• About us
  • Investors
  • Partners
  • Careers
Request demo
  • Solutions
    • SOLUTIONS
      • Zero Trust Suite
      • Quantum-Safe Cryptography (QSC)
      • SalaX Secure Collaboration
      • Security Risk Assessment, Quantification & Mitigation
    • By Topic
      • Just-in-Time Access
      • Secure vendor access
      • Credentials & Secrets Management
      • Hybrid & multi-cloud access management
      • Interactive tour: Privileged Access in the Cloud
      • M2M connections
      • IT Audits & Compliance
      • Secure file transfer
    • By Industry
      • Managed Service Providers (MSP)
      • Operational Technology (OT)
      • Federal Government Security
  • Products
    • SECURE ACCESS & SECRETS MANAGEMENT
      • PrivX™ Hybrid PAM
      • PrivX Key Manager
    • SECURE FILE TRANSFER & ENCRYPTION
      • NQX™ quantum-ready encryption
      • Tectia™ SSH Client/Server
      • Tectia™ z/OS
    • SalaX Secure Collaboration
      • Secure Mail 2024
      • Secure Messaging 2024
      • SalaX Secure Collaboration
Request demo
  • Solutions
    • SOLUTIONS
      • PrivX Zero Trust Suite
      • SalaX Secure Collaboration
      • Strong ID-based access with Entra ID & Zero Trust Suite
      • Quantum-Safe Cryptography (QSC)
      • Security Risk Assessment, Quantification & Mitigation
      • OpenSSH by SSH
      • Device trust & access and identity verification
      • Identity-based authentication & converged IAM and PAM
    • TOPICS
      • Just-in-Time Access
      • Secure vendor access
      • Credentials & Secrets Management
      • Hybrid & Multi-Cloud Access Management
      • Interactive tour: Privileged Access in the Cloud
      • M2M Connections Management
      • IT Audits & Compliance
      • Secure File Transfer
    • INDUSTRIES
      • Managed Service Providers (MSP)
      • Operational Technology (OT)
      • Federal Government Security
      • Healthcare Data Security
  • OT Security
    • IT/OT convergence of data & systems
    • Zero Trust Access and ZSP
    • Workflow approvals
    • Secure remote access 
    • Secure patch management 
    • OT Compliance
    • Discovery and threat intelligence
    • Phishing-resistant MFA & device trust
  • Products
    • SalaX SECURE COLLABORATION
      • Secure Mail
      • Secure Messaging
      • Secure Sign
      • SalaX Secure Collaboration
    • SECURE ACCESS & SECRETS MANAGEMENT
      • PrivX™ PAM3
      • PrivX™ OT Edition
      • PrivX Key Manager
    • SECURE FILE TRANSFER & ENCRYPTION
      • Tectia™ SSH Client/Server
      • Tectia™ SSH Server for IBM z/OS
      • NQX™ quantum-safe encryption
  • Services
    • SSH Risk Assessment™
    • Professional Services
    • Support
    • Contact us
  • Customer cases
    • PrivX Zero Trust PAM
    • Enterprise Key Management UKM
    • Tectia SFTP for servers & mainframes
    • SSH Secure Collaboration
  • Resources
    • SSH Academy
    • Content library
    • Blog
    • References
    • Press releases
    • Downloads
    • Manuals
    • Events & Webinars
    • Media
    • Legal
    • Report a vulnerability
  • Solutions
    • SOLUTIONS
      • PrivX Zero Trust Suite
      • SalaX Secure Collaboration
      • Strong ID-based access with Entra ID & Zero Trust Suite
      • Quantum-Safe Cryptography (QSC)
      • Security Risk Assessment, Quantification & Mitigation
      • OpenSSH by SSH
      • Device trust & access and identity verification
      • Identity-based authentication & converged IAM and PAM
    • TOPICS
      • Just-in-Time Access
      • Secure vendor access
      • Credentials & Secrets Management
      • Hybrid & Multi-Cloud Access Management
      • Interactive tour: Privileged Access in the Cloud
      • M2M Connections Management
      • IT Audits & Compliance
      • Secure File Transfer
    • INDUSTRIES
      • Managed Service Providers (MSP)
      • Operational Technology (OT)
      • Federal Government Security
      • Healthcare Data Security
  • OT Security
    • IT/OT convergence of data & systems
    • Zero Trust Access and ZSP
    • Workflow approvals
    • Secure remote access 
    • Secure patch management 
    • OT Compliance
    • Discovery and threat intelligence
    • Phishing-resistant MFA & device trust
  • Products
    • SalaX SECURE COLLABORATION
      • Secure Mail
      • Secure Messaging
      • Secure Sign
      • SalaX Secure Collaboration
    • SECURE ACCESS & SECRETS MANAGEMENT
      • PrivX™ PAM3
      • PrivX™ OT Edition
      • PrivX Key Manager
    • SECURE FILE TRANSFER & ENCRYPTION
      • Tectia™ SSH Client/Server
      • Tectia™ SSH Server for IBM z/OS
      • NQX™ quantum-safe encryption
  • Services
    • SSH Risk Assessment™
    • Professional Services
    • Support
    • Contact us
  • Customer cases
    • PrivX Zero Trust PAM
    • Enterprise Key Management UKM
    • Tectia SFTP for servers & mainframes
    • SSH Secure Collaboration
  • Resources
    • SSH Academy
    • Content library
    • Blog
    • References
    • Press releases
    • Downloads
    • Manuals
    • Events & Webinars
    • Media
    • Legal
    • Report a vulnerability
  • About us
  • Investors
  • Partners
  • Careers
Request demo

