Skip to content

MOVEit Migration Guide — Replace MOVEit with Xferity

This guide explains how to migrate from Progress MOVEit to Xferity.

DimensionMOVEitXferity
Deployment modelWindows Server required (DMZ + Transfer + Automation tiers)Single Go binary; runs on Linux, Docker, or Windows
DatabaseSQL Server requiredPostgreSQL optional (required for full UI); file-backed mode needs no DB
ConfigurationGUI-driven, stored in DBYAML files under version control
Protocol supportSFTP, FTPS, AS2, SCP, HTTP(S)SFTP, FTPS, AS2, S3-compatible
CryptoCertificates + PGP via UICertificate inventory + PGP key inventory with CLI and Web UI
Secrets managementStored in DB or Windows credential store7 providers: env, file, local vault, HashiCorp Vault, AWS SM, Azure KV
AuditSQL-backed transfer logJSONL audit log with SHA-256 hash chain; verifiable with standard tooling
Security postureManual review6-domain continuous posture engine with regression alerts
Air-gapPossible but complexSupported; no mandatory outbound connections
License modelPer-seat or site license; feature tiersFlat license; no phone-home

MOVEit Tasks become Xferity Flows.

A flow is a YAML file that defines:

  • source and destination partner
  • direction (upload or download)
  • file matching rules
  • schedule
  • retry and idempotency behavior
  • PGP payload handling
  • cleanup behavior

All under version control — no GUI-stored configuration that diffs invisibly.

MOVEit Hosts become Xferity Partners.

Each partner is a YAML file defining:

  • protocol (SFTP, FTPS, AS2, S3)
  • endpoint settings
  • trust material (SSH key fingerprint or TLS certificate)
  • auth credentials via secret references

MOVEit stores transfer credentials in its database. Xferity uses secret references:

auth:
password: env:PARTNER_SFTP_PASSWORD
# or
password: local-vault:partner-sftp-pw
# or
password: vault:secret/data/mft/partner#password

No plaintext credentials in configuration files. Hardened mode rejects plaintext at startup.


MOVEitXferity equivalent
SFTP transfersSFTP transport with host_key_fingerprint
FTPS transfersFTPS transport with explicit TLS, optional fingerprint
AS2 messagingAS2 transport with certificate role model
HTTP(S) file transferUse SFTP or S3 for equivalent workflows

Security hardening that MOVEit cannot provide

Section titled “Security hardening that MOVEit cannot provide”
FeatureMOVEitXferity
Config drift detectionNoneStrict YAML parsing; unknown fields fail startup
Tamper-evident auditNo hash chainSHA-256 hash chain per event, verifiable offline
Isolated PGP executionGlobal keyringPer-operation isolated GnuPG home
Startup security enforcementRuntime warningsHardened mode: refuse to start on insecure config
Continuous posture monitoringManual review6-domain posture engine with hourly snapshots and regression alerts

Step 1: inventory your MOVEit tasks and hosts

Section titled “Step 1: inventory your MOVEit tasks and hosts”

Document:

  • all active tasks (source, destination, schedule, file filter)
  • all configured hosts (protocol, hostname, auth method, trust material)
  • any PGP keys or certificates in use

For each MOVEit host, create a Xferity partner YAML file. Use secret references for credentials.

For each MOVEit task, create a Xferity flow YAML file. Match the direction, file filter, and schedule.

Terminal window
xferity validate
xferity diag <flow-name>

Run Xferity in parallel with MOVEit for a validation period. Compare transfer outcomes.

After validation, disable MOVEit tasks and enable Xferity scheduling.


  • No built-in file encryption at rest (use OS-level or storage encryption)
  • No native HTTP(S) file transfer endpoint (use SFTP or S3 patterns)
  • No clustering or HA coordination (single binary per node)
  • No Kubernetes operator

  • AS2 (with MDN)
  • SFTP / FTPS
  • OpenPGP + CMS
  • Durable job execution
  • Retry and resume
  • Air-gapped deployment