Resources

As the inventors of the SSH protocol, SSH Communications Security is the recognized leader for securing the path to your information assets. Learn how SSH Communications Security products help you protect your information assets while meeting or exceeding regulation mandates. SSH Communications Security customers have saved time and money by utilizing our Information Assurance Platform. So can you.

Recent Resources

resource thumbnail
Datasheet

Secure Shell HealthCheck

Many organizations use Secure Shell for privileged access to systems and data across the enterprise, yet few organizations have ever examined their deployments of Secure Shell for data breach risk and compliance exposures. Secure Shell HealthCheck is a security assessment service that delivers a detailed analysis of how Secure Shell is deployed and used in your network.

Download
resource thumbnail
White Paper

Attention CISOs: Secure Shell Key Management is Vital to Your Identity and Access Management Strategy

An SSH Key Management Strategy is a critical part of your Identity and Access Management program. Learn what recent research from Gartner and SSH Communications Security has revealed in this area of critical importance to CISOs.

Download
resource thumbnail
Webinar

Trust Management in Data Centers Needs CISO Attention (featuring Forrester Analyst John Kindervag)

Guest speaker and Forrester analyst, John Kindervag reviews the current state of trust management in data centers, how current trends in data center automation are making things worse and most importantly, what actions CISOs should be initiating.

Read More
default category thumbnail
Trial Download

Tectia SSH Client/Server

Try Tectia SSH Client/Server free for 45 days! Tectia SSH Client & Server is an enterprise-class solution for securing system administration, file transfer and application connectivity in heterogeneous enterprise networks. Tectia SSH Client provides strong, FIPS 140-2 certified encryption and flexible authentication to address the critical security requirements of large organizations.

Download
resource thumbnail
Case Study

Major Financial Services Company Gains Visibility & Control Over External Contractors

Servicing customers in 90 countries including 45 of the top 50 banks, this Financial Services company needed to ensure that external, third-party contractors operating in their data centers were monitored and controlled in order to meet both security and compliance requirements. CryptoAuditor® was selected to provide transparent, inline privileged access management, demonstrate compliance and protect customer data.

Download
resource thumbnail
Multimedia

Interview with SSH's new CEO, Harri Koponen

Harri Koponen, 51, eMBA, Dr. Econ. (h.c.), joined SSH at the beginning of October as our new CEO. I took a few minutes of his time to hear where he comes from, what his views are on the current IT security market, and what his focus will be in the near future.

Read More
resource thumbnail
Case Study

Global IT Services and Cloud Hosting Provider Gains Ability to Monitor, Audit & Control Privileged Users in the Cloud

Discover how a major global IT services and cloud hosting company strengthened their security posture, met compliance and satisfied customers' SLA requirements

Download
default category thumbnail
Trial Download

ConnectSecure

Try ConnectSecure free for 45 days! ConnectSecure, our advanced SSH client, enables enterprises to easily secure any FTP file transfer without having to modify the existing infrastructure, scripts or applications. Tectia ConnectSecure provides enhanced secure file transfer capabilities for today's demanding enterprise environments.

Download
resource thumbnail
Datasheet

CryptoAuditor: An SSH, SFTP and RDP Firewall

Is your perimeter security strategy ready to address today’s complex and highly targeted threats? Time and time again, we see the headlines...yet another enterprise exploited via encrypted networks. With massive investments in SIEM, DLP, IDS and other layered security solutions, how do so many enterprises - and so many of their customers - fall victim to these attacks? It’s simple: they can’t see encrypted traffic coming in and going out of their organization.

Download
resource thumbnail
Multimedia

[Infographic] 4 Steps to SSH Key Management

Your enterprise may have more Secure Shell trust relationships than employees. A lot more. Follow these four steps to gain visibility and control over your Secure Shell environment.

