Your browser does not allow storing cookies. We recommend enabling them.

Change of CEO at SSH Communications Security


Change of CEO at SSH Communications Security

Harri Koponen will start as a senior advisor of SSH and resigns from the role of CEO as of 17.2.2016. Koponen will concentrate in the future among other things on the firewall and governmental business in Finland and abroad, and will assist in sales in the Telecom sector. The majority shareholder of the company will propose Koponen to the Board of Directors of the company.

Tatu Ylönen will start as CEO 17.2.2016. Ylönen invented the SSH protocol and he has a long career at SSH Communications Security. Ylönen is the founder of the company and has previously worked as, e.g., Chief Operating Officer, Chief Innovation Officer and Chief Executive Officer of the company.

Chairman of the Board, Timo Syrjälä thanks Koponen for renewing the company strategy and opening new accounts. The co-operation continues with Koponen’s new role in the company.

For additional information:

Tatu Ylönen CEO

Timo Syrjälä Chairman of the Board

tel. +358 20 500 7000

Distribution: NASDAQ OMX Helsinki Oy Major media

About SSH Communications Security SSH Communications Security is the market leader in developing advanced security solutions that enable, monitor and manage encrypted networks. Over 3,000 customers across the globe trust the company’s encryption, access control and encrypted channel monitoring solutions to meet complex compliance requirements, improve their security posture and save on operational costs. SSH Communications Security is headquartered in Helsinki and has offices in the Americas, Europe and Asia. The company’s shares (SSH1V) are quoted on the NASDAQ OMX Helsinki. For more information, visit .


Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more