Resources

As the inventors of the SSH protocol, SSH Communications Security is the recognized leader for securing the path to your information assets. Learn how SSH Communications Security products help you protect your information assets while meeting or exceeding regulation mandates. SSH Communications Security customers have saved time and money by utilizing our Information Assurance Platform. So can you.

Recent Resources

resource thumbnail
Multimedia

Interview with SSH's new CEO, Harri Koponen

Harri Koponen, 51, eMBA, Dr. Econ. (h.c.), joined SSH at the beginning of October as our new CEO. I took a few minutes of his time to hear where he comes from, what his views are on the current IT security market, and what his focus will be in the near future.

Read More
resource thumbnail
White Paper

What You Need To Know About NIST Guidelines for Secure Shell (SSH)

NISTIR 7966 details everything an individual needs to know about the SSH protocol and the security of interactive and automated access management using SSH, its wide usage and how to manage the deployments based on industry best practices. Learn more about how the guidelines will help your organization best manage and control SSH User Keys.

Download
resource thumbnail
Guide

PCI DSS Gap Assessment Best Practices Guide

Use this guide to assess your state of PCI compliance. It contains key areas of focus an organization should consider before beginning a formal PCI audit which is best addressed via a PCI Gap Assessment.

Read More
default category thumbnail
Webinar

The Myth of SSH Key Discovery - SSH Myth Cracker Webcast Series

How can you easily determine where your keys are located and how can you get control of the people using them? Joe Scaff, Director of Global Support, presents about the most common myths around ssh user key discovery and how discovered data points can be misleading in your remediation and policy control efforts.

Read More
default category thumbnail
Trial Download

Tectia SSH Client Trial Download

Try Tectia SSH Client free for 45 days! Tectia SSH Client & Server is an enterprise-class solution for securing system administration, file transfer and application connectivity in heterogeneous enterprise networks. Tectia SSH Client provides strong, FIPS 140-2 certified encryption and flexible authentication to address the critical security requirements of large organizations.

Read More
resource thumbnail
Datasheet

CryptoAuditor

CryptoAuditor is a transparent and centralized real-time privileged access monitoring and auditing solution that enables organizations to control trusted insider data transfer activities on the fly and without any impact on remote administrators. CryptoAuditor is designed to reduce potential security threats from trusted insiders, meet current and emerging compliance mandates and reduce costs associated with implementation and administration with a minimally invasive approach designed to work with your existing network architecture.

Download
resource thumbnail
Case Study

Clearmanage Boosts Cloud Security with CryptoAuditor

Clearmanage, based in Singapore with operations in Asia and the Middle East, provides cloud services, cloud infrastructure, hosting services, advanced security solutions and services for government agencies and enterprises.

Download
resource thumbnail
White Paper

NIST Guidance Cheat Sheet

NISTIR 7966, titled “Security of Interactive and Automated Access Management Using Secure Shell (SSH)”, was published as an official standard as of October 2015. This report has great significance for organizations that use SSH – which is just about every medium to large enterprise, most government agencies and many large non-profits. This cheat sheet highlight the benefits of downloading and absorbing the full report.

Read More
resource thumbnail
Datasheet

CryptoAuditor: An SSH, SFTP and RDP Firewall

Is your perimeter security strategy ready to address today’s complex and highly targeted threats? Time and time again, we see the headlines...yet another enterprise exploited via encrypted networks. With massive investments in SIEM, DLP, IDS and other layered security solutions, how do so many enterprises - and so many of their customers - fall victim to these attacks? It’s simple: they can’t see encrypted traffic coming in and going out of their organization.

Download
resource thumbnail
Multimedia

[Infographic] 4 Steps to SSH Key Management

Your enterprise may have more Secure Shell trust relationships than employees. A lot more. Follow these four steps to gain visibility and control over your Secure Shell environment.

Download
default category thumbnail
Trial Download

SSH Tectia Server Trial Download

Try Tectia SSH Server free for 45 days! Tectia SSH Client & Server is an enterprise-class solution for securing system administration, file transfer and application connectivity in heterogeneous enterprise networks. Tectia SSH Client provides strong, FIPS 140-2 certified encryption and flexible authentication to address the critical security requirements of large organizations.

Read More
resource thumbnail
Case Study

Major Financial Services Company Gains Visibility & Control Over External Contractors

Servicing customers in 90 countries including 45 of the top 50 banks, this Financial Services company needed to ensure that external, third-party contractors operating in their data centers were monitored and controlled in order to meet both security and compliance requirements. CryptoAuditor® was selected to provide transparent, inline privileged access management, demonstrate compliance and protect customer data.

Download
resource thumbnail
Datasheet

Secure Shell HealthCheck

Many organizations use Secure Shell for privileged access to systems and data across the enterprise, yet few organizations have ever examined their deployments of Secure Shell for data breach risk and compliance exposures. Secure Shell HealthCheck is a security assessment service that delivers a detailed analysis of how Secure Shell is deployed and used in your network.

Download
resource thumbnail
Multimedia

NISTIR 7966 Explained

August 20, 2014 marked the arrival of the NIST Interagency Report 7966. The release of this report has great significance for organizations that use Secure Shell – which is just about every medium to large enterprise, most government agencies and many large non-profits. So what is NISTIR 7966 all about and why should anyone care? Watch our video and hear Jonathan Lewis, Director of Product Marketing at SSH, explain the report and what it means for your organization.

Read More
resource thumbnail
White Paper

A Secure Shell Guide for PCI DSS Compliance Version 3.1

This white paper takes a closer look at how use of Secure Shell in cardholder data environments (CDE) relates to the specific intent, guidance and requirements of PCI DSS Version 3.1 The paper gives detailed guidance on what Quality Security Assessors and Internal Security Assessors should look for when conducting PCI DSS audits.

Download
default category thumbnail
Trial Download

CryptoAuditor

Deploying CryptoAuditor is easy – just request an evaluation license and start auditing encrypted traffic! Fill in the form to request your license and immediately receive it in your email inbox.

Read More
resource thumbnail
Case Study

Global IT Services and Cloud Hosting Provider Gains Ability to Monitor, Audit & Control Privileged Users in the Cloud

Discover how a major global IT services and cloud hosting company strengthened their security posture, met compliance and satisfied customers' SLA requirements

Download
resource thumbnail
Webinar

Trust Management in Data Centers Needs CISO Attention (featuring Forrester Analyst John Kindervag)

Guest speaker and Forrester analyst, John Kindervag reviews the current state of trust management in data centers, how current trends in data center automation are making things worse and most importantly, what actions CISOs should be initiating.

Read More
resource thumbnail
Datasheet

Universal SSH Key Manager

In today's complex enterprise environments it is nearly impossible to map the trust relationships between individual users, system accounts and application ID's to their respective targeted destination SSH servers. Our Universal SSH Key Manager provides the only truly enterprise grade SSH user key management solution available.

Download
resource thumbnail
White Paper

Preventing Data Loss Through Privileged Access Channels

Trust is no longer a guessing game. Read this white paper to gain immediate visibility and control on encrypted third-party access within your network.

Download