Your browser does not allow storing cookies. We recommend enabling them.

Major Tech Company Selects SSH Communications Security’s CryptoAuditor to Prevent Data Loss


Solution Tapped to Protect IP From Insider Threats

HELSINKI and WALTHAM, MA, April 7, 2014 – SSH Communications Security, known the world over as the inventor of the ubiquitous secure shell and SFTP protocols, today announced that a prominent U.S. enterprise technology company has selected its CryptoAuditor solution to deliver inline, transparent monitoring of Secure Shell tunnels in order to prevent unauthorized transfer of high value intellectual property.

News Facts

  • Despite already having a privileged account identity and access management (IAM) solution in place, the customer chose CryptoAuditor to monitor encrypted Secure Shell connections to prevent theft of intellectual property by privileged insiders.
  • A lack of encrypted channel monitoring and privileged identity management has led to recent high profile breaches where attackers were able to access critical information assets and exfiltrate data without detection.
  • CryptoAuditor is an advanced content-aware access management solution that monitors, records and controls encrypted SSH, SFTP and RDP traffic. CryptoAuditor also brings visibility of encrypted communications to layered defenses such as DLP, IPS and SIEMs, enabling them to detect threats and stop malicious activities within encrypted channels.
  • CryptoAuditor addresses the critical need to monitor and control the channels of highly privileged access and communications.

Supporting Quote

Sami Ahvenniemi, CEO, Americas, SSH Communications Security, said:

“Enterprises are increasingly aware of the need to monitor and control in real-time the activities of highly privileged users. This is needed not only to address the threat of malicious insiders but also to prevent advanced persistent threats from using insider privileges to steal information. Conventional privileged identity management solutions don’t monitor or control SSH, SFTP and RDP channels. This is a serious gap given that these are the protocols of choice for privileged users. This major technology vendor came to us seeking visibility into and control over its Secure Shell-encrypted traffic to prevent theft of its most valuable intellectual property and ensure compliance.”

About SSH Communications Security

Founded in 1995, SSH Communications Security is the company that invented the SSH protocol - the gold standard protocol for data-in-transit security solutions. Today, over 3,000 customers across the globe - including seven of the Fortune 10 - trust our Information Assurance Platform to secure the path to their information assets. We enable and enhance business for thousands of customers in multiple industries in the private and public sectors around the world. A fast-growing company, SSH Communications Security operates in the Americas, Europe, and APAC regions, with headquarters located in Helsinki, Finland. The company’s shares (SSH1V) are quoted on the NASDAQ OMX Helsinki.




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now