Pick & Drop — File Transfer Demo
Governed transfer across Windows, Linux, SFTP, HTTP(S), Azure, and S3 with policy enforcement, audit continuity, and end-to-end encryption.
See how a production-shaped transfer lane stays controlled across Windows, Linux, Azure, S3, and enterprise protocols without exposing live endpoints or reusable runtime logic. Use the demo to reject a file, replay a delivery, and inspect the evidence chain on safe synthetic data.
Governance window
Policy bundle promotion
- 01devdraftpolicy-bundle/gov-eu-2026-05-rc.12026-04-26 09:14
- 02stagestagedpolicy-bundle/gov-eu-2026-042026-04-22 11:02
- 03prodactivepolicy-bundle/gov-eu-2026-032026-04-04 06:48
Demo classifier results that drive routing, encryption, and retention without exposing the real classifier.
- PII38%route: encrypted lane
- PCI22%route: signed lane
- IP-confidential26%route: scoped lane
- Public14%route: open lane
Synthetic distributions only. Real classifier fingerprints are never displayed.
Operators can stage files, inspect route posture, replay receipts, and confirm every transfer across SFTP, HTTP(S), Azure, and S3 lanes before delivery.
Transfer lane board
Counterparty telemetry
Counterparty topology
- partner-eu-01SFTP laneeu-north-1184 flows/hattested
- partner-eu-04API gatewayeu-west-1412 flows/hattested
- partner-na-02S3 bucketus-east-196 flows/hrotation due
- partner-eu-09Edge relayeu-central-158 flows/hattested
Operator event feed
Policy bundle history
All transfer records, hashes, and destinations shown here are synthetic demo fixtures with no live endpoints or reusable credentials.
Operators can see queue pressure, signed evidence posture, and exception lanes before a file ever reaches a delivery endpoint.
Separate partner deliveries, evidence exports, and exception work before any transfer starts. The operator can open the active lane directly from the demo.
Show the rules that matter on production-shaped routes: extension control, encryption, destination authorization, and retained evidence.
Trace one clean delivery from policy pass to retained receipt, then reopen the blocked sample to show the exception chain stays attached.
Jump into the live queue handoff and show how a new inbound file lands on the policy-controlled route before any transport starts.
Move directly to a completed transfer and review the signed evidence chain, delivery record, and replay-ready timeline.
Show the operator path for a failed policy check, including the rejection reason, replay context, and retained audit trail.