File Transfer Protocol Comparisons


Easily connect to trading partners.
Quickly exchange EDI documents.

Data is the fuel. But for it to energize your business, it has to move. That's where secure file transfer protocol (secure ftp) comes in. Power your most critical business exchanges and securely connect to your customers, suppliers, and partners via industry-leading FTP/SFTP from Cleo.

What is FTP?

FTP, or File Transfer Protocol is a standard network protocol used in client-server Internet communications to transfer files from one host to another via computers or networks utilizing the TCP/IP protocol. FTP clients are basic file transfer mechanisms with few inherent security features.

What are FTPs?

File Transfer Protocol Secure — aka FTP over TLS/SSL or FTPs — is a protocol for transferring files using Secure Sockets Layer (SSL) to secure the commands and data that are being transferred between the client and the server.

What is SFTP?

Secure Shell File Transfer Protocol — aka SSH file transfer protocol or SFTP – uses SSH encryption to transfer files and requires that the client be authenticated by the server. The SFTP protocol is preferred by highly regulated industries to securely transfer sensitive data.

Ftps icon
Enable data security, in transit and at rest

The Benefits of FTP

Convenience: FTP is ubiquitous

Speed: Faster than email or HTTP

Delivery of data, in any format and size

The benefits of FTPs

Security: Encryption, access through sign-on, and client authentication

File size/speed: Supports small and large file transfer

Firewall friendly

The benefits of SFTP

Security: Single secure connection and encryption to protect data in transit

Firewall friendly: No need for client-side firewall access and simplified firewall configuration

We applaud Cleo for their continued efforts in maintaining interoperable products for their customers.

Rik Drummond

CEO, Drummond Group

A brief history of FTP/SFTP

  • File Transfer Protocol was developed in 1971
  • FTP was created to allow file transfer over NCP protocol stack used on  ARPANET
  • By the early-to-mid 1908s, FTP moved from a precursor of the internet to a TCP/IP version
  • In 1994, Netscape release a SSL version of FTP, also called FTP Secure
  • Developed by IETF, SFTP shares the functionality of FTP but with advancement in security, data streaming, and the ability to meet regulatory compliance
Ftps icon

Top 5 FAQs About Secure FTP

Want to learn more about the SFTP process? Uncover the answers to frequently asked questions surrounding secure FTP.

Read More

Secure FTP Questions and Answers

Compare FTP, FTPS and SFTP

Industry mandates directing the use of one protocol or technology versus another often arise from the history of implementation, industry use, and market penetration. To illustrate, we’ll compare FTP, FTPs, and SFTP:

  • FTP does not include options to encrypt data and was not designed to be a secure protocol.

  • FTP is often labeled insecure by organizations, government agencies, and industry bodies and may not meet specific industry regulations or business security requirements.

  • FTPs adds a secure encryption layer around the FTP protocol.

  • FTPs requires a number of ports to remain open on the server or the client firewall so a connection can be made.

  • FTPs encryption requires separate port numbers for authentication and for file transfer requests.

  • SFTP servers use encryption to provide confidentiality and integrity of data over an unsecured network, like the Internet, which prevents passwords and other sensitive information from being exposed in plain text.

Why Choose Cleo as your AS2 service provider?

• Encrypted connections: Ensure non-repudiation and data protection for any standard or industry-specific protocol, such as AS2/SFTP/ebMS - tested by the Drummond Group. 

• Compliance made easy: Meet extensive data format standards with sweeping format handling and data translation conforming to international, national, state/provincial, local and industry regulations.

Contact Us Today

Cleo Certification Badges

Compare over 20 secure file transfer protocols

B2B/EDI protocol comparison guide


Explore additional connectors

(Select filter below)