About us

Strategy History People Awards Patents Analysts Press Blog

SSH IP, patents and licensing program

Checklist

Patents protect the unique features and technologies of our products and give us significant competitive differentiation

Shield

Patents ensure our freedom to operate and give us leverage against potential litigation and competition

Finance

Patent licensing can help us monetize our innovations and is a potential source of revenue and shareholder value

Investing in IP since 1997

A Deep Portfolio

We take pride in our deep patent portfolio that has been developed since 1997. SSH has over 50 significant patents and dozens of applications pending.

In addition to the patents, we protect our key  intellectual property with trademarks, copyrights, and other available means.

Shield
Fundamental Security

IP Security

SSH was a key contributor in the development of the IPSec (IP Security) protocol, and patents used in IPSec solutions. IPSec is a central part of VPN and firewall solutions connecting home users to offices, the increasingly popular IPv6 Internet protocol and cellular systems, making the SSH patent portfolio valuable in related industries. IPSec is also used in DSL modems, mobile phones, and telecommunications infrastructure.

Secure-file-transfer
Better network protection

Firewall IP

Active in the early development of NAT Traversal technologies, SSH has several pending patents for its NQX products in relation to the implementation of high-performance firewalls and line encryption solutions. Firewall technology is rapidly changing due to new hardware and software architectures that enable faster, more flexible, and more secure processing and modern web-based user interfaces.

Priviledged-access-management
Keeping keys in order

SSH Key Management

SSH has an extensive and unrivaled portfolio of issued and pending patents related to SSH key management. Many of the applications have a 2011-2012 priority date. They cover almost all aspects of SSH key management and underpin our class-leading software. 

Healthcare
Into the new frontier

Cloud security and DevOps

SSH has a number of patents and pending patent applications that it expects to become fundamental in the areas of cloud secrets management, cloud access management, cloud access security brokers (CASB), and the management of SSH keys and other credentials in the cloud.

Checklist
Monitoring encrypted traffic

SSH monitoring & control

SSH has several pending and issued patents related to monitoring, recording, display, and policy enforcement of encrypted sessions, including through firewalls. These inventions are central for high-performance Privileged Access Management solutions.

Success
Goodbye to passwords

Ephemeral Access

SSH has several issued and pending patents on secure passwordless access and other key technologies related to its PrivX Privileged Access Management solution. These inventions remove the need for permanent privileged credentials or passwords altogether, helping customers implement a zero standing privileges (ZSP) strategy through a just-in-time (JIT) model.

IP Licensing

We license our IP to qualified companies on competitive terms. For further information about our licensing program, please get in touch with us.
 
Inquire about patent licensing

We at SSH secure communications between systems, automated applications, and people. We strive to build future-proof and safe communications for businesses and organizations to grow safely in the digital world.

  • Solutions
    • Zero Trust Suite
    • Zero Trust Suite & Entra ID Integration
    • Quantum-Safe Cryptography (QSC)
    • SalaX Secure Collaboration
    • Security Risk Mitigation
    • OT security
    • MSP Security
    • Device Trust
    • Monitoring & Threat Intelligence
    • Credentials & Secrets Management
    • IT Audits & Compliance
  • Products
    • PrivX™ Hybrid PAM
    • PrivX Key Manager
    • Tectia SSH Client/Server™
    • Tectia™ z/OS
    • Secure Messaging
    • Secure Mail
    • Secure Sign
    • NQX™ Quantum-Safe
  • Services
    • SSH Risk Assessment™
    • Professional Services
    • Support
  • Resources
    • Careers
    • References
    • Downloads
    • Manuals
    • Events & Webinars
    • Blog
  • Company
    • About us
    • Contact
    • Investors
    • Partners
    • Press

Stay on top of the latest in cybersecurity

Be the first to know about SSH’s new solutions, product updates, new features, and other SSH news!

Thanks for submitting the form.

© Copyright SSH • 2024 • Legal