Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia

Secure System Administration

The SSH Tectia client/server solution is used by system administrators as a replacement for the unsecured login protocols, Rlogin, Telnet, and FTP. With the SSH Tectia client/server solution, the administrators can login to remote hosts securely, as their user ID and authentication information are transmitted in encrypted format over the network.

The SSH Tectia Client software is installed in the system administrator's workstation and the SSH Tectia Server software in the managed server. In such a configuration, the number of servers can be much higher than the number of client installations. In numerous active SSH Tectia implementations there are thousands of SSH Tectia Server instances installed within a corporate network.

With the SSH Tectia client/server solution, login can be easily done also in heterogeneous network environments including Windows, Unix, Linux, and IBM mainframe systems. This eliminates the need to deploy and maintain Secure Shell implementations from multiple vendors.




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now