Datasheets

Showing Resources: 111 of 11

resource thumbnail

Secure Shell HealthCheck

Many organizations use Secure Shell for privileged access to systems and data across the enterprise, yet few organizations have ever examined their deployments of Secure Shell for data breach risk and compliance exposures. Secure Shell HealthCheck is a security assessment service that delivers a detailed analysis of how Secure Shell is deployed and used in your network.

Download Now
resource thumbnail

CryptoAuditor: An SSH, SFTP and RDP Firewall

Is your perimeter security strategy ready to address today’s complex and highly targeted threats? Time and time again, we see the headlines...yet another enterprise exploited via encrypted networks. With massive investments in SIEM, DLP, IDS and other layered security solutions, how do so many enterprises - and so many of their customers - fall victim to these attacks? It’s simple: they can’t see encrypted traffic coming in and going out of their organization.

Download Now
resource thumbnail

CryptoAuditor

CryptoAuditor is a transparent and centralized real-time privileged access monitoring and auditing solution that enables organizations to control trusted insider data transfer activities on the fly and without any impact on remote administrators. CryptoAuditor is designed to reduce potential security threats from trusted insiders, meet current and emerging compliance mandates and reduce costs associated with implementation and administration with a minimally invasive approach designed to work with your existing network architecture.

Download Now
resource thumbnail

Universal SSH Key Manager

In today's complex enterprise environments it is nearly impossible to map the trust relationships between individual users, system accounts and application ID's to their respective targeted destination SSH servers. Our Universal SSH Key Manager provides the only truly enterprise grade SSH user key management solution available.

Download Now
resource thumbnail

Tectia SSH Client/Server Datasheet

From the company that invented the SSH protocol, Tectia SSH Client & Server is the gold standard data-in-transit security solution providing the strongest levels of encryption across multi-platform environments.

Download Now
resource thumbnail

Tectia SSH Server for Mainframes

Tectia SSH Mainframe Solutions are the first enterprise security solution to fully integrate SSH and SFTP to the IBM z/OS and System Z platform for secure mainframe access.

Download Now
resource thumbnail

Tectia SSH Server for Linux on IBM System z

Tectia SSH Server for IBM z/OS, with its drop-in features such as automatic FTP-SFTP conversion and transparent FTP tunneling, is an ideal Secure Shell (SSH) server solution enabling network security teams to securely transfers data without modifications to scripts, FTP file transfer jobs, applications or IT infrastructure.

Download Now
resource thumbnail

ConnectSecure

ConnectSecure is an advanced Tectia SSH Client that makes automation easy. ConnectSecure is ideal for adding encryption to existing automated file transfer processes and makes it easy for your application developers to use encryption.

Download Now
resource thumbnail

Tectia MobileID Datasheet

First generation two-factor authentication solutions can be expensive to deploy and maintain, difficult to scale and frustrating for end users even in well controlled internal corporate environments.

Download Now
resource thumbnail

An Identity Management Application Note: Missing Identities

The challenge of unmanaged machine identities has grown over time. Data center growth has been explosive. Large server infrastructures can be home to hundreds of thousands or even millions of secure shell user key based identities.

Download Now
resource thumbnail

SSH Support Services

An SSH support plan is an easy and efficient way to maximize your investment in SSH software and help reduce your total cost of ownership.

Download Now