access. TLS 1.2 and NIST approved AES-256 and AES-128 on all protocols
    Encryption in Transit - Yes Mark
    FIPS 140-2 Approved
    FIPS 140-2 Approved - Yes Mark
    Daily Offsite Backup
    Standard Security has 7 days of backups. If you're in need of disaster recovery on warm standby, please refer to the Advanced Compliance and Enablement offering
    Daily Offsite Backup - Yes Mark
    Infrastructure & Platform Security
    Dedicated Firewalls
    A critical safeguard that fortifies your network, protects sensitive data, and mitigates the ever-evolving threat landscape
    Dedicated Firewalls - Yes Mark
    High Availability IaaS
    Ensures seamless performance, maximum uptime, uninterrupted user experiences, and reliability
    High Availability IaaS - Yes Mark
    Dedicated IP Address
    An essential asset that enhances reliability, strengthens security measures, and boosts reputation, providing you with a distinct identity and trustworthiness when operating our software
    Dedicated IP Address - Yes Mark
    Intruder IP Blacklisting
    Empowers our software to proactively ward off malicious actors permanently, keeping your systems and sensitive data shielded from unauthorized access, breaches, and cyber threats
    Intruder IP Blacklisting - Yes Mark
    Geo Fencing by Country
    An indispensable feature that enables you to fortify your defenses, restrict access to vulnerable regions, and effectively safeguard your data from malicious threats
    Geo Fencing by Country - Yes Mark
    A+ Qualys SSL Rating
    Sharetru’s SSL configuration for HTTPS have earned a rating of A+ by world-renowned Qualys SSL Labs
    A+ Qualys SSL Rating - Yes Mark

    Advanced Security and Compliance Add-On

    Business Continuity
    Daily Onsite Backup
    By keeping 30 days of backups within arm's reach, we eliminate the risks of relying solely on offsite solutions, ensuring immediate accessibility, swift recovery, and total control while bolstering your company's resilience to disaster.
    Daily Onsite Backup - Specialty Icon
    Disaster Recovery
    Keep your business thriving even in the face of unforeseen disruptions with FedRAMP moderate authorized IaaS and PaaS on Warm Standby. By seamlessly transitioning to a ready-to-go secondary system, we minimize downtime, protect critical operations, and minimize business disruption.
    Disaster Recovery - Specialty Icon
    Certifications: IaaS & PaaS
    FedRAMP Moderate
    FedRAMP Moderate - Specialty Icon
    NIST SP800-53 R4
    NIST SP800-53 R4 - Specialty Icon
    StateRAMP
    StateRAMP - Specialty Icon
    CSA STAR
    CSA STAR - Specialty Icon
    Certifications: SaaS
    SOC2 Type II Certified
    SOC2 Type II Certified - Yes Mark
    Compliance Enablement
    NIST SP 800-171
    NIST SP 800-171 - Specialty Icon
    DFARS 252.204-7012
    DFARS 252.204-7012 - Specialty Icon
    DFARS 252.204-7019
    DFARS 252.204-7019 - Specialty Icon
    DFARS 252.204-7020
    DFARS 252.204-7020 - Specialty Icon
    DFARS 252.204-7021
    DFARS 252.204-7021 - Specialty Icon
    CMMC 2.0 Levels 1 & 2
    CMMC 2.0 Levels 1 & 2 - Specialty Icon
    ITAR / EAR
    ITAR / EAR - Specialty Icon
    FERPA
    FERPA - Specialty Icon
    GLBA | SOX | PCI-DSS
    GLBA | SOX | PCI-DSS - Specialty Icon
    HIPAA | HITECH
    HIPAA | HITECH - Specialty Icon
    GDPR
    The General Data Protection Regulation (GDPR) allows for the transfer of personal data outside the European Economic Area (EEA) to countries that are deemed to have adequate data protection standards or with appropriate safeguards in place, such as a Data Processing Agreement or the use of Standard Contractual Clauses (SCCs).
    GDPR - Specialty Icon
    Infrastructure & Platform Security
    Network IPS
    A critical security feature that proactively detects and prevents malicious activities within the network, ensuring constant protection against sophisticated cyber threats
    Network IPS - Specialty Icon
    Host IDS
    A Host-based Intrusion Detection Service (HIDS) monitors for and issues alerts for any unauthorized operating system changes
    Host IDS - Specialty Icon
    Malware Protection
    Comprehensive real-time protection preventing viruses, spyware, and other Web threats to internal or external endpoints
    Malware Protection - Specialty Icon
    Dedicated IP Address
    Sharetru provides a dedicated IP Address for both Production and Disaster Recovery
    Dedicated IP Address - Specialty Icon

    Terms & Agreements

    Options
    Standard Online Terms of Service
    Standard Online Terms of Service - Yes Mark
    Consideration of Changes to Terms of Service
    Negotiated, written and signed Terms of Service
    Consideration of Changes to Terms of Service - Yes Mark
    Signed HIPAA BAA
    Ensures that any third-party entities or organizations handling protected health information (PHI) are legally bound to safeguard the data, maintain its confidentiality, and comply with HIPAA regulations. Requires Advanced Security and Compliance add-on
    Signed HIPAA BAA - Specialty Icon
    Signed Privacy DPA
    Establishes clear guidelines and safeguards for the handling, processing, and protection of personal data, ensuring privacy and security for individuals. Requires Advanced Security and Compliance add-on
    Signed Privacy DPA - Specialty Icon