SSH.COM Blog

Blog

Subscribe to Email Updates

We promise to send you awesome stuff you'll want to read more than once.

Privileged Access Management SSH Key management ISACA insurance

SSH Industry Focus: Insurance Sector

Innovation and disruption are two sides of the same coin when describing the global insurance industry. Innovation in the form of digital transformation, new payment platforms, and mobility provide the basis for expansion by meeting evolving customer needs. Adoption of innovation also increases the complexity of your infrastructure and increases the need for managing risk proactively. Legacy infra...

Universal SSH Key Manager Privileged Access Management risk management Secure Shell governance

Universal SSH Key Manager® v. 2.3.0 – Mo’ Better K...

There are large numbers (even millions!) of unmanaged access credentials in practically every big enterprise network. Most of these credentials are SSH keys that are often self-provisioned by users. The lack of a central authority to oversee the process of issuing these credentials means there is no way to track credential lifecycles nor to ensure they are created according to policies and regulat...

Universal SSH Key Manager Privileged Access Management PrivX containers

SSH.COM goes containers!

Today, we announced new capabilities that will make it easy for enterprises and smaller companies alike to take further advantage of their Kubernetes container environments while staying secure. PrivX can be easily deployed and scaled as Docker containers on Kubernetes container platforms, while controlling privileged access to hosts running container operating systems. In addition, Universal SSH ...

compliance Privileged Access Management healthcare GDPR

Health careless - hospital in Portugal fined for n...

How would you feel if just about anybody could browse through your medical records if they felt like it? The chances are you’d be pretty upset. It wasn’t quite as this bad in Centro Hospitalar Barreiro Montijo, a hospital in Portugal, but it was close. Portugal’s supervisory authority, Comissão Nacional de Protecção de Dados, determined that the hospital violated three GDPR regulations. Let’s diss...

identity and access management partners Privileged Access Management ubisecure

Ubisecure and SSH.COM partner to bring a winning c...

SSH.COM and Ubisecure recently announced a partnership that extends the award-winning Ubisecure Identity Platform to privileged users via tight integration with SSH.COM’s PrivX lean privileged access management software.

identity and access management Privileged Access Management risk management Secure Shell governance

Is the board on board with who has access to missi...

As a board member, you’d be shocked to discover that one of your ex-employees still has access to the company email if she had left the company already a few months ago. You’d be even more shaken if you heard that the individual could also still access the company intranet.

identity and access management partners Privileged Access Management ForgeRock

SSH.COM and ForgeRock partner for identity-driven ...

"We are excited to work with ForgeRock to bring PrivX to an ever-widening audience." SSH.COM and ForgeRock® today announced a partnership designed to help organizations around the world to provide unified identity-driven, automated, role-based access controls for administrators, developers, DevOps teams, and third-party personnel.

Gartner identity and access management Privileged Access Management Fujitsu

We broke the IT security perimeter

Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so. A classic example is a highly-guarded military facility. In IT security, experts have spent decades building a security perimeter for a world where servers were mostly physical and the environment mostly static. Now the mandate from the bean counters is to open the perimete...

Privileged Access Management open source DevOps SSH hack

libssh vulnerability reminds us SSH is everywhere ...

TL;DR – A vulnerability was reported last week in the libssh open source library. We do not use libssh and are not responsible for it. It does not affect SSH.COM software, like Tectia SSH Server/Client. It does not affect OpenSSH as far as we understand. The vulnerability has been patched quickly. All libssh users are advised to upgrade to libssh 0.7.6 or 0.8.4 to eliminate the vulnerability. Find...

cybersecurity Privileged Identity Management identity and access management compliance Universal SSH Key Manager Snowden Privileged Access Management SSH.COM SSH Key management audit breach Equifax SSH Keys financial services Swift GDPR ISACA SSH

Financial Security Crisis Looming in 2018...The Pe...

"The wind and the waves are always on the side of the ablest navigator. -   Edmund Gibbon

Author

Want to be the first to know about new blog posts?

Fill in you email address and be the first to know about it. 

Subscribe to Email Updates

SSH.COM is one of the most trusted brands in cyber security.

We help major enterprises solve the security challenges of digital transformation. We design best-of-breed commercial solutions for secure access that help our customers win in the global data economy.

Read more about our SSH.COM

Latest posts from the SSH.COM blog