We are pleased to announce the latest release of SFTPPlus, version 3.12.0.

This release adds a couple of security related functionalities and security related defect fixes.

Here is the list with the main new features:

  • Support was added for validating certificate revocation lists (CRL) based on the distribution …

We are pleased to announce the latest release of SFTPPlus, version 3.11.0.

This release adds SUSE Linux Enterprise Server (SLES) 10 to the list of supported SUSE versions.

The support for certificate revocation list was extended in this version to support loading CRLs over HTTP and supporting multiple …

We are pleased to announce the latest release of SFTPPlus, version 3.10.1. This is a bug fix only release, no new features were added.

We continue to focus on improving the quality of SFTPPlus by fixing any defect which is know to us, big or small:

  • Account activity …

We are pleased to announce the latest release of SFTPPlus, version 3.10.0.

In this release we have improved the FTP implementation to allow configuring the default data type used by FTP/FTPS transfers.

In SFTPPlus, the default data type is IMAGE/binary, but for compatibility with the FTP …

We are announcing that SFTPPlus Server version 1.8 has reached end of life.

As described in our Product Life Cycle page, SFTPPlus version 1.8 was released on 03/10/2012.

The end of life was reached on 08/04/2016, 3 years after version 2 was released.

Security …

We are pleased to announce the latest release of SFTPPlus, version 3.9.0.

In this release we improved the fault-tolerant capabilities for the client-side transfers.

Another important change is the usage of database indexes for the audit/log entries stored in a database. This result in fast navigation and …

We are pleased to announce the latest release of SFTPPlus, version 3.8.0.

In this release we expanded the list of supported Linux distribution to include Ubuntu 16.04 LTS on X86_64. We have also added an experimental Linux build for hardened distribution build with an OpenSSL without SSLv3 …