One new aspect I particularly like is the improved visibility and control over file transfer activities through centralized monitoring and detailed audit logs. The seamless integration of advanced threat detection directly into the transfer workflow adds an extra layer of security without impacting performance. Additionally, the platform’s scalability and support for multiple protocols make it easier to adapt to evolving business and compliance requirements. Review collected by and hosted on G2.com.
While the solution is robust, the initial setup experience could be simplified with more guided configuration options and clearer best-practice templates for common use cases. Enhancing the flexibility of reporting and dashboards, as well as offering more granular role-based access controls, would further improve usability. More transparent or flexible pricing options could also benefit smaller teams or organizations with lower transfer volumes. Review collected by and hosted on G2.com.




