Resources

As the inventors of the SSH protocol, SSH Communications Security is the recognized leader for securing the path to your information assets. Learn how SSH Communications Security products help you protect your information assets while meeting or exceeding regulation mandates. SSH Communications Security customers have saved time and money by utilizing our Information Assurance Platform. So can you.

Recent Resources

resource thumbnail
Case Study

Global Automobile Manufactures Secures Mainframe Communications with Tectia for z/OS

Learn how one of the largest automobile manufacturers in the world eliminated unsecure FTP on the Mainframe

Download Now
resource thumbnail
Webinar

What Every QSA and ISA Should Know About Secure Shell

Find out what questions to ask and how to verify that SSH is being used safely and securely within the Card Holder Data Environment.

Watch Video
resource thumbnail
White Paper

The Rise Of IT Automation And The New Security Imperatives - Forrester Report

Growth in M2M Processes Requires a Fresh Approach to Security

Download Now
resource thumbnail
Datasheet

CryptoAuditor

CryptoAuditor is a transparent and centralized real-time privileged access monitoring and auditing solution that enables organizations to control trusted insider data transfer activities on the fly and without any impact on remote administrators. CryptoAuditor is designed to reduce potential security threats from trusted insiders, meet current and emerging compliance mandates and reduce costs associated with implementation and administration with a minimally invasive approach designed to work with your existing network architecture.

Download Now
resource thumbnail
Free Ssh Risk Assessor

SSH Risk Assessor Tool

SSH Risk Assessor (SRA) from SSH Communications Security is a lightweight scanning and reporting tool that enables security auditors to obtain actionable information as to the state of compliance and risk with respect to SSH identity and access management.

Download Now
default category thumbnail
Trial Download

Tectia SSH Client/Server

Try Tectia SSH Client/Server free for 45 days! Tectia SSH Client & Server is an enterprise-class solution for securing system administration, file transfer and application connectivity in heterogeneous enterprise networks. Tectia SSH Client provides strong, FIPS 140-2 certified encryption and flexible authentication to address the critical security requirements of large organizations.

Download Now
default category thumbnail
Multimedia

SSH at the 2014 RSA Conference

We stole a few minutes with Jonathan Lewis, Director of Product Marketing at SSH Communications Security to discuss the buzz at RSA this year and what SSH has to offer.

Watch Video
resource thumbnail
Case Study

Media Company Uses Universal SSH Key Manager to Lower Risk and Gain Operational Efficiency

Find out how this leading news and media organization streamlined provisioning and access controls for application developers and IT staff

Download Now
resource thumbnail
Datasheet

Universal SSH Key Manager

In today's complex enterprise environments it is nearly impossible to map the trust relationships between individual users, system accounts and application ID's to their respective targeted destination SSH servers. Our Universal SSH Key Manager provides the only truly enterprise grade SSH user key management solution available.

Download Now
resource thumbnail
Multimedia

Monitoring and Controlling Encrypted Communications

Sami Ahvenniemi, President and CEO, Americas at SSH Communications Security discusses how you can monitor and control your encrypted channels. He provides some solutions for issues regarding privileged user access, accountability, and auditing in enterprise Secure Shell environments.

Watch Video
default category thumbnail
Trial Download

ConnectSecure

Try ConnectSecure free for 45 days! ConnectSecure, our advanced SSH client, enables enterprises to easily secure any FTP file transfer without having to modify the existing infrastructure, scripts or applications. Tectia ConnectSecure provides enhanced secure file transfer capabilities for today's demanding enterprise environments.

Download Now
resource thumbnail
Webinar

The Anatomy of an Insider Attack: Exploiting Encrypted Networks

With recent, high profile breaches in some of the most secure environments in the world (DoD, NSA) the ability of trusted insiders to do extensive damage to an organization's data, capabilities and reputation is now front and center.

Watch Video
resource thumbnail
White Paper

The Challenge of Identity and Access Management in Secure Shell Environments

A Lack of Identity & Access Management Controls in Your SSH Environment Is Creating A Huge Security and Compliance Issue

Download Now
resource thumbnail
Case Study

Insurance Giants Choose SSH Communications Security for IBM Mainframe Security

Discover how two of the world’s largest insurance companies brought their mainframe data-in-transit and administration inline with current security and compliance requirements while retaining their legacy system

Download Now
resource thumbnail
Datasheet

Tectia SSH Client/Server Datasheet

From the company that invented the SSH protocol, Tectia SSH Client & Server is the gold standard data-in-transit security solution providing the strongest levels of encryption across multi-platform environments.

Download Now
default category thumbnail
Multimedia

Solving Customer Challenges with Tectia ConnectSecure

Sami Marttinen, Chief Solution Engineer at SSH Communications Security discusses how Tectia ConnectSecure makes it easy to add encryption to new and legacy applications.

Watch Video
resource thumbnail
Datasheet

Tectia SSH Server for Mainframes

Tectia SSH Mainframe Solutions are the first enterprise security solution to fully integrate SSH and SFTP to the IBM z/OS and System Z platform for secure mainframe access.

Download Now
resource thumbnail
Case Study

Universal SSH Key Manager Restores Compliance and Reduces Risk at Top 5 Global Bank

Learn how this top 5 global bank reduced the risk of unauthorized access and met compliance mandates by implementing IAM controls in their Secure Shell environment

Download Now
default category thumbnail
Multimedia

Insider Attacks in Secure Shell Environments

Jason Thompson, Director of Global Marketing, explains how a malicious insider can take advantage of privileged access and encrypted channels to secretly remove information from your network.

Watch Video
default category thumbnail
Webinar

Meeting the Revised MAS Technology Risk Management Guidelines

View this 45 minute presentation to hear from Tommi Lampila, VP of APAC at SSH Communications Security, as he goes through the MAS TRM Guidelines and explains how to meet the requirements posed in them.

Watch Video