White Papers

Showing Resources: 120 of 20

resource thumbnail

What You Need To Know About NIST Guidelines for Secure Shell (SSH)

NISTIR 7966 details everything an individual needs to know about the SSH protocol and the security of interactive and automated access management using SSH, its wide usage and how to manage the deployments based on industry best practices. Learn more about how the guidelines will help your organization best manage and control SSH User Keys.

Download Now
resource thumbnail

NIST Guidance Cheat Sheet

NISTIR 7966, titled “Security of Interactive and Automated Access Management Using Secure Shell (SSH)”, was published as an official standard as of October 2015. This report has great significance for organizations that use SSH – which is just about every medium to large enterprise, most government agencies and many large non-profits. This cheat sheet highlight the benefits of downloading and absorbing the full report.

Read More
resource thumbnail

A Secure Shell Guide for PCI DSS Compliance Version 3.1

This white paper takes a closer look at how use of Secure Shell in cardholder data environments (CDE) relates to the specific intent, guidance and requirements of PCI DSS Version 3.1 The paper gives detailed guidance on what Quality Security Assessors and Internal Security Assessors should look for when conducting PCI DSS audits.

Download Now
resource thumbnail

Preventing Data Loss Through Privileged Access Channels

Trust is no longer a guessing game. Read this white paper to gain immediate visibility and control on encrypted third-party access within your network.

Download Now
resource thumbnail

A Secure Shell Guide for Basel II and Basel III

This white paper explains the nature of Basel II control objectives for IT security, which includes requirements that pertain to Secure Shell.

Download Now
resource thumbnail

How Misplaced Trust Can Render Your DLP Ineffective

The new SSH application note authored by Tommi Lampila, VP APAC, presents the scenario and the tangible steps organizations can take to gain the visibility required for security and compliance. Download the Application Note for further details!

Download Now
resource thumbnail

Achieving Effective Compliance: Hong Kong Monetary Authority’s General Principles for Technology Risk Management

General Principles for Technology Risk Management [TM-G-1] (version V.1 ­ 24.06.03), published by Hong Kong Monetary Authority (HKMA), gives financial institutions instructions in managing technology-related risks. While the guidelines provide high-level and technology-agnostic scope and direction, several sections have impact on the way access controls, privileged users and SSH keys are managed. This poses a challenge for upper management and auditors; and thus they often overlook the critical gaps in the enforcement of access controls and compliance mandate. The white paper highlights the guidelines and considerations, and offers proposed solution approaches to each.

Download Now
resource thumbnail

Attention CISOs: Secure Shell Key Management is Vital to Your Identity and Access Management Strategy

An SSH Key Management Strategy is a critical part of your Identity and Access Management program. Learn what recent research from Gartner and SSH Communications Security has revealed in this area of critical importance to CISOs.

Download Now
resource thumbnail

What Financial Institutions Need to Know About Secure Shell

Banks, insurance companies, brokerages, credit unions, etc. all use Secure Shell for business processes critical to day-to-day operations and for bringing new services online. However, Secure Shell is often viewed as “part of the plumbing” and typically does not get much attention from Compliance, Audit or Security. This mindset is rapidly changing. Poor controls over Secure Shell environments have contributed to costly data breaches and compliance violations. This white paper provides basic information on security and compliance issues as well as best practices for management and controls over Secure Shell environments within the financial services industry.

Download Now Download A4 Version
resource thumbnail

The Rise Of IT Automation And The New Security Imperatives - Forrester Report

Growth in M2M Processes Requires a Fresh Approach to Security

Download Now
resource thumbnail

A Gaping Hole in Your Identity and Access Management Strategy: Secure Shell Access Controls

Identity and access management (IAM) is a critical component of an enterprise's security strategy

Download Now
resource thumbnail

The Challenge of Identity and Access Management in Secure Shell Environments

A Lack of Identity & Access Management Controls in Your SSH Environment Is Creating A Huge Security and Compliance Issue

Download Now
resource thumbnail

Risk, Compliance and Cost Implications of Unmanaged Secure Shell

This white paper discusses how a lack of central management and control can create various negative impacts within an enterprise environment.

Download Now
resource thumbnail

PCI DSS Version 3 Cheat Sheet

This “cheat sheet” provides auditors with quick guidance as to what questions to ask and how to verify that SSH is used safely and securely within the Card Holder Data Environment.

Download Now
resource thumbnail

Security Solutions for IBM Mainframes: Implement, Manage and Monitor Your Encrypted Environment

Automate Secure File Transfers and Close Backdoor Access to The Mainframe with SSH's Data-in-Transit & IAM Solutions for the Mainframe.

Download Now
resource thumbnail

SSH User Keys and Access Control in PCI-DSS Compliance Environments

Learn how emerging trends in SSH key management is impacting PCI covered environments and the security implications of poor SSH access controls on the enterprise

Download Now
resource thumbnail

The Cost of Insecurity: FTP And the Looming Financial Hazard It Is Creating For Your Organization

Once and for all, eliminate unsecured FTP file transfers ensuring that all of your data-in-transit is secured via SFTP and SSH

Download Now
resource thumbnail

Technology Risk Management Guidelines by Monetary Authority of Singapore Cost-Effective Controls for Compliance

Learn about cost-effective solutions-based approaches to addressing Monetary Authority of Singapore SSH guidelines

Download Now