ICON

Sending and Downloading Files with Ease

  • Uses a simple, easy to understand, webmail-like interface for sending files.
  • Unlimited Files Size.
  • Modern HTML 5 upload mechanism where supported.
  • Automatic Fallback to HTML 4 where needed.
  • Support for the 4 major browser vendors with their last 2 major releases (last 3 for Internet Explorer).
  • Splits files in 100Mb blocks during uploads to get around proxy limitations.
  • No Flash, Java or any other plugin used to send or download files.
  • No browser tweaks or browser reconfiguration required to send or download files.
  • Each message is sent with an expiration date, the message can't be viewed and the files attached will be automatically deleted on expiration.
  • Messages can expire on a certain date or after a set number of downloads.
  • Multiple files can be automatically zip'ed and downloaded as one zip archive.
  • Can set forwarding permission to control who other than the specified recipients should be able to download the files.
  • Can limit message size on a per group or per user basis.
  • Can BCC myself (to add to my email clients Sent folder).
  • Can send files that has already been sent again without re-uploading.
  • Can block files based on file extension, or only allow files to be sent with certain extensions.
ICON

Receiving Files as easy as possible

  • Users can Receive files from external parties with no prior registration.
  • Users can Request files from external parties that won't need to register to send files back from the request.
ICON

Filedrop pages static URLs for receiving files

A Filedrop page is a unique URL like https://liquidfiles.example.com/filedrop/status_reports, where the recipient is pre-set and the sender can be anyone.

  • Requires no registration for the external party to use.
  • You can have as many Filedrop pages as you need.
  • Each Filedrop page have their own settings for restricted file types and max file size.
  • Each Filedrop page can have individual forwarding permission to restrict who can download the sent files.
  • User Filedrop pages — each local users can get their own static URL they can share in their email signature and is unique to them.
  • User Filedrops can use a nice looking URL with the users email in the URL, a secure random string or both, as required.
ICON

File & Folder Sharing

Simple File & Folder sharing for internal and external projects, collaboration and sharing.

  • User & Group based authentication.
  • Ability to upload Folders directly in supported browsers (i.e. Chrome).
  • Ability to save as many revisions of each file as you need.
  • Zip-download the current folder including sub-folders.
ICON

FileLinks links to individual files

A FileLink is a link to an individual file. It's perfect for when you don't know who the recipient is going to be, or for quickly post links to files in a forum, instant messager, post on an intranet and similar.

  • You can create as many FileLinks as you need.
  • Each FileLink has its own expiration and authentication setting.
  • When attempted to download an authenticated message from a non-existent user, they will authenticate with their email address.
ICON

File Requests one time file receive

A File Request is a one time file request users can send to any user. The recipient of the file request will get a one-time use link they can use to send files back to the requester.

  • Requires no registration for the external party to use.
  • One time use so it can never be abused.
  • File Requests can be enabled on a per group basis.
ICON

Security protects you even when you don't realize it

  • Secure by Default deployment.
  • Can be deployed with no cloud interaction for maximum security.
  • Builtin Firewall configured and enabled for maximum security.
  • Can be deployed on the Internet with no other firewall or other protection.
  • Minimal installed packages in the operating system configuration.
  • All transfers can be required to use Industry Standard HTTPs.
  • Only Strong SSL algorithms enabled.
  • Only Strong TLS/SSL versions enabled.
  • Protection from Cross Site Scripting (XSS) attacks.
  • Protection from Cross Site Request Forgery (CSRF).
  • HTTP Strict Transport Security (HSTS) enabled.
  • All Downloads protected with 3 x 128 bit random tokens (384 bits).
  • FIPS140-2 enabled OpenSSL for cryptographic functions (as opposed to weak standard system functions).
  • Option to deploy using builtin full disk encryption for data-at-rest encryption.
  • Builtin support for Let's Encrypt Certificates.
  • All files are protected for integrity using SHA-1 hashes.
  • SHA-1 hashes are visible on all emails sent, on the message page and download information page.
  • Can be configured as a closed system with no external user access.
  • Passwords are never sent in cleartext.
  • Custom Password complexity validation.
  • User accounts can be configured to automatically be deleted after a number of days without activity.
  • Default to not require external users to have accounts, and still provide authentication.
  • Can require all users to have accounts.
  • Strong 2-factor authentication can be enabled.
  • 2-factor authentication can be enabled on a per group or per user basis.
  • Secure local password store using the Bcrypt method.
  • Single Sign-On (SSO) Integration with SAML 2 providers.
  • Simple SSO integration with static shared secrets for simple local integration.
  • Spam Protection without CAPTCHA — use of hidden fields in forms that bots will fill in but hidden from users with stylesheets.
  • Brute Force Protection — default to block the ip address from the attacker for 15 minutes after 5 failed attempts within 5 minutes.
  • Possible to block groups of users to only login from certain ip address ranges.
  • Possible to block administrators to only administer the system from certain ip address ranges.
  • All activity is logged. This include sending files, downloading files, successful and failed logins, creation, deletion and updates of user accounts, changes to any configuration...
  • Can export all logs using Syslog.
  • All files are scanned with ClamAV Antivirus on default.
  • AV signatures is configured to update every 2 hours.
  • AV Engine is configured to updated nightly.
  • Ability to add custom file scan (for integration into other AV engines, DLP solution and similar).
  • Ability to limit forwarding permissions on a per group basis.
  • Ability to limit recipient email domain on a per group basis.
  • Ability to limit file extensions or only accept certain file extensions on a per group basis.
  • Remember-me can be configured to not enabled, 2 weeks or indefinite.
  • Geoloction and Google MAPS integration to get a visual representation of where a file has been downloaded from.
  • Display Browser and Operating System details for downloaded files.
ICON

