In October, SSH Communications Security joined two conferences in Singapore: GovernmentWare and Cloud Expo Asia. The hot topics at both events were around Smart Nation, aligning with cloud adoption. Singapore’s Smart Nation vision seeks to improve living, transport, healthcare, environment and business, as well as address growing urban challenges powered by ICT, networks and big data.
In 1995 the Secure Shell (SSH) protocol was invented and it soon became the gold standard for data-in-transit security. Today Secure Shell is one of the most widely used protocols in the world. In an effort to shed the light on SSH and to ensure organizations are aware of SSH key based access, Tatu Ylonen along with key leaders in the industry partnered with NIST to publish NISTIR 7966.
Security is a major focus point at VCE. Every Vblock™ System shipped contains built-in security features. Now that security is even further bolstered with a tested and validated, Vblock™ Ready solution from SSH Communications Security. In partnership VCE and SSH introduced a new degree of security hardening with checks and balances across the virtualized workload environment.Keep Reading
As with any compliance framework we face, and we know many exist today, it is best we assess our state of compliance before an auditor arrives at the proverbial door. PCI DSS is one framework many payment organizations are dealing with on a day to day basis to help protect and safeguard their customerspayment information.Keep Reading
This year, SSH Communications Security celebrate the 20th anniversary of the Secure Shell protocol, which was invented by our Chief Innovation Officer Tatu Ylönen. Our history makes us one of the pioneers of cybersecurity, but our innovative thinking keeps us in the forefront of the field.Keep Reading
Enterprises often have more Secure Shell identities than employees, and just as with employees, there must be a central management entity tasked with oversight of those identities.Keep Reading
You may have heard that CryptoAuditor is now certified as VCE Vblock Ready. Here's what it means in a nutshell:Keep Reading
Cloud computing in Asia Pacific is growing constantly in importance, increasing demand for cloud security. In mid-August, we participated in CloudSec Hong Kong, one of the leading cloud security conferences in Asia Pacific.Keep Reading
What is CryptoAuditor?
Modern IT systems are run by third parties – contractors, SaaS and IaaS providers, external administrator companies – to enable businesses to focus on creating value and getting new business, not having to worry about their infrastructure. Today, over 60% of enterprises have third parties accessing their networks remotely. This trust is sometimes exploited, in fact 95% of data breaches involve privileged credential misuse. Most of the time, CIOs have no idea what is going on in their network since trusted accounts can operate freely, under encrypted cover, like Tommi Lampila's recent post outlined.
CryptoAuditor is a robust, proven security infrastructure product that has traditionally been implemented as a virtual appliance running on premise. In July 2015, SSH Communications Security announced that CryptoAuditor is also available through the AWS Marketplace - as the only product of its kind in the world. Now you can deploy CryptoAuditor on premise into any VMWare or Hyper-V virtualized environment from a .iso image, as well as a readymade AMI right from the AWS Marketplace!Keep Reading