What is SFTP?

SFTP is a secure way to transfer files between systems. It’s used when files need to move without exposing usernames, passwords, commands, or file contents in plain text along the way.

SFTP stands for SSH File Transfer Protocol. It runs over SSH and is commonly used for uploads, downloads, directory access, and other remote file operations. In most environments, it uses port 22.

It’s still a common choice because plenty of business workflows are still file-based. Batch jobs, scheduled exports, partner exchanges, vendor uploads, and internal handoffs all need a secure and dependable way to move files, and SFTP continues to do that well.


What does SFTP stand for?

SFTP usually stands for Secure File Transfer Protocol. The more precise name is SSH File Transfer Protocol.

That second name is useful because it tells you where the security comes from. SFTP uses SSH to create the encrypted connection, then handles the file transfer and file management inside that secure session.

It also clears up a common misunderstanding. SFTP is not just FTP with extra security added on top. It’s a separate protocol.


A brief history of SFTP

SFTP exists because plain FTP was built for a very different era.

FTP, or File Transfer Protocol, goes back to the early days of networked computing. It was designed to move files between systems at a time when secure internet communication was not the standard expectation it is today.

That became a problem as file exchange moved into more exposed and connected environments. Plain FTP doesn't encrypt traffic by default, which means credentials, commands, and file contents can be visible in transit.

SSH arrived in the 1990s as a secure way to connect to remote systems. SFTP was developed around that secure transport so files could be transferred and managed without relying on the old, unencrypted FTP model.

That's why SFTP still feels so familiar in practice. It kept the useful part of file exchange, but replaced the weak part underneath it.


How does SFTP work?

SFTP uses a client-server model.

The SFTP client starts the connection to the server. SSH then sets up the secure session, verifies the server, and handles authentication. Once that connection is in place, the client can work with files on the remote system.

That can include:

One reason SFTP has remained so widely used is that it protects more than just the file itself. It also protects the login process, commands, and other information moving between the client and server.


What is an SFTP client and what is an SFTP server?

An SFTP client is the software used to connect to a remote system and work with files there. That could be a command-line tool, a desktop application like Cyberduck or FileZilla, or a script using an SFTP library.

An SFTP server is the system on the other end. It accepts the connection, checks authentication, applies permissions, and handles the file operations requested by the client.

These terms often get mixed together with managed SFTP services, but they are not the same thing.

  • SFTP is the protocol.
  • An SFTP server is one implementation of that protocol.

A managed SFTP service is a hosted platform that gives you SFTP access without making you build, patch, harden, and maintain the server yourself. Explore our Top SFTP Clients and Managed SFTP Services.


What port does SFTP use?

SFTP usually uses port 22 because it runs over SSH.

That's one reason it's often easier to work with than older FTP-based setups. You are usually dealing with one secure connection instead of separate control and data channels, which means less friction around firewall rules and network configuration.


What are the benefits of using SFTP?

SFTP stuck around for good reasons. It solves real problems in a way that's secure, familiar, and practical.

  • Secure transfer: SFTP encrypts traffic in transit, which helps protect file contents, credentials, and commands from being exposed across the network. This is the starting point for any serious discussion around SFTP security and SFTP encryption.
  • Stronger authentication options: SFTP supports password-based login, SSH key authentication, or both. That gives teams more control over access and makes it easier to support secure automated workflows.
  • Easy automation: SFTP works well for scripts, scheduled exports, recurring imports, batch jobs, and machine-to-machine transfers. That is a big reason it is still used so heavily in day-to-day operations.
  • Familiar workflow: A lot of technical teams already know how to use SFTP, and a lot of software vendors already support it. That lowers the friction when you need to exchange files with third parties or get a recurring workflow in place.
  • More than simple transfer: SFTP is not limited to sending a file from one side to the other. It also supports directory browsing, file renaming, deletion, and other remote file operations, which makes it more flexible than a basic transfer-only method.

Why is SFTP still used?

Because file-based workflows never went away.

A lot of modern integration content makes it sound like everything should be API-first. Real operations are rarely that neat. Scheduled exports, batch imports, partner data feeds, nightly reports, reconciliations, and machine-to-machine file exchange are still everywhere. In those environments, SFTP shows up because it does the job well.

