Profile

Cover photo
SSH Communications Security
66 followers|17,670 views
AboutPostsPhotosYouTube

Stream

 
SSH: Finnish invention that changed the world. http://ssh.fi/21OcxVK
Finland is known as a modern, high-tech country. Here are some of the amazing tech innovations that are results of Finnish research.
1
Add a comment...
 
Tatu Ylönen, the inventor of the SSH protocol, on stage at WHD! Watch the video at:
http://ssh.fi/1UWHwPh
1
Add a comment...
 
The inventor of the SSH protocol Tatu on stage in one hour at the World Hosting Days in Germany! 
1
Add a comment...
 
Navigate the uncharted waters of IAM by discovering how SSH user key based access plays a crucial role in your security and provisioning framework. http://ssh.fi/1QH5meN
1
Add a comment...
 
Read new article "When privileged access means controlling the lock: Best practices to protect what’s yours"
http://ssh.fi/21Ds7Up
1
Add a comment...
 
The Myth of SSH Key Rotation - Catch the 3rd installment of our MythCracker webcast series next Wednesday, February 24th at 3:00pm EST http://ssh.fi/1oGoajQ 
1
Add a comment...
Have them in circles
66 people
Engineer Alaa's profile photo
Avinda Avinda's profile photo
a.kurniawan wanz's profile photo
Cloud Lease's profile photo
Aaron Daniel Vega Villa's profile photo
Carl Gutierr's profile photo
shrihari shastry's profile photo
Jukka Paulin's profile photo
Denny Andrianto's profile photo
 
CSA study points out the importance of managing keys and monitoring sessions to counter insider threats. Proper SSH Key Management completes a solid IAM Strategy.

http://ssh.fi/21DdcJB
1
Add a comment...
 
Cloud Users and Providers’ Security Needs? Check out our latest blog! http://ssh.fi/1Uk1Qu3 
SSH Communications Security has formed a strategic partnership with ReadySpace to empower secure cloud services by leveraging CryptoAuditor.
1
Add a comment...
 
SSH is participating at the Gartner Identity & Access Management Summit in London today and tomorrow. SSH user keys are in focus as the forgotten credentials in organization's IAM strategy. 
1
Add a comment...
 
“Trust is good, but control is better” – Thoughts concerning third-party privileged access in the cloud.

http://ssh.fi/1Qr0FCg #SSH
CryptoAuditor is an effective and non-intrusive solution for managing the third-party privileged access.
1
Add a comment...
 
Read article on InfoTech Spotlight: "Building Effective SSH User Key Management: Three Best Practices"
http://ssh.fi/1pkDmDE 
SSH user key and access management can create significant challenges. Organizations usually address them in one of several ways. They may treat SSH issues as an extension of a privileged access management project. They may use a cryptography team that is already managing certificates and other PKI-related issues, or they may treat the challenges as an aspect of their configuration management system processes.
1
Add a comment...
 
A mishap in key management makes headlines (again). http://ssh.fi/1QVFbzz

Preparation and prudent key management practices could have made the difference here. For more, see: http://ssh.fi/1QVF9I4
1
Add a comment...
People
Have them in circles
66 people
Engineer Alaa's profile photo
Avinda Avinda's profile photo
a.kurniawan wanz's profile photo
Cloud Lease's profile photo
Aaron Daniel Vega Villa's profile photo
Carl Gutierr's profile photo
shrihari shastry's profile photo
Jukka Paulin's profile photo
Denny Andrianto's profile photo
Contact Information
Contact info
Email
Story
Tagline
The inventors of the SSH protocol
Introduction
#TRUSTEDACCESS