Your browser does not allow storing cookies. We recommend enabling them.

Tectia

Index

D

data integrity algorithms, Data Integrity Algorithms
DES, Glossary
digest, Glossary
digital signature, Glossary
Digital Signature Algorithm (DSA), Public-Key Algorithms
documentation, About This Document
DSA, Public-Key Algorithms, Glossary

E

encryption algorithms, Encryption Algorithms
entropy, Glossary

G

glossary, Glossary
GSSAPI, Glossary
GUI
remote management, Remote Management Console

K

key exchange, Glossary

P

passphrase, Glossary
password, Glossary
platforms, Supported Operating Systems
private key, Glossary
product specification, Product Specification
protocols, Supported Cryptographic Algorithms, Protocols, and Standards
public key, Glossary
public-key algorithms, Public-Key Algorithms

S

scalability, Scalable Solution for Multi-platform Environments
secure file transfer, Secure File Transfers
Secure File Transfer Protocol (SFTP), Glossary
Secure Hash Algorithm (SHA), Glossary
Secure Shell version 2 protocol (SSH2), Glossary
SHA-1, Data Integrity Algorithms
SSH2 protocol, Glossary
standard version, Unlimited and Standard Versions
standards, Supported Cryptographic Algorithms, Protocols, and Standards
supported algorithms, Supported Cryptographic Algorithms, Protocols, and Standards
supported operating systems, Supported Operating Systems
supported platforms, Supported Operating Systems
supported protocols, Supported Cryptographic Algorithms, Protocols, and Standards
supported standards, Supported Cryptographic Algorithms, Protocols, and Standards
symmetric session encryption algorithms, Encryption Algorithms

T

technical specifications, Product Specification
Tectia MFT Events, Introduction to Tectia MFT Events, Glossary
Tectia MFT Events components, Product Components
Tectia Server, Glossary
terms, Glossary
triple-DES, Glossary
Twofish, Encryption Algorithms

X

X.509 v2 CRL, Glossary
X.509 v3 certificate, Glossary


 

 
What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.



    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH



    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now