Trillo File Manager is an application for managing files on GCP Cloud Storage using an intuitive UI. It supports secure and HIPAA-compliant file transfers.
Key Use Cases
Upload large files to GCP for processing (data ingestion).
Backup of terabytes of organizational data.
Share files — e.g., a media company sharing assets with designers.
Version control — e.g., versioning AI model files stored in cloud buckets.
General file management on GCP Cloud Storage: organize in folders, archive, delete, copy, rename.
Gain insights into storage usage through built-in reports.
Core Features
Secure and HIPAA Compliant: Ensures regulatory and organizational compliance.
SFTP Support: Automate secure file transfers via SFTP.
User-Friendly UI: Designed for ease of use with drag-and-drop functionality.
Private Deployment: Deploy in your private GCP VPC—your data stays under your control.
Group Folders: Centralized folders for team collaboration, with controlled access.
Granular Access Control: Manage permissions at both user and group levels.
External Link Sharing: Create upload and download links for external users.
Customizable & Extensible: Tailor the platform to your specific needs.
Trillo File Manager Homepage
Sharing & Access
Download for External Users
Create secure download links to share files externally—ideal for sending documents, software, or media to clients or partners.
Download Link for Sharing
Upload for External Users
Allow external users to upload files directly to a designated folder—helpful for collaboration and data collection. This process is secure and organized for easy access.
Upload link for external users
Folder and File Sharing (Internal Users)
Share with internal users
Share folders or individual files with other internal users:
Grant access to specific users or groups to view or download content.
Useful for seamless internal collaboration, similar to services like Google Drive or Dropbox.
Share with internal users
Un-share Folders and Files
Revoke access to previously shared items:
Stop sharing folders or files at any time.
Once revoked, users will no longer be able to view or download the content, ensuring privacy and data control.
Un-share Folders and Files
Upload & Download Features
Bulk Download
Download multiple files or entire folders in a single step:
Items are bundled as a ZIP archive for convenience.
Saves time over downloading files individually.
Select multiple files and click on the button Files Bulk Download
Folder and File Upload
Upload full folders (including nested directories) or multiple files at once:
Supports both single and bulk uploads.
Maintains internal folder structure.
Features drag-and-drop and progress indicators for better usability.
Folder and files upload
Group Folders
Group Folders are shared directories accessible to all members of a specific group or team. They centralize files in one location, making collaboration and organization easier. Access permissions (view, edit, manage) can be managed at the group level for security and control.
Group Folder
User Management
User management is a critical aspect of modern software systems, encompassing a range of functionalities that allow administrators to manage user accounts, permissions, and authentication processes. Effective user management ensures that only authorized individuals can access and interact with a system, enhancing security, usability, and compliance with regulatory requirements.
User Management: Adding new user
User Management: User Operations
Roles
In user management, roles play a pivotal role in defining and controlling access to resources within a software system. By assigning roles to users, administrators can efficiently manage permissions and ensure that users can access only the functionalities and data necessary for their specific duties. This approach enhances security, streamlines operations, and improves compliance with organizational policies.
User Managment Roles
Group Management
Group management is an integral aspect of user management within software systems, enabling administrators to organize users into groups based on roles, departments, projects, or other criteria. This approach simplifies the administration of permissions and access control, enhances collaboration, and ensures a structured and scalable way to manage users.
Group Managment Homepage
Adding a member to a group
SFTP (FileZilla Client)
Secure File Transfer Protocol (SFTP) is a robust method for securely transferring files between systems over a network. Unlike FTP, which transfers data in plain text, SFTP uses SSH (Secure Shell) to encrypt the data, ensuring that the transfer remains secure from eavesdropping and tampering. FileZilla Client is a popular, open-source FTP application that supports SFTP, making it easy for users to transfer files securely.
FileZilla Connection Page
Connected FileZilla Page
Settings
Add your Logo
Incorporating your logo into various aspects of your business operations and materials is a vital part of establishing brand consistency and recognition. Whether it’s on your website, marketing materials, or internal documents, your logo helps to create a unified brand identity that customers and employees can easily recognize and trust.
Adding Custom logo for application
Add your own public SSH keys
SSH (Secure Shell) keys are a vital component of secure, password-less authentication for accessing servers and other resources over a network. By adding your public SSH key to a server, you can enable secure and streamlined access without the need to enter a password each time.
Adding own public SSH key
Cloud Storage
Cloud storage refers to storing data on remote servers accessed via the internet. These servers are maintained and operated by cloud service providers who offer storage solutions to individuals and organizations. Users can store, manage, and access their data from anywhere with an internet connection.
GCP Cloud Storage Page
Logs & Audits
Logs and audits are the silent guardians of digital landscapes, diligently recording every digital footprint and transaction. In the realm of cybersecurity and data governance, they serve as invaluable tools for maintaining accountability, ensuring compliance, and investigating incidents.