<iframe src="//www.googletagmanager.com/ns.html?id=GTM-TR8PWW" height="0" width="0" style="display:none;visibility:hidden">
  • 45

    Anatomy of a Cyber Security Breach and The Second Law of Thermodynamics

    Continue Reading

     

  • 27

    Financial Security Crisis Looming in 2018...The Perfect Storm is Coming

    Continue Reading

     

Stay up to date

cryptoauditor, universal ssh key manager, Smart Nation, MAS, third-party

Third-Party Access Management Fuels SSH Expansion in Southeast Asia
By Tommi Lampila on April 28, 2016

INTRODUCTION: The growing demand for our CryptoAuditor and Universal SSH Key Manager solutions prompted us to expand our footprint in Asia by opening an office in Singapore early this...

Continue Reading

cryptoauditor, privileged identity management, encrypted channel monitoring, Cloud Security, Privileged access management, PAM, encrypted traffic monitoring, third-party

Cloud Users and Providers’ Security Needs?
By Ricky Ho on March 23, 2016

Cloud adoption is gaining momentum in Hong Kong, driven by both the governmental and private sectors. The rapidly growing cloud adoption does however pose some security concerns. How to,...

Continue Reading

cryptoauditor, privileged identity management, encrypted channel monitoring, Cloud Security, Privileged access management, PAM, encrypted traffic monitoring, third-party

“Trust is good, but control is better” –  Thoughts concerning third-party privileged access in the cloud
By Rasa Siegberg on March 2, 2016

Internet sources cite Vladimir I. Lenin as the origin of the quote in the title. My history knowledge is not deep enough to tell what was the context of the utterance but I am rather...

Continue Reading

cryptoauditor, key management, privileged identity management, identity and access management, encrypted channel monitoring, universal ssh key manager, encrypted channels, Privileged access management, PAM

Shared Account Password and Key Management – Is There an Easier Way?
By Jussi Valkiainen on January 4, 2016

This blog is a continuation of my earlier blog “Plug and Play or Plug and Pain” on Privileged Access Management (PAM), posted on December 16, 2015. I will dive a bit deeper now into the...

Continue Reading

cryptoauditor, privileged identity management, encrypted channel monitoring, AWS, DLP, encrypted channels, Privileged access management, PAM, encrypted traffic monitoring

Plug and Play or Plug and Pain? How to Manage Privileged Access Effectively without Pain?
By Jussi Valkiainen on December 16, 2015

So you have a problem with privileged access? Whether it is your own employees accessing critical production systems on a daily basis, or third-party system vendors who need occasional...

Continue Reading

cryptoauditor, universal ssh key manager, APAC, Smart Nation, Smart City

Moving in the Right Direction in Secure Smart Nation and Cities
By Tommi Lampila on November 16, 2015

In October, SSH Communications Security joined two conferences in Singapore: GovernmentWare and Cloud Expo Asia. The hot topics at both events were around Smart Nation, aligning with...

Continue Reading

cryptoauditor, encrypted traffic monitoring, VCE, VCE Vblock System, Vblock System

How to Further Enhance Security Monitoring of Your Vblock System
By Matthew McKenna on October 15, 2015

Security is a major focus point at VCE. Every Vblock™ System shipped contains built-in security features. Now that security is even further bolstered with a tested and validated, Vblock™...

Continue Reading

cryptoauditor, encrypted channel monitoring, compliance, iam, transparency

Administrator Session Auditing for the VCE Vblock System
By Sami Pippuri on September 1, 2015

You may have heard that CryptoAuditor is now certified as VCE Vblock Ready. Here's what it means in a nutshell:

Continue Reading

cryptoauditor, trusted access, Amazon Web Services, AWS, Cloud Security, Privileged access management, PAM, APAC

PAM in the Cloud Made Easy
By Tommi Lampila on August 25, 2015

Cloud computing in Asia Pacific is growing constantly in importance, increasing demand for cloud security. In mid-August, we participated in CloudSec Hong Kong, one of the leading cloud...

Continue Reading

cryptoauditor, encryption, AWS, Cloud Security

Auditing Access Control for Amazon Web Services EC2 in less than 15 minutes
By Sami Pippuri on August 24, 2015

What is CryptoAuditor? Modern IT systems are run by third parties – contractors, SaaS and IaaS providers, external administrator companies – to enable businesses to focus on creating...

Continue Reading