Request demo
AdobeStock_1037740776-1

Celebrating 30 years of SSH - the protocol and the company behind it

Celebrating 30 years of SSH - the protocol and the company behind it

The Secure Shell (SSH) protocol is one of the bedrocks of secure, confidential communication over networks. SSH Communications Security (SSH) is the inventor of the protocol and origin of Tectia, the commercial SSH solution.

Both thirtysomethings are agile, battle-tested, and future-proof  - and looking forward to the next 30 years of Quantum Safety and future-proof crypto-agility.

 

SSH turns 30... but you get a gift!

Try our products for free during the entire year of 2025.

Free trial of SalaX Secure Messaging

Try out SalaX Secure Messaging for free until the end of 2025 - No strings attached! 

Start your free trial today >>>

 

sec_messaging_mockup-cropped

 

PrivX PAM Free version

Key features included in the PrivX free tool: 

  • Lightweight deployment 
  • Modern PAM capabilities 
  • Ephemeral access
  • Designed for hybrid and multi-cloud environments 

What’s included in the Free version?

  • Online license, valid for 1 year (can be renewed) 
  • Up to 20 targets (2 audited) 
  • Up to 5 users 
  • 5 concurrent connections: 2 SSH, 2 RDP, 1 web/1 VNC  
  • Single instance 

 

Learn more & start your free trial >>>

Get PrivX Insights for a special price of 8650€

Analyze your cryptographic risks, create your crypto inventory, identify vulnerabilities (especially related to SSH key usage), and mitigate risks (including PAM bypass).

Risk assessment with PrivX Insights includes:

  • Get insights into your classical cryptography and assess your level of post-quantum cryptography (PQC) readiness
  • Create a complete crypto inventory of your cryptographic assets
  • Gain visibility into your SSH key usage
  • Identify vulnerabilities and discover rogue, high-risk, or dormant connections that violate policies and regulations
  • Pass audits and ensure compliance with custom recommendations and detailed reports

Learn more here >>>

The first tool for secure system administration and file transfers

In 1995, Tatu Ylönen’s passwords were stolen from a university network. Three months later, he had created a first-of-its-kind encrypted and passwordless way to secure connections between a client and a host - open source SSH. Half a year later, SSH Communications Security was born out of demand for commercial solutions for the protocol.

LEARN MORE

 

SSH is everywhere

Secure Shell is used for remote access, file transfers and business critical applications to secure them on-premises or in the cloud. In IT, it protects bank transactions, intellectual property, government secrets, and medical records. In operational technology (OT), it secures satellites, windmills, factories, electric cars, or even washing machines. We are talking about billions of connections per day.

SSH30years_image(1)

SSH keys - like unruly passwords except 10 times more common

Passwords outnumber other credentials in everyday business use. But in large-scale and long-standing IT environments our customers maintain, SSH keys take the pole postion.

Passwords are susceptible to phishing and brute force attacks. Using SSH public key authentication eliminates this issue but it does bring forth a different challenge: Key governance.

SSH_death_star-1

Keys need governance

It is easy to set up authentication with SSH keys, they're often self-provisioned, and decentralized. This means that keys go wild and their governance is out of control. Just like in the picture. PrivX Key Manager takes stock of all your keys and automates their control to make their use compliant and governed. 

And then you migrate to Zero Trust.

SSH30years_image(5)

Migrate to Zero Trust

SSH Zero Trust Suite with PrivX technology migrates you to a Zero Trust state where we no longer have standing credentials like passwords or SSH keys. Instead, every session is both authorized and authenticated with a short-lived OpenSSH or X.509 certificate leaving no credentials to steal, misuse or manage.

 

 

SSH30years_image(2)

Open Source vs supported SSH

Many leading organizations choose the original SSH solution, Tectia,  for critical communications because it provides:

  • 24/7 support
  • Full support for public key infrastructure (PKI)
  • Cross-platform (UNIX, LINUX, Windows…) interoperability
  • Direct access to IBM mainframe data sets with seamless conversion, direct access to automation tools, and parallel batch jobs.
  • Zero Trust authentication based on x.509 or Open SSH certificates to targets.
SSH30years_image(6)

Crypto agile for quantum-safe future

With Tectia, you can choose the ciphers and algorithms used. Take your business applications, wrap them in a quantum safe tunnel, and ensure that the confidential data encrypted today is still safe in the years to come - even in the age of cryptographically relevant quantum computers.

SSH Communications Security – Beyond the Protocol

Over the past 30 years, SSH has evolved into a leading provider of IT and OT security for people, systems, and networks. From our early days offering the SSH protocol to everyone, we have remained committed to securing the internet and critical infrastructure for some of the world’s most demanding organizations. We will continue to do so by advancing quantum-safe, crypto-agile and zero-trust use cases across various industries, helping make our increasingly connected world a safer place.

From Then to Now: Alumni Stories

 

As we celebrate 30 years of SSH, we’re spotlighting the people who helped shape our journey. In these short videos, former SSH experts share their insights, stories, and the impact SSH has had on the cybersecurity landscape.

Stephanie Fuller, SSH Alumna

SSH Fellow Suvi Lampila sits down with SSH alumna Stephanie Fuller to discuss the evolution of Secure Shell, the fall of passwords, and lessons from the early days of cybersecurity.

 

Markku-Juhani O. Saarinen, SSH Alumnus and one of the company’s first cryptographers

SSH Fellow Suvi Lampila speaks with Markku-Juhani O. Saarinen, SSH Alumnus and one of the company’s first cryptographers, about end-to-end encryption, post-quantum cryptography, the evolution of the SSH protocol, the early days of cryptography at SSH, and much more.

 

Tero Kivinen, Senior Fellow

SSH Fellow Suvi Lampila speaks with Senior Fellow Tero Kivinen about post-quantum cryptography, migration challenges, and lessons learned from decades of protocol development.

 

Sami Lehtinen, SSH Alumnus

In this interview, SSH Fellow Suvi Lampila speaks with SSH Alumnus Sami Lehtinen about crypto agility, continuous integration and software composition analysis, supply chain attacks, and more.