Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia

Secure TCP/IP Connectivity

Many kinds of remote access tasks are performed over the Internet. In some cases, the transmitted data has no privacy requirements, for example when a user accesses a public Web service. However, an increasing number of remote access tasks involve the exchange of confidential data over unsecured TCP/IP networks. A typical remote access task where confidentiality of the data and authentication of the user are highly desired is business e-mail.

The core communication protocols used on the Internet do not natively provide confidentiality for data. Security services are thus deployed to protect the transmitted data from monitoring and modification by unauthorized parties. Security services eliminate many threats that exist on the Internet.


 

 
What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.



    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH



    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now