Your browser does not allow storing cookies. We recommend enabling them.

SSH Communications Security Opens Singapore Office


Company Expands to Support Key Customers, Partners and Channel Business for SSH Key Management and Encrypted Channel Monitoring Solutions and Services in Southeast Asia

SINGAPORE, March 22, 2016 - SSH Communications Security today announced the opening of a new office in Singapore to support the company’s high growth trajectory in the region, particularly in the financial services industry. Led by regional director Danny Tan, who brings his experience in security solutions to SSH Communications Security from companies such as British Telecom and BeyondTrust, the team will focus on supporting the sales and services operations for current customers, partners and distributors.

SSH Communications Security has a 20-year history of creating critical security solutions for over 3,000 organizations worldwide.

  • Founded on innovation: The company’s founder, Tatu Ylönen, invented the Secure Shell (SSH) protocol, that quickly became the gold standard for data-in-transit security. Today SSH is one of the most widely used network security protocols in the world.

  • Securing customer assets: SSH access control solutions ensure the security of network environments by discovering and remediating SSH access related security issues, facilitating compliance with Singapore’s advanced security mandates such as the Monetary Authority of Singapore’s Technology Risk Management Guidelines to protect customer information from unauthorized access or disclosure.

  • Automated key management: The company’s Universal SSH Key Manager™ is the industry’s only comprehensive SSH access solution that automates the discovery, management, monitoring and reporting of SSH keys in the network environment, thereby saving time and money while significantly reducing risk. A recent integration with technology partner Certified Security Solutions (CSS) also provides enterprises with a comprehensive key and digital certificate management solution to simplify compliance reporting and meet risk governance requirements.

  • Encrypted traffic visibility: CryptoAuditor™ is a non-disruptive, scalable solution that allows visibility into encrypted network traffic both on premises and in the Cloud.

Matthew McKenna, chief strategy officer, SSH Communications Security, said:

“The challenges facing trusted access are global, but they are best served by a local, hands-on response. Creating a dedicated presence in Singapore, a major global financial hub, will be instrumental in supporting our customers in Southeast Asia. Aided by our partners and distributors, we will expand our efforts to provide improved SSH key management and encrypted traffic visibility and control solutions that are tailored for enterprises in this region.”

Danny Tan, regional director, Southeast Asia, SSH Communications Security, said:

“Our platform-based approach to SSH deployment and management provides the only solution on the market that addresses the need for security, compliance and operational efficiency in today’s complex enterprise environments. Expanding our services into Singapore allows us to bring focused and comprehensive local support to a central location that will also drive the surrounding emerging markets. I am excited to join the company to expand our growth in this region.”

About SSH Communications Security

As the inventor of the SSH protocol, we have a twenty-year history of leading the market in developing advanced security solutions that enable, monitor, and manage encrypted networks. Over 3,000 customers across the globe trust the company’s encryption, access control and encrypted channel monitoring solutions to meet complex compliance requirements, improve their security posture and save on operational costs. SSH Communications Security is headquartered in Helsinki and has offices in the Americas, Europe and Asia. The company’s shares (SSH1V) are quoted on the NASDAQ OMX Helsinki. For more information, visit


Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more