Welcome!

News Feed Item

SSH Communications Security Shortlisted for 2014 SC Magazine Awards Europe

HELSINKI and WALTHAM, Massachusetts, March 18, 2014 /PRNewswire/ -- SSH Communications Security, known the world over as the inventor of the ubiquitous Secure Shell and SFTP protocols and Secure Shell key management solutions, today announced that two of its solutions have been shortlisted for the prestigious 2014 SC Magazine Awards Europe in the following categories:

  • Best Encryption Solution for CryptoAuditor™
  • Best Identity Solution for Universal SSH Key Manager™

KEY FACTS:

  • CryptoAuditor is an advanced content-aware access management solution that monitors, records and controls encrypted SSH, SFTP and RDP traffic and enables layered defenses such as DLP, IPS and SIEMs to detect threats and malicious activities within encrypted channels.
    • A lack of encrypted channel monitoring and privileged identity management has led to recent high profile breaches where attackers were able to access critical information assets and exfiltrate data without detection.
    • CryptoAuditor stops data loss by providing visibility and control within encrypted channels while enforcing policy at the network level concerning what identities are authorized to do within the environment.
  • Universal SSH Key Manager is the only full-lifecycle access control solution on the market that automates the discovery, management, monitoring, remediation and reporting of Secure Shell environments.
    • The typical Fortune 500 organization has over 1 million Secure Shell user keys that grant access to mission critical information and systems, yet most C-level executives, IT security, risk management and audit professionals are unaware of the size and scope of the risk.
    • Universal SSH Key Manager reduces the security risks and addresses compliance issues related to unmanaged access to IT resources via Secure Shell.
    • SSH Communications Security has managed the world's largest key remediation projects, helping organizations reduce risk and meet compliance mandates.

SUPPORTING QUOTE:
Tatu Ylonen, CEO and founder of SSH Communications Security, said:
"Advanced persistent threats – including the recently-uncovered "Mask" (a.k.a. Careto) malware – demonstrate how attackers are increasingly using lost or stolen Secure Shell authentication keys to gain access to critical systems. When coupled with the fact that most organizations don't effectively monitor their encrypted channels for malicious activities, the risk associated with unmanaged and unmonitored environments is unacceptable. We designed CryptoAuditor and Universal SSH Key Manager to provide organizations with full insight into – and control over – their Secure Shell environments in order to improve compliance and security. We are proud to have our technology recognized by the 2014 SC Magazine Awards Europe."

RESOURCES:

About SSH Communications Security
Founded in 1995, SSH Communications Security is the company that invented the SSH protocol - the gold standard protocol for data-in-transit security solutions. Today, over 3,000 customers across the globe - including seven of the Fortune 10 - trust our Security and Access Management Platform to secure the path to their information assets. We enable and enhance business for thousands of customers in multiple industries in the private and public sectors around the world. A fast-growing company, SSH Communications Security operates in the Americas, Europe, and APAC regions, with headquarters located in Helsinki, Finland. The company's shares (SSH1V) are quoted on the NASDAQ OMX Helsinki. 

For more information on SSH Communications Security please visit http://www.ssh.com



Corporate Contact:

Jason Thompson

SSH Communications Security

+1-206-617-7701

[email protected]


Media Contact: Peggy Tierney Galvin

Nadel Phelan, Inc.
+1-831-440-2405
[email protected]

 

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
CenturyLink has announced that application server solutions from GENBAND are now available as part of CenturyLink’s Networx contracts. The General Services Administration (GSA)’s Networx program includes the largest telecommunications contract vehicles ever awarded by the federal government. CenturyLink recently secured an extension through spring 2020 of its offerings available to federal government agencies via GSA’s Networx Universal and Enterprise contracts. GENBAND’s EXPERiUS™ Application...
"We've discovered that after shows 80% if leads that people get, 80% of the conversations end up on the show floor, meaning people forget about it, people forget who they talk to, people forget that there are actual business opportunities to be had here so we try to help out and keep the conversations going," explained Jeff Mesnik, Founder and President of ContentMX, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
SYS-CON Events announced today that Isomorphic Software will exhibit at DevOps Summit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Isomorphic Software provides the SmartClient HTML5/AJAX platform, the most advanced technology for building rich, cutting-edge enterprise web applications for desktop and mobile. SmartClient combines the productivity and performance of traditional desktop software with the simp...
"When you think about the data center today, there's constant evolution, The evolution of the data center and the needs of the consumer of technology change, and they change constantly," stated Matt Kalmenson, VP of Sales, Service and Cloud Providers at Veeam Software, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Redis is not only the fastest database, but it is the most popular among the new wave of databases running in containers. Redis speeds up just about every data interaction between your users or operational systems. In his session at 19th Cloud Expo, Dave Nielsen, Developer Advocate, Redis Labs, will share the functions and data structures used to solve everyday use cases that are driving Redis' popularity.
I wanted to gather all of my Internet of Things (IOT) blogs into a single blog (that I could later use with my University of San Francisco (USF) Big Data “MBA” course). However as I started to pull these blogs together, I realized that my IOT discussion lacked a vision; it lacked an end point towards which an organization could drive their IOT envisioning, proof of value, app dev, data engineering and data science efforts. And I think that the IOT end point is really quite simple…
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo Silicon Valley Call for Papers is now open.
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
To leverage Continuous Delivery, enterprises must consider impacts that span functional silos, as well as applications that touch older, slower moving components. Managing the many dependencies can cause slowdowns. See how to achieve continuous delivery in the enterprise.
WebRTC is bringing significant change to the communications landscape that will bridge the worlds of web and telephony, making the Internet the new standard for communications. Cloud9 took the road less traveled and used WebRTC to create a downloadable enterprise-grade communications platform that is changing the communication dynamic in the financial sector. In his session at @ThingsExpo, Leo Papadopoulos, CTO of Cloud9, discussed the importance of WebRTC and how it enables companies to focus...
"My role is working with customers, helping them go through this digital transformation. I spend a lot of time talking to banks, big industries, manufacturers working through how they are integrating and transforming their IT platforms and moving them forward," explained William Morrish, General Manager Product Sales at Interoute, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Up until last year, enterprises that were looking into cloud services usually undertook a long-term pilot with one of the large cloud providers, running test and dev workloads in the cloud. With cloud’s transition to mainstream adoption in 2015, and with enterprises migrating more and more workloads into the cloud and in between public and private environments, the single-provider approach must be revisited. In his session at 18th Cloud Expo, Yoav Mor, multi-cloud solution evangelist at Cloudy...
Aspose.Total for .NET is the most complete package of all file format APIs for .NET as offered by Aspose. It empowers developers to create, edit, render, print and convert between a wide range of popular document formats within any .NET, C#, ASP.NET and VB.NET applications. Aspose compiles all .NET APIs on a daily basis to ensure that it contains the most up to date versions of each of Aspose .NET APIs. If a new .NET API or a new version of existing APIs is released during the subscription peri...
Security, data privacy, reliability, and regulatory compliance are critical factors when evaluating whether to move business applications from in-house, client-hosted environments to a cloud platform. Quality assurance plays a vital role in ensuring that the appropriate level of risk assessment, verification, and validation takes place to ensure business continuity during the migration to a new cloud platform.