Profile

Cover photo
SSH Communications Security
65 followers|17,247 views
AboutPostsPhotosYouTube

Stream

 
Tatu Ylönen, the inventor of the SSH protocol, on stage at WHD! Watch the video at:
http://ssh.fi/1UWHwPh
1
Add a comment...
 
The inventor of the SSH protocol Tatu on stage in one hour at the World Hosting Days in Germany! 
1
Add a comment...
 
Navigate the uncharted waters of IAM by discovering how SSH user key based access plays a crucial role in your security and provisioning framework. http://ssh.fi/1QH5meN
1
Add a comment...
 
Read new article "When privileged access means controlling the lock: Best practices to protect what’s yours"
http://ssh.fi/21Ds7Up
1
Add a comment...
 
The Myth of SSH Key Rotation - Catch the 3rd installment of our MythCracker webcast series next Wednesday, February 24th at 3:00pm EST http://ssh.fi/1oGoajQ 
1
Add a comment...
 
Well-earned attention to SSH public key authentication by SC Magazine.
http://ssh.fi/1X55NR7

Combining with Universal SSH Key Manager paves a way towards compliance with SOX, FISMA, PCI, and HIPAA.
For more see: http://ssh.fi/1X55OEN
1
Add a comment...
Have them in circles
65 people
Ilyas Novruzlu's profile photo
Begundal Jaya's profile photo
vembri koprol's profile photo
jogja alus's profile photo
siew chui's profile photo
Cloud Lease's profile photo
a.kurniawan wanz's profile photo
Lou Sojak's profile photo
Geert Van Nieuwenborgh's profile photo
 
Cloud Users and Providers’ Security Needs? Check out our latest blog! http://ssh.fi/1Uk1Qu3 
SSH Communications Security has formed a strategic partnership with ReadySpace to empower secure cloud services by leveraging CryptoAuditor.
1
Add a comment...
 
SSH is participating at the Gartner Identity & Access Management Summit in London today and tomorrow. SSH user keys are in focus as the forgotten credentials in organization's IAM strategy. 
1
Add a comment...
 
“Trust is good, but control is better” – Thoughts concerning third-party privileged access in the cloud.

http://ssh.fi/1Qr0FCg #SSH
CryptoAuditor is an effective and non-intrusive solution for managing the third-party privileged access.
1
Add a comment...
 
Read article on InfoTech Spotlight: "Building Effective SSH User Key Management: Three Best Practices"
http://ssh.fi/1pkDmDE 
SSH user key and access management can create significant challenges. Organizations usually address them in one of several ways. They may treat SSH issues as an extension of a privileged access management project. They may use a cryptography team that is already managing certificates and other PKI-related issues, or they may treat the challenges as an aspect of their configuration management system processes.
1
Add a comment...
 
A mishap in key management makes headlines (again). http://ssh.fi/1QVFbzz

Preparation and prudent key management practices could have made the difference here. For more, see: http://ssh.fi/1QVF9I4
1
Add a comment...
 
NSA confirms system admin accounts as a preferred attack vector into corporate systems, highlighting the importance of proper privileged access management. Universal SSH Key Manager to the rescue! #privilegedaccess #keymanagement #infosec

http://ssh.fi/1mawPJk
1
Add a comment...
People
Have them in circles
65 people
Ilyas Novruzlu's profile photo
Begundal Jaya's profile photo
vembri koprol's profile photo
jogja alus's profile photo
siew chui's profile photo
Cloud Lease's profile photo
a.kurniawan wanz's profile photo
Lou Sojak's profile photo
Geert Van Nieuwenborgh's profile photo
Contact Information
Contact info
Email
Story
Tagline
The inventors of the SSH protocol
Introduction
#TRUSTEDACCESS