Resources

As the inventors of the SSH protocol, SSH Communications Security is the recognized leader for securing the path to your information assets. Learn how SSH Communications Security products help you protect your information assets while meeting or exceeding regulation mandates. SSH Communications Security customers have saved time and money by utilizing our Information Assurance Platform. So can you.

Recent Resources

resource thumbnail
Case Study

Global IT Services and Cloud Hosting Provider Gains Ability to Monitor, Audit & Control Privileged Users in the Cloud

Discover how a major global IT services and cloud hosting company strengthened their security posture, met compliance and satisfied customers' SLA requirements

Download Now
resource thumbnail
Webinar

Save Your CEO From A Major Cyber-Attack

When a high-profile breach happens, heads are going to roll. CEOs, CISOs, and other key executives often get the boot for not doing enough to protect the company, its brand, and its customers. In this webinar, we will touch on some of the risks senior-level employees face when a gap in security is exploited and steps organizations can take to solve long-standing security issues that can result in a major exploit.

Read More
resource thumbnail
Multimedia

Universal Key Manager (UKM) Demo Video

Your enterprise may have more Secure Shell identities than employees. A lot more. Gain visibility and control over who has access to what and when, with the only comprehensive identity and access management solution for Secure Shell. Watch the UKM demo for more first hand information on UKM today!

Read More
default category thumbnail
Trial Download

Tectia SSH Client/Server

Try Tectia SSH Client/Server free for 45 days! Tectia SSH Client & Server is an enterprise-class solution for securing system administration, file transfer and application connectivity in heterogeneous enterprise networks. Tectia SSH Client provides strong, FIPS 140-2 certified encryption and flexible authentication to address the critical security requirements of large organizations.

Download Now
resource thumbnail
Free Ssh Risk Assessor

SSH Risk Assessor Tool

SSH Risk Assessor (SRA) from SSH Communications Security is a lightweight scanning and reporting tool that enables security auditors to obtain actionable information as to the state of compliance and risk with respect to SSH identity and access management.

Download Now
resource thumbnail
Datasheet

CryptoAuditor: An SSH, SFTP and RDP Firewall

Is your perimeter security strategy ready to address today’s complex and highly targeted threats? Time and time again, we see the headlines...yet another enterprise exploited via encrypted networks. With massive investments in SIEM, DLP, IDS and other layered security solutions, how do so many enterprises - and so many of their customers - fall victim to these attacks? It’s simple: they can’t see encrypted traffic coming in and going out of their organization.

Download Now
resource thumbnail
White Paper

The Rise Of IT Automation And The New Security Imperatives - Forrester Report

Growth in M2M Processes Requires a Fresh Approach to Security

Download Now
resource thumbnail
Case Study

Global Automobile Manufactures Secures Mainframe Communications with Tectia for z/OS

Learn how one of the largest automobile manufacturers in the world eliminated unsecure FTP on the Mainframe

Download Now
resource thumbnail
Webinar

Tatu Ylönen: The Future of Encryption

Tatu Ylönen on the future of encryption in the wake of Edward Snowden's NSA revelations, the Heartbleed vulnerability & newly discovered APT's.

Read More
default category thumbnail
Trial Download

ConnectSecure

Try ConnectSecure free for 45 days! ConnectSecure, our advanced SSH client, enables enterprises to easily secure any FTP file transfer without having to modify the existing infrastructure, scripts or applications. Tectia ConnectSecure provides enhanced secure file transfer capabilities for today's demanding enterprise environments.

Download Now
resource thumbnail
Datasheet

CryptoAuditor

CryptoAuditor is a transparent and centralized real-time privileged access monitoring and auditing solution that enables organizations to control trusted insider data transfer activities on the fly and without any impact on remote administrators. CryptoAuditor is designed to reduce potential security threats from trusted insiders, meet current and emerging compliance mandates and reduce costs associated with implementation and administration with a minimally invasive approach designed to work with your existing network architecture.

Download Now
resource thumbnail
Multimedia

ConnectSecure - Watch the Video Demo

ConnectSecure is an advanced Tectia SSH Client that makes automation easy. ConnectSecure is ideal for adding encryption to existing automated file transfer processes and makes it easy for your application developers to use encryption.

Read More
resource thumbnail
Datasheet

Universal SSH Key Manager

In today's complex enterprise environments it is nearly impossible to map the trust relationships between individual users, system accounts and application ID's to their respective targeted destination SSH servers. Our Universal SSH Key Manager provides the only truly enterprise grade SSH user key management solution available.

Download Now
default category thumbnail
Webinar

Oh My Gosh, You've Got A Million Secure Shell Keys!

Lessons Learned from Managing the Largest Secure Shell Key Management Project in the World

Read More
resource thumbnail
Multimedia

Open Source: The 'Take a Penny, Leave a Penny' Culture

A follow-up to the blog "Free Can Make You Bleed", John Walsh continues the discussion about open source projects.

Watch Video
resource thumbnail
White Paper

The Challenge of Identity and Access Management in Secure Shell Environments

A Lack of Identity & Access Management Controls in Your SSH Environment Is Creating A Huge Security and Compliance Issue

Download Now
resource thumbnail
Case Study

Media Company Uses Universal SSH Key Manager to Lower Risk and Gain Operational Efficiency

Find out how this leading news and media organization streamlined provisioning and access controls for application developers and IT staff

Download Now
resource thumbnail
Webinar

Advanced Privileged Identity Management

Find out how your organization can move beyond the gateway approach to PIM

Read More
resource thumbnail
Case Study

Insurance Giants Choose SSH Communications Security for IBM Mainframe Security

Discover how two of the world’s largest insurance companies brought their mainframe data-in-transit and administration inline with current security and compliance requirements while retaining their legacy system

Download Now
resource thumbnail
Datasheet

Tectia SSH Client/Server Datasheet

From the company that invented the SSH protocol, Tectia SSH Client & Server is the gold standard data-in-transit security solution providing the strongest levels of encryption across multi-platform environments.

Download Now