Your browser does not allow storing cookies. We recommend enabling them.

SSH Technology Alliance

In 1995, the company’s founder, Tatu Ylönen, invented the SSH protocol, which soon became the gold standard for data-in-transit security. Today SSH is one of the most widely used protocols in the world and SSH Communications Security has grown to serve over 3,000 customers around the globe.

Throughout our history, we have developed leading edge security solutions that enable organizations to protect against a rapidly growing threat landscape that includes both internal and external actors. Our platform based approach to SSH deployment and management provides the only solution on the market that addresses the need for security, compliance and operational efficiency in today’s complex enterprise environments.

CIOs and CISOs have asked vendors and SSH to collaborate and innovate to make the best and most cost effective platform available. SSH’s Technology Alliance Partners represent a wide array of solutions including authentication,security information and event management (SIEM), and Identity and Access Management (IAM). Both of SSH’s core products, Universal SSH Key Manager and CryptoAuditor, have a number of integration points that bring value to customers in a number of categories:

  • Security Information and Event Management (SIEM)
  • Identity and Access Management (IAM)
  • Malware Analytics
  • Security Management
  • Authentication
  • Hardware Security Module (HSM)
  • Directory Services

SSH Technology Alliance joint solutions bring to customers a wide range of certified technology integrations. Please contact to begin the conversation.

For further information, please call Andrew Hammond, VP of Business Development, at +1 781 247 2126 (office) or +1 617 817 3735 (cell). Email andrew.hammond at You can also request additional information by filling the form below.

Some Technology Partners

F5 Networks

F5 SSH Partner

F5 Networks is the global leader in Application Delivery Networking. F5 solutions help integrate disparate technologies to provide greater control of the infrastructure, improve application delivery and data management, and give users seamless, secure and accelerated access to applications from their corporate desktops and smart devices.

More information:


IBM SSH Partner

IBM operates one of the world's broadest security research and development organizations, comprising nine security operations centers, nine IBM Research centers, 11 software security development labs and three Institutes for Advanced Security. It employs thousands of security experts globally such as security operations analysts, consultants, sales and tech specialists and strategic outsourcing delivery professionals. countries and holds 3,000 security patents. IBM has been in the security business for nearly 50 years dating back to the security innovation in its mainframe systems.

More information:

Juniper Networks

Juniper SSH Partner

From devices to data centers, from consumers to the cloud, Juniper Networks delivers innovative software, silicon and systems that transform the experience and economics of networking. The company serves more than 30,000 customers and partners worldwide, and generated more than $3 billion in revenue over the last year.

More information:


Oracle SSH Partner

Oracle provides the world's most complete, open, and integrated business software and hardware systems, with more than 370,000 customers-including 100 of the Fortune 100-representing a variety of sizes and industries in more than 145 countries around the globe. Oracle's product strategy provides flexibility and choice to our customers across their IT infrastructure.

Tectia SSH Client/Server version 6.2.3. runs on the Oracle Linux 5.5 and later.

More information:

RSA Security

RSA Ready SSH Partner

RSA Security is the premier provider of intelligence-driven security solutions. RSA helps the world’s leading organizations solve their most complex and sensitive security challenges: managing organizational risk, safeguarding mobile access and collaboration, preventing online fraud, and defending against advanced threats. RSA delivers agile controls for identity assurance, fraud detection, and data protection; robust Security Analytics and industry-leading GRC capabilities; and expert consulting and advisory services.

More information:

Certified Security Solutions CSS

CSS Certified Security Solutions SSH Partner

CSS software and solutions simplify the design, deployment, monitoring, and management of trusted digital identities making authentication scalable, flexible, and affordable for the most demanding of enterprises.

CSS software and solutions enable digital authentication, encryption and signing technologies that safeguard access to identities, data, devices and applications. By protecting our clients’ most valuable resources, we help companies minimize risk, protect assets, and reduce operational expense by safeguarding access to information.

More information:




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now