SSH Downloads

This page lists multiple options for downloading an SSH client or server to your system.

SSH is a multi-purpose protocol for secure system administration and file transfers. It is included in every Linux and Unix system.

Free Client - SSH Cryptonaut

We are the original inventors of the SSH protocol, and we feel that there should be no obstacles for secure logins.

SSH Cryptonaut

We offer our free Windows SSH client, SSH Cryptonaut, to be used for free - for any purpose.

Go to SSH Cryptonaut Download Page

Enterprise Client - Tectia SSH Client

Tectia SSH client is used by many enterprises for system administration and for running legacy text-based applications. It is the leading commercially supported SSH Windows Client on the market.

We provide our Tectia SSH customers technical support services on three different service levels. For more information of available support services, see our support pages.

Contact Our Sales - Buy Tectia SSH

Download Tectia SSH Client (Evaluation)

Enterprise SSH Server - Tectia SSH Server (Windows, Linux, Unix, zOS)

For business-critical applications, we recommend Tectia SSH. It is available for Windows, Unix, Linux, and IBM mainframes. It supports standards-compliant X.509 PKI, and smartcard authentication, including PIV and CAC cards and DoD PKI.

Tectia SSH shares no code base with the open source version, and it supports key management on all platforms. For premium customers we offer 24x7 support.

Contact Our Sales - Buy Tectia SSH Server

Download Tectia SSH Server Evaluation

Windows SSH Client Alternatives

The following clients are widely used:

Mac SSH Client Alternatives

Free SSH Servers

Most Linux systems come with open source OpenSSH preinstalled.

Security Alert

We have discovered that many organizations have massive numbers of SSH keys. These keys are authentication credentials and usually grant privileged command line access. Unmanaged SSH keys are a major risk and compliance violation. Read more

The SSH protocol also supports forwarding other applications over its encrypted connection. While helpful, this can be misused to open backdoors. Read more