Your browser does not allow storing cookies. We recommend enabling them.


Installation Packages

The installation packages of Tectia ConnectSecure are compressed into installation bundles. There are two bundles for each supported operating system, the commercial version (-comm) and the upgrade and evaluation version (-upgrd-eval). The evaluation versions can be used as upgrade packages, if you already have a suitable license.

Select the relevant Tectia ConnectSecure bundle:

  • For AIX platforms:

  • For HP-UX PA-RISC platforms:

  • For HP-UX Itanium platforms:

  • For Linux 32-bit platforms:

  • For Linux 64-bit platforms:

  • For Solaris SPARC platforms:

  • For Solaris x86-64 platforms:

  • For Windows platforms:


<version> indicates the product release and the current build number (for example

Inside the installation bundles are the actual installation packages for Tectia ConnectSecure. Select the packages to install according to which product features are relevant in your environment.

On Unix platforms (including Linux), Tectia ConnectSecure comes in six installation packages (<OS> indicates the operating system details):

  • ssh-tectia-common-<version>-<OS> package contains the common components of Tectia ConnectSecure and Tectia Server.

  • ssh-tectia-client-<version>-<OS> package contains the basic Secure Shell client components used by Tectia ConnectSecure.

  • ssh-tectia-capture-<version>-<OS> package contains the FTP-SFTP conversion components.

  • ssh-tectia-guisupport package contains the components reguired for the GUI available on Linux platforms.

  • ssh-tectia-sdk-<version>-<OS> package is a software development kit (SDK) that contains the file transfer APIs in C (on all platforms) and Java version 1.4.2 (on 32-bit Linux, Solaris SPARC, and 32-bit and 64-bit Windows).

On Windows, ssh-tectia-connectsecure-<version>-windows.msi includes all Tectia ConnectSecure software and the optional components including the sshg3.exe program, the FTP-SFTP conversion, and the SDK. The installed components can be selected during the installation phase.


Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more