It's widely supported, predictable, and easy to automate. Most developers, IT admins, vendors, and third-party platforms already know how to work with it, which lowers the friction when you need to get a file exchange running and keep it running.

It also gives teams a secure way to move files without turning a straightforward workflow into a much larger development project. That is a big part of why SFTP is still common in finance, healthcare, SaaS, logistics, education, and other sectors that rely on repeatable file exchange.

Using SFTP and securing SFTP are not quite the same thing, though. The protocol gives you a strong foundation, but SFTP security and SFTP encryption still depend on how access, authentication, storage, logging, and monitoring are handled around it. Read our guide, Is SFTP Still Relevant?


SFTP vs FTP: what’s the difference?

FTP is the older File Transfer Protocol. By default, it does not encrypt traffic.

That means usernames, passwords, commands, and file contents can be exposed in transit. For modern business use, especially where sensitive or regulated data is involved, that is a serious weakness.

SFTP works differently. It runs over SSH, which encrypts the session and protects the transfer.

The practical difference is:

  • FTP moves files.
  • SFTP moves files securely.

There's also a broader functional difference. SFTP supports remote file management features like directory navigation, rename operations, and transfer resumption. It is not just a pipe for sending a file from one place to another.

To learn more, read FTP vs. SFTP.


SFTP vs FTPS: what’s the difference?

This is one of the most common points of confusion around secure file transfer.

FTPS is FTP secured with TLS. SFTP is a separate protocol built around SSH.

Both can be used for secure file transfer, but they behave differently underneath. SFTP typically uses a single secure connection. FTPS keeps more of the older FTP structure, which can introduce more complexity around ports, firewalls, certificate handling, and configuration.

That doesn't mean FTPS has no place. Some vendors and legacy environments still depend on it and most regulated industry organizations will use a combination of SFTP and FTPS in their workflows. But SFTP is often easier to work with across cloud environments, mixed networks, and modern automation workflows.

For more technical insight, read SFTP vs. FTPS or explore our FTPS vs. SFTP Performance Benchmarks.


SFTP vs SSH: are they the same thing?

No.

SSH is the secure connection protocol. SFTP is the file transfer protocol that usually runs inside that connection.

A simple way to think about it is this:

  • SSH is the secure transport.
  • SFTP is the file transfer and file management layer using that transport.

So when people say SFTP uses SSH, they are describing the relationship correctly.

For the full guide, read SFTP vs. SSH.


Common SFTP commands

Some common SFTP commands include:

  • sftp user@hostname to start a session
  • put to upload a file
  • get to download a file
  • ls to list files in the current remote directory
  • cd to change the remote directory
  • pwd to show the current remote directory
  • mkdir to create a remote folder
  • rename to rename a remote file
  • rm to remove a remote file
  • exit to close the session

For more SFTP commands, explore our SFTP Cheat Sheet.

You don't need to memorize these to understand SFTP, but they help show why the protocol is useful. It's not only about secure transfer. It also gives you a way to work with files on a remote system in a structured, scriptable way.


Is SFTP secure enough on its own?

SFTP is secure in transit, but it doesn't solve every security problem by itself.

It protects the connection while files are moving. It doesn't automatically give you strong user lifecycle controls, detailed audit trails, retention rules, encryption at rest, secure sharing policies, or a well-managed operating environment.

Those things depend on the server, service, and surrounding setup. SFTP To Go one an example of a cloud SFTP solution that incorporates all of these features, while also supporting FTPS and HTTPS, and offering built-in S3 storage.

So yes, SFTP is a secure protocol. But a secure file transfer workflow usually depends on more than the protocol alone. That is where deeper reading on SFTP security and SFTP encryption becomes useful, especially if you are dealing with sensitive data, external users, or compliance requirements.

For comprehensive technical insight, read our detailed guide on SFTP Security.


SFTP best practices

SFTP is a solid protocol, but a good setup still makes a big difference.