Download
resource thumbnail
White Paper

What Financial Institutions Need to Know About Secure Shell

Banks, insurance companies, brokerages, credit unions, etc. all use Secure Shell for business processes critical to day-to-day operations and for bringing new services online. However, Secure Shell is often viewed as “part of the plumbing” and typically does not get much attention from Compliance, Audit or Security. This mindset is rapidly changing. Poor controls over Secure Shell environments have contributed to costly data breaches and compliance violations. This white paper provides basic information on security and compliance issues as well as best practices for management and controls over Secure Shell environments within the financial services industry.

Download
resource thumbnail
Webinar

New NIST Guidelines for Secure Shell: What CISO’s Need to Know

Most commercial enterprises and government agencies face serious operational risks due to a lack of management and control over their deployments of Secure Shell. On August 20, 2014 NIST released a comprehensive set of Secure Shell deployment guidelines and best practices, co-authored by SSH Communications Security. This on-demand webinar explains what these guidelines are all about and what CISO’s need to know about them. Whether you are a CISO or if your CISO relies on you to keep him/her informed on important issues, this webinar is well worth your time.

Read More
resource thumbnail
Multimedia

NISTIR 7966 Explained

August 20, 2014 marked the arrival of the NIST Interagency Report 7966. The release of this report has great significance for organizations that use Secure Shell – which is just about every medium to large enterprise, most government agencies and many large non-profits. So what is NISTIR 7966 all about and why should anyone care? Watch our video and hear Jonathan Lewis, Director of Product Marketing at SSH, explain the report and what it means for your organization.

Read More
resource thumbnail
White Paper

Achieving Effective Compliance: Hong Kong Monetary Authority’s General Principles for Technology Risk Management

General Principles for Technology Risk Management [TM-G-1] (version V.1 ­ 24.06.03), published by Hong Kong Monetary Authority (HKMA), gives financial institutions instructions in managing technology-related risks. While the guidelines provide high-level and technology-agnostic scope and direction, several sections have impact on the way access controls, privileged users and SSH keys are managed. This poses a challenge for upper management and auditors; and thus they often overlook the critical gaps in the enforcement of access controls and compliance mandate. The white paper highlights the guidelines and considerations, and offers proposed solution approaches to each.

Download
resource thumbnail
Webinar

The Black Blob of Death Threatens Your Data Center

The "blob" shows us the trust-relationships using Secure Shell key authentication inside a regional bank’s data center. This topological view of trust-relationships demonstrates how a lack of proper access controls in Secure Shell environments can create a real security risk for banks and other financial institutions. SSH has been tackling this challenge with a variety of major corporations and this webinar dives deeper into our findings. Watch it now!

Read More
resource thumbnail
Datasheet

CryptoAuditor

CryptoAuditor is a transparent and centralized real-time privileged access monitoring and auditing solution that enables organizations to control trusted insider data transfer activities on the fly and without any impact on remote administrators. CryptoAuditor is designed to reduce potential security threats from trusted insiders, meet current and emerging compliance mandates and reduce costs associated with implementation and administration with a minimally invasive approach designed to work with your existing network architecture.

Download
resource thumbnail
Case Study

Global Automobile Manufactures Secures Mainframe Communications with Tectia for z/OS

Learn how one of the largest automobile manufacturers in the world eliminated unsecure FTP on the Mainframe

Download
resource thumbnail
Datasheet

Universal SSH Key Manager

In today's complex enterprise environments it is nearly impossible to map the trust relationships between individual users, system accounts and application ID's to their respective targeted destination SSH servers. Our Universal SSH Key Manager provides the only truly enterprise grade SSH user key management solution available.

Download
resource thumbnail
Case Study

Media Company Uses Universal SSH Key Manager to Lower Risk and Gain Operational Efficiency

Find out how this leading news and media organization streamlined provisioning and access controls for application developers and IT staff

Download
resource thumbnail
Webinar

Heartbleed: You Stopped the Bleeding, But Did You Fix the Problem?

This webinar shows us how attackers can use Heartbleed to steal information directly from servers and then leverage that information to penetrate deep into your infrastructure – even after you have patched every server.

Read More