The security and reliability of your business processes and sensitive customer data is critical, whether you need to ensure compliance with regulations and industry mandates such as PCI DSS, or to manage risks related to data loss, litigation and corporate image.
As the company that invented the SSH protocol, SSH Communications Security is one of the most respected companies in the security industry. Security is built into the core architecture of all SSH's products. When you execute your business data transactions on SSH's Information Assurance Platform, you can trust the robust security foundation it is built upon.
All data is transmitted using a standards-based security protocol (SSH2), and encrypted by a FIPS 140-2 certified crypto engine, meeting the requirements of the most demanding governmental environments in the world.
Support for a wide range of strong authentication mechanisms, such as public key, X.509 PKI, Kerberos/GSSAPI, RSA SecurID, Aladdin eToken, and Windows domain authentication, ensure adaptability to your existing security architectures.
Centralized monitoring and auditing enables you to maintain the security of your environment, and prove to your auditors that you have deployed the latest security updates and can react to any unauthorized software updates, configuration changes, and data transfers. SSH even enables you to audit, archive, and provide IDS/DLP inspection on encrypted channels, enabling deployment of network encryption also in the most sensitive parts of your environment.