A few practical habits go a long way:

  • Use SSH keys where possible instead of relying only on passwords
  • Rotate keys on a schedule
  • Keep servers and clients patched
  • Limit access to only what each user actually needs
  • Log transfers and failed access attempts
  • Monitor for unusual behaviour
  • Protect stored files (encryption at rest) as well as files in transit

In real environments, secure transfer depends on how you manage credentials, storage, visibility, and operational hygiene around the protocol. All of these measures are easily achieved with a managed service like SFTP To Go.


SFTP for compliance

SFTP is widely used in regulated environments because it gives teams a more secure way to move sensitive files. It can support compliance efforts by protecting data in transit and giving organisations a more controlled transfer method, but it doesn't make an organisation compliant on its own.

Compliance still depends on the wider setup around access control, storage, logging, monitoring, retention, and internal processes. Read our full guide on SFTP for Compliance.

It is commonly used in areas such as:

  • Healthcare: HIPAA, where organisations need to protect electronic protected health information.
  • Financial services: GLBA and the FTC Safeguards Rule, where customer information must be protected through administrative, technical, and physical safeguards.
  • Education: FERPA, where schools and institutions handle protected student records and personally identifiable information.
  • General security and audit programmes: SOC 2, where secure transfer, access control, and logging support a stronger control environment.

What are the benefits of managed cloud SFTP?

You can run your own SFTP server, but that is not the only option.

Managed cloud SFTP has a few obvious advantages for teams that don't want file transfer infrastructure turning into an overtime job.

  • Faster setup: You don't need to build and harden a server from scratch before you can start using SFTP.
  • Easier security management: A good managed platform can give you a stronger starting point for access control, storage protection, auditing, and operational security than an ad hoc self-hosted setup with default settings.
  • Better scalability and durability: Cloud-backed storage and hosted infrastructure are usually easier to scale and more resilient than a single self-managed file transfer box.
  • Less operational overhead: You still need good internal processes, but you are not carrying the full burden of patching, uptime, backups, and core platform maintenance yourself.

For teams that want SFTP without managing the underlying server, a managed platform like SFTP To Go can provide secure transfer, cloud storage, access controls, and operational features in one place. For more information, read the Top 6 Benefits of Managed SFTP.


When should you use SFTP?

SFTP makes sense when you need a secure, reliable, widely supported way to move files between systems or parties.

It's a strong fit for workflows like:

  • Scheduled data exports
  • Batch imports
  • Partner file exchange
  • Vendor integrations
  • Internal system-to-system transfers
  • Secure delivery of sensitive files

It is especially useful when the workflow is file-based by nature and does not need the complexity of a full API integration.

That said, SFTP is not always the whole answer. If you also need browser-based sharing, governed storage, approval flows, automation triggers, audit visibility, or compliance features around the transfer itself, the question shifts from “Should we use SFTP?” to “What kind of SFTP platform do we need?”


Meet SFTP To Go, our fully managed cloud SFTP service. It boasts all the features listed in this post and even more. If you’re considering using an SFTP service, make sure to give it a try or schedule a demo call with us to discuss any details.


Frequently asked questions

Is SFTP the same as FTP?

No. FTP and SFTP are different protocols. FTP does not encrypt traffic by default. SFTP usually runs over SSH and protects the session.

What does the S in SFTP stand for?

It usually stands for Secure. The more technically precise name is SSH File Transfer Protocol.

Does SFTP use port 22?

Usually, yes. SFTP normally runs over SSH, which uses port 22 by default.

Is SFTP the same as FTPS?

No. FTPS is FTP secured with TLS. SFTP is a separate protocol built around SSH.

Is SFTP good for automation?

Yes. That is one of the main reasons it is still so widely used. It works well for scheduled transfers, scripts, batch jobs, and recurring machine-to-machine workflows.

Is SFTP enough for compliance?

Not on its own. SFTP helps protect data in transit, but compliance also depends on access control, logging, storage protections, monitoring, authentication, and the wider operating environment.

Is SFTP only for large enterprises?

No. Large enterprises use it heavily, but smaller SaaS teams, agencies, healthcare providers, financial firms, and software vendors use it too. Any team that needs secure, repeatable file exchange can benefit from it.

Is SFTP better than APIs?

Not across the board. APIs are a better fit for many real-time, application-level integrations. SFTP is often the better fit when the workflow is based on files, schedules, batch processing, or third-party systems that already support secure file exchange.