Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia

Secure Application Connectivity

SSH Tectia Client and Server can be used to replace any unsecured Telnet-based terminal connections to business-critical enterprise applications. Through strong encryption and data integrity, the SSH Tectia client/server solution protects sensitive data and passwords against unauthorized access, facilitating compliance with regulations and best practices. Strong authentication of users is supported through broad integration with third-party authentication systems, including RSA SecurID and PKI (public-key infrastructure).

SSH Tectia Server with Tunneling Expansion Pack, with the SSH Tectia Connector product in the client-side, allows transparent tunneling of TCP/IP-based applications without changing the end-user experience or requiring any application-specific modifications, thus reducing the total cost of ownership.

SSH Tectia Connector is a transparent end-user client that provides dynamic tunneling of client/server connections without the need to re-configure the tunneled applications. SSH Tectia Connector is started automatically when the user logs on to the Windows workstation. It works silently in the background, protecting network connections according to the security policies.

SSH Tectia Client can also be used for application protection using its static application tunneling features. By configuring an application to connect to a local port running SSH Tectia Client, the Client can be used to tunnel the application to a specified remote host.

For more information, see Secure Application Connectivity with Application Login and Secure Application Connectivity with Kerberos/GSSAPI.


Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more