<iframe src="//www.googletagmanager.com/ns.html?id=GTM-TR8PWW" height="0" width="0" style="display:none;visibility:hidden">

SSH Blog

Nov 20 2015

HIPAA/HITECH! Another Tidal Wave – Does Anyone Remember Sarbanes-Oxley (SOX-404)?

Keep Reading

Nov 16 2015

Moving in the Right Direction in Secure Smart Nation and Cities

In October, SSH Communications Security joined two conferences in Singapore: GovernmentWare and Cloud Expo Asia. The hot topics at both events were around Smart Nation, aligning with cloud adoption. Singapore’s Smart Nation vision seeks to improve living, transport, healthcare, environment and business, as well as address growing urban challenges powered by ICT, networks and big data.

Keep Reading

Nov 03 2015

IT'S OFFICIAL - Security for Secure Shell Is A NIST Publication (7966)!!

In 1995 the Secure Shell (SSH) protocol was invented and it soon became the gold standard for data-in-transit security.  Today Secure Shell is one of the most widely used protocols in the world.  In an effort to shed the light on SSH and to ensure organizations are aware of SSH key based access, Tatu Ylonen along with key leaders in the industry partnered with NIST to publish NISTIR 7966.


Keep Reading

Oct 16 2015

How to Further Enhance Security Monitoring of Your Vblock System

Security is a major focus point at VCE. Every Vblock™ System shipped contains built-in security features. Now that security is even further bolstered with a tested and validated, Vblock™ Ready solution from SSH Communications Security. In partnership VCE and SSH introduced a new degree of security hardening with checks and balances across the virtualized workload environment.  

Keep Reading

Sep 26 2015

Assess Your PCI Compliance Before a QSA does!

As with any compliance framework we face, and we know many exist today, it is best we assess our state of compliance before an auditor arrives at the proverbial door.  PCI DSS is one framework many payment organizations are dealing with on a day to day basis to help protect and safeguard their customerspayment information.

Keep Reading

Sep 18 2015

Year 2015 marks SSH's 20 years of hard work and success

This year, SSH Communications Security celebrate the 20th anniversary of the Secure Shell protocol, which was invented by our Chief Innovation Officer Tatu Ylönen. Our history makes us one of the pioneers of cybersecurity, but our innovative thinking keeps us in the forefront of the field.

Keep Reading

Sep 15 2015

Introducing the Universal SSH Key Manager appliance

Enterprises often have more Secure Shell identities than employees, and just as with employees, there must be a central management entity tasked with oversight of those identities.

Keep Reading

Sep 01 2015

Administrator Session Auditing for the VCE Vblock System

You may have heard that CryptoAuditor is now certified as VCE Vblock Ready. Here's what it means in a nutshell:

Keep Reading

Aug 25 2015

PAM in the Cloud Made Easy

Cloud computing in Asia Pacific is growing constantly in importance, increasing demand for cloud security. In mid-August, we participated in CloudSec Hong Kong, one of the leading cloud security conferences in Asia Pacific. 

Keep Reading

Aug 24 2015

Auditing Access Control for Amazon Web Services EC2 in less than 15 minutes

What is CryptoAuditor?

Modern IT systems are run by third parties – contractors, SaaS and IaaS providers, external administrator companies – to enable businesses to focus on creating value and getting new business, not having to worry about their infrastructure. Today, over 60% of enterprises have third parties accessing their networks remotely. This trust is sometimes exploited, in fact 95% of data breaches involve privileged credential misuse. Most of the time, CIOs have no idea what is going on in their network since trusted accounts can operate freely, under encrypted cover, like Tommi Lampila's recent post outlined.

CryptoAuditor is a robust, proven security infrastructure product that has traditionally been implemented as a virtual appliance running on premise. In July 2015, SSH Communications Security announced that CryptoAuditor is also available through the AWS Marketplace - as the only product of its kind in the world. Now you can deploy CryptoAuditor on premise into any VMWare or Hyper-V virtualized environment from a .iso image, as well as a readymade AMI right from the AWS Marketplace!

Keep Reading