Profile

Cover photo
SSH Communications Security
74 followers|22,021 views
AboutPostsPhotosYouTube

Stream

 
Inventor of SSH protocol Tatu Ylönen is featured in eWeek. He is frustrated for a good reason. Read more!
http://bit.ly/2gEQctk
1
Add a comment...
 
Watch Tatu’s in-person video interview on CRN TV about SSH, IAM, key management and channel opportunities.
http://bit.ly/2f84pwr
SSH keys, the means of securing identification on a server through public-key cryptography, has remained largely "under the radar for many years," according to SSH Communications Security CEO Tatu Ylonen, but he said increased awareness in compliance and security across various verticals present ...
1
Add a comment...
 
Not too late to join, webinar in 1,5 hous! "Digital Transformation - from Mainframes to Microservices infosec" http://bit.ly/2fWr2IQ
1
Add a comment...
 
CIO REVIEW: Avoid Non-Compliance by Getting Your SSH Keys under Control.
http://bit.ly/2fpFrx2 
1
Add a comment...
 
How does Fukuoka Hibiki Shinkin Bank in Japan control privileged users? Read the latest case study. http://bit.ly/2eF8pZi


1
Add a comment...
 
Watch interview with Fouad Khalil, Compliance Director: review of SSH's participation to the the PCI Community Meeting in Edinburgh, Scotland, October 18-20, 2016.
http://ssh.fi/2enaavQ
1
Add a comment...
 
SSH Cryptonaut - the new SSH client available for download. Latest, greatest, and FREE. From the original inventors of the protocol. No more unprotected logins or file transfers.
http://bit.ly/2fx2673
1
Add a comment...
 
Tatu writes about "Finns - the masters of risk management". See you at Cloud Security Expo in Frankfurt!
http://bit.ly/2eW1iwo
Blog / 18.11.2016 Finns the masters of risk management Tatu Ylönen, Founder & CEO, SSH...
1
Add a comment...
 
Bullseye on a Moving Target - Access Control on the Fly for DevOps!
Join our webinar on November 22 or 29, where you will learn:

1. How DevOps has changed service development and delivery
2. How DevOps highlights the problem of accurate access control
3. How addressing your access control effectively is the heart of your DevOps security

http://bit.ly/2fnMjav

http://bit.ly/2eNhXSS

1
Add a comment...
 
Hear it from the Source - Trusted Access in Digital Transformation. Webinar on Nov 16. Register now!
http://bit.ly/2fGKOUz
1
Add a comment...
 
The hidden danger threatening your compliance profile. Read more from IT Briefcase: http://bit.ly/2fioapC
1
Add a comment...
 
SSH discuss key management and monitoring of encrypted networks at PCI EU Community Meeting, in Edinburgh today! Auditors and QSAs gather to discuss the new PCI DSS 3.2 compliance and how SSH can help. 
1
Add a comment...
Story
Tagline
The inventors of the SSH protocol
Introduction
#TRUSTEDACCESS
Contact Information
Contact info
Email