Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia

SSH Tectia Connector

SSH Tectia Connector (Windows only) protects the TCP/IP connections between two computers. The encryption of the connection is done on the application layer, which means that the security provided by SSH Tectia Connector is available regardless of the network connection speed or type. It is an ideal solution for providing transparent protection of business application traffic between corporate users' workstations and servers.

As invisible and centrally managed desktop software, SSH Tectia Connector can eliminate the need for end-user training and helpdesk costs, thus reducing the total cost of the security system ownership. SSH Tectia Connector can be used to secure transparently any TCP/IP-based applications such as enterprise resource planning (ERP) and customer relationship management (CRM) applications.

For more information on SSH Tectia Connector, see Tunneling with SSH Tectia Connector.


 

 
What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.



    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH



    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now