SSH Communications Security is the market leader in developing advanced security solutions that enable, monitor and manage encrypted networks.
In 1995, the company’s founder, Tatu Ylönen, invented the Secure Shell protocol, which soon became the gold standard for data-in-transit security. Today Secure Shell is one of the most widely used protocols in the world and SSH Communications Security has grown to serve over 3,000 customers around the globe.
Throughout our history, we have developed leading edge security solutions that enable organizations to protect against a rapidly growing threat landscape that includes both internal and external actors. Our platform based approach to Secure Shell deployment and management provides the only solution on the market that addresses the need for security, compliance and operational efficiency in today’s complex enterprise environments.
Universal SSH Key Manager
Your Secure Shell access management problems didn’t happen overnight. They have been growing for years.
If your enterprise is like many others, there are many more Secure Shell authorized keys that grant access to critical systems than there are employees – a lot more.
Find out who has access to what, map trust relationships and uncover old keys that should have been removed or replaced years ago.
Secure Shell provides secure login for remote systems administration and supports automated machine to machine functions that are the life blood of your business.
Daily backups, systems monitoring and sensitive file transfers are all often enabled by Secure Shell.
Universal SSH Key Manager gives you visibility into when and where all Secure Shell authorizations are taking place in your data center.
Leverage visibility to take corrective actions. Bring operations into compliance with your identity and access management policies.
Universal SSH Key Manager is a central management system for adding, removing and rotating Secure Shell identity and host keys.
It also gives you central control over Secure Shell software configurations – so you can be sure that this powerful protocol is used correctly within your environment.
Universal SSH Key Manager’s continuous monitoring and management capabilities keep your dynamic data center secure and compliant.
Universal SSH Key Manager enables efficient and accurate onboarding and offboarding of privileged users, contractors and machine to machine authorizations.
The central management and reporting saves time and money in performing daily tasks and in meeting the requirements of periodic compliance audits.
The challenge is straightforward: You need visibility into encrypted channels without disrupting how users go about their daily work and without compromising the security you depend on.
CryptoAuditor is an inline solution that preserves end to end security while silently decrypting and securely storing session traffic.
Centralized architecture and management support enterprise scale deployments without requiring changes to end user workflows, login processes or network architecture.
Keep a complete record of encrypted text, file transfer and graphical sessions.
Advanced search capabilities allow speedy investigation even of graphical oriented sessions.
CryptoAuditor is unique in that it provides advanced monitoring and privileged access management.
CryptoAuditor integrates with directory services, enabling privileged users, contractors and business partners to authenticate with their individual account credentials to gain controlled access to specific systems and services.
CryptoAuditor even controls what specific services are allowed within an Secure Shell connection.
Your layered security defenses have no visibility into SSH, SFTP and RDP traffic .
They can’t prevent these channels from being used as a vector for information theft or system attack.
CryptoAuditor empowers your SIEM, IPS and DLP to stop malicious activity on the fly and supports vital forensics in the less likely event your defenses are breached.
Tectia SSH Client / Server Family
Enterprises and government organizations around the world use Tectia SSH Client/Server to secure their most critical IT processes including ad hoc and automated file transfers as well as remote systems administration.
Tectia SSH offers the features, reliability and manageability that are simply not available with open source solutions.
Gain the assurance of deploying mature, commercial software backed by the support of the world’s experts in Secure Shell technology.
ConnectSecure is an advanced Tectia SSH Client that makes automation easy.
ConnectSecure is ideal for adding encryption to existing automated file transfer processes and makes it easy for your application developers to use encryption.
ConnectSecure is fully interoperable with open source Secure Shell and other standards compliant implementations – so no worries about connecting with business partners or within a heterogenous network.
Tectia SSH for IBM Mainframes
Mainframes are at the core of many high transaction, big data environments.
Unfortunately, many of the legacy mainframe applications that drive these large scale computing environments still use clear text FTP to move confidential data.
Tectia SSH for Mainframe transparently adds encryption without updating legacy applications, batch processes or JCL.
Tectia Mobile ID
Activate new users, partners and ad-hoc accounts in minutes compared to days or weeks.
With Tectia MobileID there are no tokens to manage and nothing to install on the user’s mobile phone.
Better yet, Tectia MobileID integrates seamlessly with user directories so you can quickly get up and running with your existing user profiles.
With no hardware to buy, maintain or replace Tectia MobileID can significantly lower your out of pocket expenses.
Because Tectia MobileID is compatible with any SMS enabled phone – something the user already has – there are no distribution and shipping costs.
In addition, with its streamlined setup and easy user deployment staff resources can be redirected to higher priority tasks.
Use it Anywhere
Wherever you need it, Tectia MobileID can be enabled to allow multiple authentication methods including hardware tokens, software tokens, e-mail and password lists.
The wide range of available methods allows strong authentication where mobile service is not available.
Works with Existing Infrastructure
Tectia MobileID works with existing business applications and services, such as VPNs, Juniper, F5, Citrix, Cisco, Checkpoint and web services and can be enable to work with new services with minimal changes to network architecture and user experience.