<iframe src="//www.googletagmanager.com/ns.html?id=GTM-TR8PWW" height="0" width="0" style="display:none;visibility:hidden">

SSH.COM Blog

Blog

Subscribe to Email Updates

We promise to send you awesome stuff you'll want to read more than once.

November 21, 2017

Financial Security Crisis Looming in 2018...The Pe...

cybersecurity identity and access management Privileged Access Management compliance financial services breach SSH Keys SSH.COM Equifax Snowden Swift GDPR ISACA audit SSH SSH Key management Universal SSH Key Manager Privileged Identity Management

"The wind and the waves are always on the side of the ablest navigator. -   Edmund Gibbon

June 20, 2016

Catch Up with the Coming Evolution: SSH Key and Ce...

compliance Universal SSH Key Manager SSH Key management certificate management

In mid May, SSH Communications Security participated to the Cyber Security Summit, organized by the Hong Kong Applied Science and Technology Research Institute and the Hong Kong Police Force. During t...

April 28, 2016

Third-Party Access Management Fuels SSH Expansion ...

CryptoAuditor Universal SSH Key Manager

INTRODUCTION: The growing demand for our CryptoAuditor and Universal SSH Key Manager solutions prompted us to expand our footprint in Asia by opening an office in Singapore early this year. The Singap...

January 04, 2016

Shared Account Password and Key Management – Is Th...

CryptoAuditor Privileged Identity Management identity and access management encrypted channel monitoring Universal SSH Key Manager encrypted channels Privileged Access Management PAM

This blog is a continuation of my earlier blog “Plug and Play or Plug and Pain” on Privileged Access Management (PAM), posted on December 16, 2015. I will dive a bit deeper now into the problem of sha...

November 16, 2015

Moving in the Right Direction in Secure Smart Nati...

CryptoAuditor Universal SSH Key Manager smart cities

In October, SSH Communications Security joined two conferences in Singapore: GovernmentWare and Cloud Expo Asia. The hot topics at both events were around Smart Nation, aligning with cloud adoption. S...

November 03, 2015

IT'S OFFICIAL - Security for Secure Shell Is A NIS...

NIST compliance Universal SSH Key Manager trusted access Tatu Ylönen

In 1995 the Secure Shell (SSH) protocol was invented and it soon became the gold standard for data-in-transit security.  Today Secure Shell is one of the most widely used protocols in the world.  In a...

September 15, 2015

Introducing the Universal SSH Key Manager applianc...

UKM Universal SSH Key Manager

Enterprises often have more Secure Shell identities than employees, and just as with employees, there must be a central management entity tasked with oversight of those identities.

August 11, 2015

SSH at Interop Tokyo and Strengthening Our Foothol...

CryptoAuditor Privileged Identity Management identity and access management encrypted channel monitoring IAM Universal SSH Key Manager

Together with our local partner DIT, SSH Communications Security participated in one of the biggest IT exhibitions in Japan: Interop Tokyo. With close to 140,000 visitors in 3 days, DIT and SSH’s join...

June 02, 2015

You Control The Lock. The House Key Less So.

Universal SSH Key Manager

We’ve all been there: standing outside your home, you put your hand in your pocket, only to discover your house key is gone. Panic sets in.  Where is it? Did I leave it at work? Did it fall out? Did s...

September 07, 2014

Elliptic Curves and More: Universal SSH Key Manage...

UKM Universal SSH Key Manager

The latest version of Universal SSH Key Manager brings an important update: support for elliptic curve cryptography (ECC) keys. If you’re not familiar with ECC, suffice it to say that it’s an approach...

Book the demo

Author

OPT IN for our newsletter

To be honest, we don’t do much outbound marketing. So if you give us your email, we’re unlikely to spam you.

Subscribe to Email Updates

Want to know more about SSH.COM solutions?

We design best-of-breed commercial solutions for secure access that help our customers win in the global data economy.

Read more about our solutions

Related posts from the SSH.COM blog