Platform and Deployment

  • Can be deployed locally on your premise or can run in the Cloud.
  • Local deployment can be deployed with no cloud interaction (for maximum performance and security).
  • Comes as a Virtual Appliance with operating system, all required components and the application already installed.
  • Can be installed in VMware, Xen, Hyper-V and any other virtualisation platform that support CentOS/RedHat 6.
  • Can be installed on your own physical server.
  • Pre-configured Amazon AMI images for deployment in your own Virtual Private Cloud in Amazon EC2.
  • Can be deployed by any cloud provider that supports installation from ISO images and supports CentOS/RedHat 6.
  • Local deployments using either ISO image, VMware OVF or VMware VMDK images.
  • Support for installation of VMware Tools and Hyper-V Integrated Services from the console app.
  • Installation is Secure by Default.
  • Reverse Proxy deployment with trusted reverse proxy configuration to set the end users ip address from X-Forwarded-For only from certain proxies.
  • DHCP or Static ip address configuration.
  • IPv6 support.
  • Bandwidth limitation with different upload and download limits configured per interface.
  • Use standard http and https ports on default, but can be configured to use different ports if required.
  • Can use as many network interfaces as needed.
  • Default to require all transfers to use HTTPs, but can be configured to use HTTP when deployed behind an SSL off-loader, or for general increased transfer speed and ability to scan content using a network IPS.
  • Can use NFS for data storage outside of the LiquidFiles system.
  • Can integrate with LDAP/Active Directory for easy user deployment.
  • Can use an unlimited number of LDAP/Active Directory Servers that will be searched in order.
ICON

Branding and Localization

  • Can be configured look completely like an internal company system.
  • Can be configured with no vendor branding visible to the end user at all.
  • Ability to customize the front page with own logos and information.
  • Ability to customize the header and title with different branding names.
  • Ability to use own page footer on all user visible pages.
  • Ability to insert custom Stylesheet to change the visual appearance of all visible user pages.
  • Ability to insert custom JavaScript to change the behaviour of all visible user pages.
  • Can change any text or form label on any user visible page.
  • Can change all emails sent from the system.
  • Will detect system locale from the end users browser and display all pages in that locale (if available) with a fallback to English.
  • Will detect the end users time zone and display all times in that time zone, with a fall back to a selectable user default time zone.
ICON

User and Group Management

  • Unlimited number of Users
  • Unlimited number of Groups
  • Configuration is mostly controlled by group belongings.
  • Can integrate with LDAP/Active Directory for easy user deployment.
  • Unlimited number of LDAP/Active Directory Servers that will be searched in specified order.
  • Can set default fall back groups for users authenticate with LDAP or not.
  • Can set max size per group.
  • Can set default and max message expiration per group.
  • Can enable/disable editing for message expiration per group.
  • Can enable/disable/set max number of times a file can be downloaded per group.
  • Can delete inactive users in a group after a specified number of days.
  • Can limit ip ranges that users can login from per group.
  • Can configure message permissions per group.
  • Can configure BCC myself per group.
  • Can limit recipient domains per group (limit to what email domains users can send files).
  • Can block file extenstions/only allow certain extensions per group.
  • Can automatically assign users to groups based on LDAP/Active Directory Group.
  • Can automatically assign users to groups based on email domain match.
  • Can configure API settings per group.
  • Can configure Filedrops and File Requests per group.
  • Can enable ability to invite other users per group.
ICON

API and plugins

  • Outlook plugin available, supported in Windows XP, Office 2003 and later.
  • Outlook plugin is configurable using distributable Windows Registry settings.
  • Outlook plugin can be configurable to automatically send files above a certain size using LiquidFiles.
  • Outlook plugin can send files as well as attach folders.
  • Outlook plugin can send the body of the email as a secure attachments.
  • Windows Systray Agent available.
  • Windows CLI agent available, making it easier to integrate sending through the API in your application without having to program the API directly.

What some of our customers say...

Quote Perfect. I can't even begin to describe how pleased we are with your support and the product as a whole. We were referred to LiquidFiles by a partner of ours and we continue to recommend it every time someone asks us about it... you wont be dissapointed.End Quote

-- Ryan C

Quote Does exactly what it says. Plenty of options to configure it like you want. 2 minor support tickets were answered and fixed promptly. I would recommend this to anyone that needs secure transfer of large files.End Quote

-- buzzra

Read More Testimonials

Download Now!

Start your Free 45 Day Trial Today! No Credit Card Required.