SSH.COM Blog

cybersecurity PAM SSH

SSH.COM’s Customer Advisory Board 2021: Expert vie...

We had our 2021 Customer Advisory Board (CAB) event just a while ago. This year, the CAB was organized virtually and was attended by more than 30 customers from the EMEA region. The participants represented leading European organizations in financial services, manufacturing, IT services, and transportation, among others. The full-day event gave the attendees an opportunity to hear from industry ex...

PAM encrypted traffic SSH Zero Trust just-in-time

The Network Effect, Increasing Number of Critical ...

The Network Effect states the value of a telecommunications network is proportional to the square of the number of connected users of the system (N2). A decade in the naming, this law was a marketing tool to help 3Com sell more Ethernet cards (Token Ring was the IBM developed competitor at the time). It argued that the value of communications rises over time with the number of connections and henc...

PAM just-in-time remote work

Re-Thinking Privileged Access Management in the Ag...

SSH Research: Bad PAM tools lead to bad security habits. Why simpler security is safer.

PAM just-in-time remote work

KuppingerCole: SSH.COM one of the Leaders in Privi...

We are proud to be included in KuppingerCole’s "Leadership Compass 2020: Privileged Access Management" as one of the Overall Leaders. A direct quote from the report: “The PAM market is becoming more competitive and size alone will no longer keep vendors at the top. This is especially true in a period when vendors like SSH.COM can go from Challenger to Leader in one year due to a strong focus on te...

Gartner PAM just-in-time

Gartner: standing privileges in IT are a risk

How many years has the cybersecurity industry talked about “the password problem”? And how many years has the conclusion always been the same: passwords are one of the weakest links in the cybersecurity chain. They are always either too simple, stolen or lost. Or they become too complex to remember. But everybody has to use them. Right? Think again. We can’t claim to be able to eliminate all the p...

PAM Secure Shell governance

Malicious SSH client steals credentials masked as ...

Alert Logic researchers have discovered a malicious Secure Shell (SSH) client that uses Domain Name System (DNS) queries to transport Secure Shell login credentials which are stolen when an unsuspecting user provides them on the compromised client computer when connecting to Secure Shell servers. For more details on this malware, please visit Alert Logic’s page. 

PAM Secure Shell governance PAM bypass

5 ways to bypass PAM (Privileged Access Management...

So you have bought your expensive and extensive Privileged Access Management (PAM) solution. Controlling the access of users who deal with the most valuable information in your organization is generally a good idea. Now you are convinced that the access controls of your system administrators, database administrators, M2M connections and DevOps teams are securely in place. Unfortunately, we have ba...

PAM SSH.COM DevOps PrivX KuppingerCole

What does it take to be an innovator in the PAM ma...

For the past two years we have been working on something very different from the other vendors in the Privileged Access market. Behind this effort is our belief in thinking outside the box and solving customer issues traditional approaches have not been well suited for.

PAM multi-cloud RBAC

SLAM the door shut on traditional privileged acces...

Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?

encryption secure access identity and access management compliance trusted access cloud security encrypted channels PAM encrypted traffic 3rd party access SSH Key management WannaCry phishing breach SSH Keys risk management passwords credentialess financial services

Anatomy of a Cyber Security Breach and The Second ...

 

Author

Want to be the first to know about new blog posts?

Fill in you email address and be the first to know about it. 

Subscribe to Email Updates

SSH.COM is one of the most trusted brands in cyber security.

We help major enterprises solve the security challenges of digital transformation. We design best-of-breed commercial solutions for secure access that help our customers win in the global data economy.

Read more about our SSH.COM

Latest posts from the SSH.COM blog