Resources

As the inventors of the SSH protocol, SSH Communications Security is the recognized leader for securing the path to your information assets. Learn how SSH Communications Security products help you protect your information assets while meeting or exceeding regulation mandates. SSH Communications Security customers have saved time and money by utilizing our Information Assurance Platform. So can you.

Recent Resources

resource thumbnail
Multimedia

NISTIR 7966 Explained

August 20, 2014 marked the arrival of the NIST Interagency Report 7966. The release of this report has great significance for organizations that use Secure Shell – which is just about every medium to large enterprise, most government agencies and many large non-profits. So what is NISTIR 7966 all about and why should anyone care? Watch our video and hear Jonathan Lewis, Director of Product Marketing at SSH, explain the report and what it means for your organization.

Read More
resource thumbnail
Webinar

New NIST Guidelines for Secure Shell: What CISO’s Need to Know

Most commercial enterprises and government agencies face serious operational risks due to a lack of management and control over their deployments of Secure Shell. On August 20, 2014 NIST released a comprehensive set of Secure Shell deployment guidelines and best practices, co-authored by SSH Communications Security. This on-demand webinar explains what these guidelines are all about and what CISO’s need to know about them. Whether you are a CISO or if your CISO relies on you to keep him/her informed on important issues, this webinar is well worth your time.

Read More
resource thumbnail
Case Study

Major Financial Services Company Gains Visibility & Control Over External Contractors

Servicing customers in 90 countries including 45 of the top 50 banks, this Financial Services company needed to ensure that external, third-party contractors operating in their data centers were monitored and controlled in order to meet both security and compliance requirements. CryptoAuditor® was selected to provide transparent, inline privileged access management, demonstrate compliance and protect customer data.

Download Now
default category thumbnail
Trial Download

Tectia SSH Client/Server

Try Tectia SSH Client/Server free for 45 days! Tectia SSH Client & Server is an enterprise-class solution for securing system administration, file transfer and application connectivity in heterogeneous enterprise networks. Tectia SSH Client provides strong, FIPS 140-2 certified encryption and flexible authentication to address the critical security requirements of large organizations.

Download Now
resource thumbnail
Datasheet

Secure Shell HealthCheck

Many organizations use Secure Shell for privileged access to systems and data across the enterprise, yet few organizations have ever examined their deployments of Secure Shell for data breach risk and compliance exposures. Secure Shell HealthCheck is a security assessment service that delivers a detailed analysis of how Secure Shell is deployed and used in your network.

Download Now
resource thumbnail
White Paper

What Financial Institutions Need to Know About Secure Shell

Banks, insurance companies, brokerages, credit unions, etc. all use Secure Shell for business processes critical to day-to-day operations and for bringing new services online. However, Secure Shell is often viewed as “part of the plumbing” and typically does not get much attention from Compliance, Audit or Security. This mindset is rapidly changing. Poor controls over Secure Shell environments have contributed to costly data breaches and compliance violations. This white paper provides basic information on security and compliance issues as well as best practices for management and controls over Secure Shell environments within the financial services industry.

Download Now
default category thumbnail
Trial Download

ConnectSecure

Try ConnectSecure free for 45 days! ConnectSecure, our advanced SSH client, enables enterprises to easily secure any FTP file transfer without having to modify the existing infrastructure, scripts or applications. Tectia ConnectSecure provides enhanced secure file transfer capabilities for today's demanding enterprise environments.

Download Now
resource thumbnail
White Paper

What CISOs Need to Know About The New NIST Guidelines for Secure Shell

August 20, 2014 marked the arrival of the NIST Interagency Report 7966 (NISTIR 7966). The report provides guidelines for the security of automated access management using Secure Shell (SSH). These new developments within NIST have great significance for CISOs and other executives responsible for IT security. This white paper explains why NIST has taken these steps and what it means for IT security management not only within federal government agencies but also within the commercial sector.

Download Now
resource thumbnail
Webinar

The Black Blob of Death Threatens Your Data Center

The "blob" shows us the trust-relationships using Secure Shell key authentication inside a regional bank’s data center. This topological view of trust-relationships demonstrates how a lack of proper access controls in Secure Shell environments can create a real security risk for banks and other financial institutions. SSH has been tackling this challenge with a variety of major corporations and this webinar dives deeper into our findings. Watch it now!

Read More
resource thumbnail
Multimedia

Universal Key Manager (UKM) Demo Video

Your enterprise may have more Secure Shell identities than employees. A lot more. Gain visibility and control over who has access to what and when, with the only comprehensive identity and access management solution for Secure Shell. Watch the UKM demo for more first hand information on UKM today!

Read More
resource thumbnail
Case Study

Global IT Services and Cloud Hosting Provider Gains Ability to Monitor, Audit & Control Privileged Users in the Cloud

Discover how a major global IT services and cloud hosting company strengthened their security posture, met compliance and satisfied customers' SLA requirements

Download Now
resource thumbnail
Datasheet

CryptoAuditor: An SSH, SFTP and RDP Firewall

Is your perimeter security strategy ready to address today’s complex and highly targeted threats? Time and time again, we see the headlines...yet another enterprise exploited via encrypted networks. With massive investments in SIEM, DLP, IDS and other layered security solutions, how do so many enterprises - and so many of their customers - fall victim to these attacks? It’s simple: they can’t see encrypted traffic coming in and going out of their organization.

Download Now
resource thumbnail
Webinar

Heartbleed: You Stopped the Bleeding, But Did You Fix the Problem?

This webinar shows us how attackers can use Heartbleed to steal information directly from servers and then leverage that information to penetrate deep into your infrastructure – even after you have patched every server.

Read More
resource thumbnail
Multimedia

CryptoAuditor Video Demonstration

See How Encrypted Channel Monitoring Enhances Your Security Posture.

Read More
resource thumbnail
Case Study

Global Automobile Manufactures Secures Mainframe Communications with Tectia for z/OS

Learn how one of the largest automobile manufacturers in the world eliminated unsecure FTP on the Mainframe

Download Now
resource thumbnail
White Paper

The Rise Of IT Automation And The New Security Imperatives - Forrester Report

Growth in M2M Processes Requires a Fresh Approach to Security

Download Now
resource thumbnail
Datasheet

CryptoAuditor

CryptoAuditor is a transparent and centralized real-time privileged access monitoring and auditing solution that enables organizations to control trusted insider data transfer activities on the fly and without any impact on remote administrators. CryptoAuditor is designed to reduce potential security threats from trusted insiders, meet current and emerging compliance mandates and reduce costs associated with implementation and administration with a minimally invasive approach designed to work with your existing network architecture.

Download Now
resource thumbnail
Datasheet

Universal SSH Key Manager

In today's complex enterprise environments it is nearly impossible to map the trust relationships between individual users, system accounts and application ID's to their respective targeted destination SSH servers. Our Universal SSH Key Manager provides the only truly enterprise grade SSH user key management solution available.

Download Now
resource thumbnail
Webinar

Save Your CEO From A Major Cyber-Attack

When a high-profile breach happens, heads are going to roll. CEOs, CISOs, and other key executives often get the boot for not doing enough to protect the company, its brand, and its customers. In this webinar, we will touch on some of the risks senior-level employees face when a gap in security is exploited and steps organizations can take to solve long-standing security issues that can result in a major exploit.

Read More
resource thumbnail
Multimedia

ConnectSecure - Watch the Video Demo

ConnectSecure is an advanced Tectia SSH Client that makes automation easy. ConnectSecure is ideal for adding encryption to existing automated file transfer processes and makes it easy for your application developers to use encryption.

Read More