<iframe src="//www.googletagmanager.com/ns.html?id=GTM-TR8PWW" height="0" width="0" style="display:none;visibility:hidden">

SSH.COM Blog

Blog

Subscribe to Email Updates

We promise to send you awesome stuff you'll want to read more than once.

April 28, 2016

Third-Party Access Management Fuels SSH Expansion ...

CryptoAuditor Universal SSH Key Manager

INTRODUCTION: The growing demand for our CryptoAuditor and Universal SSH Key Manager solutions prompted us to expand our footprint in Asia by opening an office in Singapore early this year. The Singap...

March 31, 2016

OCR Phase II Audit Has Launched - Time To Get Acce...

secure access compliance SSH Key management HIPAA healthcare audit

I recently attended the 24th National HIPAA summit in Washington, DC and had the opportunity to mingle and catch up with my compliance peers. I walked away realizing that the HIPAA/HITECH compliance t...

March 23, 2016

Cloud Users and Providers’ Security Needs?

CryptoAuditor Privileged Identity Management encrypted channel monitoring cloud security Privileged Access Management PAM encrypted traffic

Cloud adoption is gaining momentum in Hong Kong, driven by both the governmental and private sectors. The rapidly growing cloud adoption does however pose some security concerns. How to, for example, ...

March 15, 2016

How are regulators & governing bodies taking on cy...

cybersecurity NIST compliance Privileged Access Management

A Little Bit of History (2014 – Today)  You don’t have to go back very far to discover common trends occurring across information security areas in all industries and government agencies as they relat...

March 02, 2016

“Trust is good, but control is better” –  Thoughts...

CryptoAuditor Privileged Identity Management encrypted channel monitoring cloud security Privileged Access Management PAM encrypted traffic

Internet sources cite Vladimir I. Lenin as the origin of the quote in the title. My history knowledge is not deep enough to tell what was the context of the utterance but I am rather certain that the ...

January 04, 2016

Shared Account Password and Key Management – Is Th...

CryptoAuditor Privileged Identity Management identity and access management encrypted channel monitoring Universal SSH Key Manager encrypted channels Privileged Access Management PAM

This blog is a continuation of my earlier blog “Plug and Play or Plug and Pain” on Privileged Access Management (PAM), posted on December 16, 2015. I will dive a bit deeper now into the problem of sha...

December 16, 2015

Plug and Play or Plug and Pain? How to Manage Priv...

CryptoAuditor Privileged Identity Management encrypted channel monitoring AWS DLP encrypted channels Privileged Access Management PAM encrypted traffic

So you have a problem with privileged access? Whether it is your own employees accessing critical production systems on a daily basis, or third-party system vendors who need occasional access to maint...

November 20, 2015

HIPAA/HITECH! Another Tidal Wave – Does Anyone Rem...

compliance HIPAA

November 16, 2015

Moving in the Right Direction in Secure Smart Nati...

CryptoAuditor Universal SSH Key Manager smart cities

In October, SSH Communications Security joined two conferences in Singapore: GovernmentWare and Cloud Expo Asia. The hot topics at both events were around Smart Nation, aligning with cloud adoption. S...

November 03, 2015

IT'S OFFICIAL - Security for Secure Shell Is A NIS...

NIST compliance Universal SSH Key Manager trusted access Tatu Ylönen

In 1995 the Secure Shell (SSH) protocol was invented and it soon became the gold standard for data-in-transit security.  Today Secure Shell is one of the most widely used protocols in the world.  In a...

Book the demo

Author

OPT IN for our newsletter

To be honest, we don’t do much outbound marketing. So if you give us your email, we’re unlikely to spam you.

Subscribe to Email Updates

Want to know more about SSH.COM solutions?

We design best-of-breed commercial solutions for secure access that help our customers win in the global data economy.

Read more about our solutions

Related posts from the SSH.COM blog