Datasheets

Showing Resources: 19 of 9

resource thumbnail

CryptoAuditor

CryptoAuditor is a transparent and centralized real-time privileged access monitoring and auditing solution that enables organizations to control trusted insider data transfer activities on the fly and without any impact on remote administrators. CryptoAuditor is designed to reduce potential security threats from trusted insiders, meet current and emerging compliance mandates and reduce costs associated with implementation and administration with a minimally invasive approach designed to work with your existing network architecture.

Download Now
resource thumbnail

Universal SSH Key Manager

In today's complex enterprise environments it is nearly impossible to map the trust relationships between individual users, system accounts and application ID's to their respective targeted destination SSH servers. Our Universal SSH Key Manager provides the only truly enterprise grade SSH user key management solution available.

Download Now
resource thumbnail

Tectia SSH Client/Server Datasheet

From the company that invented the SSH protocol, Tectia SSH Client & Server is the gold standard data-in-transit security solution providing the strongest levels of encryption across multi-platform environments.

Download Now
resource thumbnail

Tectia SSH Server for Mainframes

Tectia SSH Mainframe Solutions are the first enterprise security solution to fully integrate SSH and SFTP to the IBM z/OS and System Z platform for secure mainframe access.

Download Now
resource thumbnail

Tectia SSH Server for Linux on IBM System z

Tectia SSH Server for IBM z/OS, with its drop-in features such as automatic FTP-SFTP conversion and transparent FTP tunneling, is an ideal Secure Shell (SSH) server solution enabling network security teams to securely transfers data without modifications to scripts, FTP file transfer jobs, applications or IT infrastructure.

Download Now
resource thumbnail

ConnectSecure

ConnectSecure is an advanced Tectia SSH Client that makes automation easy. ConnectSecure is ideal for adding encryption to existing automated file transfer processes and makes it easy for your application developers to use encryption.

Download Now
resource thumbnail

Tectia MobileID Datasheet

First generation two-factor authentication solutions can be expensive to deploy and maintain, difficult to scale and frustrating for end users even in well controlled internal corporate environments.

Download Now
resource thumbnail

An Identity Management Application Note: Missing Identities

The challenge of unmanaged machine identities has grown over time. Data center growth has been explosive. Large server infrastructures can be home to hundreds of thousands or even millions of secure shell user key based identities.

Download Now
resource thumbnail

SSH Support Services

An SSH support plan is an easy and efficient way to maximize your investment in SSH software and help reduce your total cost of ownership.

Download Now