Your browser does not allow storing cookies. We recommend enabling them.

SSH Communications Security Selected as Best Cloud Computing Security Finalist for SC Awards 2015 Europe


CryptoAuditor Honored for Bringing Privileged Access Management and Monitoring to Amazon EC2 Cloud Environments

HELSINKI and Waltham, Mass., May 26, 2015: SSH Communications Security today announced that ithas been selected as a finalist in the SC Awards 2015 Europe for outstanding threat solution products and services in information security. CryptoAuditor is recognized in the Best Cloud Computing Security category, which acknowledges superior products and services that help customers address the most pressing cybersecurity threats. For more information, visit:


  • PAM in the cloud: CryptoAuditor enables major enterprises, financial institutions, government agencies and cloud providers to take control of privileged access to their assets in the cloud, delivering distributed virtual appliance architecture and transparent monitoring capabilities.
  • Encrypted data monitoring: The solution can intercept, monitor, record and replay the content of the most common data-in-transit encryption protocols used in enterprise environments for interactive and automated sessions.
  • Data exfiltration prevention: CryptoAuditor helps prevent data loss across encrypted channel traffic with real-time, transparent audit capabilities for enterprises transmitting sensitive information to the cloud.
  • SC Awards: The Awards honor both the cybersecurity professionals working in the trenches, and the products and services that help protect today’s corporate world from a myriad of ever-changing threats.

Harri Koponen, CEO, SSH Communications Security, said: “ Enterprises, financial institutions and federal agencies are concerned about making the transition to cloud services, despite the obvious benefits in flexibility and reductions in cost. Malicious actors often use encrypted channels to hide theft of sensitive data from the network environment. We designed the latest version of CryptoAuditor to deploy into federal and commercial cloud environments to transparently monitor, audit and control encrypted channels throughout the application layer and OS-level cloud stack while minimizing the risks that arise from third-party access to server data. This gives organizations unprecedented transparency while ensuring that work flow is maintained in the cloud environment.”

Tony Morbin , editor in chief, SC Magazine UK , said: “SSH Communications Security’s solution represents some of the most innovative and effective security technology on the market today. As attackers develop and practice new approaches to compromising sensitive information, companies are challenged to keep pace. CryptoAuditor was nominated an SC Award finalist for its efforts to raise the bar for the security industry.”

About SSH Communications Security

As the inventor of the SSH protocol, we have a twenty-year history of leading the market in developing advanced security solutions that enable, monitor, and manage encrypted networks. Over 3,000 customers across the globe trust the company’s encryption, access control and encrypted channel monitoring solutions to meet complex compliance requirements, improve their security posture and save on operational costs. SSH Communications Security is headquartered in Helsinki and has offices in the Americas, Europe and Asia. The company’s shares (SSH1V) are quoted on the NASDAQ OMX Helsinki. For more information, visit




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now