Maximize the value
of your purchased products
A portfolio of services to cover your full deployment lifecycle
Consultancy for architecture & planning
Every customer is unique – you have your own organizational structure which may contain multiple businesses and stretch across several geographies. Different businesses have different cybersecurity risks to manage, as well as a unique existing ICT landscape that impacts your needs and requirements.
Our consulting services analyze your current situation and help you plan how different solutions are best deployed to your environment.
SSH Risk Assessment service & self-service
A large SSH key estate comes with a lot of compliance requirements. We can help you determine what security risks and vulnerabilities exist due to SSH keys in your IT environment and how you can meet your specific compliance requirements.
Systematic approach to deployment
SSH has a systematic, flexible approach to deployment. If you prefer our deployment team to manage the deployment for you, our solution architects will be the single point of contact for you and relevant third parties all the way.
If you would rather manage the deployment yourself or via your ICT partner, we provide on-the-spot deployment support to transfer needed competencies and for quality assurance prior to go-live.
Operational excellence & technical account management
SSH solutions are designed so you can do day-to-day management and administration independently. However, in today’s world, the only constant is change. That’s why our experts are here to help you to respond to any changes in your business requirements or environment.
We are also available to do health and performance analysis and provide prioritized recommendations, whenever needed.
Comprehensive training & certification
Our hands-on training offering equips your employees with the skills to work with our products and solutions. We have training courses for system administrators, architects, and where relevant, also for users. Training can be delivered remotely or on-site - your choice.
Separate training modules are available for Tectia, PrivX, Universal SSH Key Manager, and NQX.
We can also tailor training content to fit your specific needs. For example, to cover basic technologies such as the SSH protocol or Linux operating system.