Secure Shell

VanDyke Software Releases VShell 4.5 (Official) Server with an HTTPS Enterprise Edition for Secure, Simple Web-Based File Transfer

Retrieved on: 
Tuesday, October 29, 2019

ALBUQUERQUE, N.M., Oct. 29, 2019 /PRNewswire/ -- VanDyke Software , a developer of multi-platform secure file transfer and secure terminal emulation software, announced today the official release of the VShell 4.5 server .

Key Points: 
  • ALBUQUERQUE, N.M., Oct. 29, 2019 /PRNewswire/ -- VanDyke Software , a developer of multi-platform secure file transfer and secure terminal emulation software, announced today the official release of the VShell 4.5 server .
  • VShell 4.5 Enterprise Edition with HTTPS Provides a Secure, Simple Web Interface for Easy File Transfer with Windows, Linux, and Mac Servers
    "VShell Enterprise with HTTPS provides customers with a secure file transfer solution that doesn't require end users to install or learn a client-side application," said Danielle Argiro, Product Manager for VShell.
  • Busy IT professionals depend on VanDyke Software to deliver rock-solid, easy-to-configure software for secure remote access, secure file transfer, terminal emulation, and remote administration.
  • The company's product offerings include the SecureCRT Secure Shell terminal emulator, the SecureFX secure file transfer client, the VanDyke ClientPack , and the VShell Secure Shell server.

Aporeto to Present Informatica Case Study in AWS Partner Webinar

Retrieved on: 
Wednesday, October 9, 2019

Aporeto , a leader in Zero Trust Cloud Security, announced today an upcoming webinar titled Manage Secure Shell (SSH) Access with Time-Bound Certificates.

Key Points: 
  • Aporeto , a leader in Zero Trust Cloud Security, announced today an upcoming webinar titled Manage Secure Shell (SSH) Access with Time-Bound Certificates.
  • Taking place on October 15, 2019, at 10 a.m. Pacific Time, the webinar will explain how Informatica leveraged Aporeto to create secure, keyless SSH access for all its users.
  • The speakers are: Carmen Puccio, principal solutions architect, AWS; Ariful Huq, director of product management, Aporeto; and Alec Chattaway, director of cloud infrastructure operations, Informatica.
  • Read this case study to learn more about this deployment and find out how Informatica improved resiliency and reduced average downtime hours with Aporeto on AWS.

Sonatype Delivers First-of-Its-Kind Automated Malware Prevention For Open Source Libraries

Retrieved on: 
Tuesday, September 24, 2019

Over the past two years , more than 20 instances of adversaries intentionally publishing malicious components into public open source and container repositories were recorded.

Key Points: 
  • Over the past two years , more than 20 instances of adversaries intentionally publishing malicious components into public open source and container repositories were recorded.
  • Adversaries used these attacks to mine cryptocurrency, steal private ssh keys, insert backdoors, and even deliver targeted patches to alter proprietary code.
  • Open source project code impacted by the malicious injections have been difficult to detect because, on the surface, they look no different than other open source code contributions.
  • Weve been closely monitoring this new battlefront of cyber criminal attacks on software supply chains, said Brian Fox, CTO of Sonatype.

Odo Security Emerges from Stealth with Agentless Access Management Platform for Safe “Any Device to Any Resource” Connectivity

Retrieved on: 
Wednesday, September 18, 2019

Odo Security has developed an elegant approach that easily layers on top of existing infrastructure while providing users with a seamless and intuitive access experience.

Key Points: 
  • Odo Security has developed an elegant approach that easily layers on top of existing infrastructure while providing users with a seamless and intuitive access experience.
  • Unlike competing products that only support web access, Odo is unique in its ability to also support SSH, RDP and database access which is a game-changer for DevOps teams.
  • We like the fact that Odo Security allows us to control access to and within each resource, like giving some users write and others read-only privileges.
  • Granular access control over and within each resource, based on the dynamic and contextual assessment of user attributes and device state.

Venafi Survey: 82% of IT Security Professionals Don’t Trust Elected Officials to Enact Effective Security Regulation

Retrieved on: 
Thursday, September 5, 2019

According to the survey, 80% of security professionals agree that more security and privacy legislation is needed, especially for social media organizations that store personal data.

Key Points: 
  • According to the survey, 80% of security professionals agree that more security and privacy legislation is needed, especially for social media organizations that store personal data.
  • However, nearly the same number of respondents (82%) dont believe their elected officials understand cyber risks well enough to develop and enact effective security regulation.
  • Additional findings from the survey include:
    Ninety-three percent do not trust social media organizations to protect their personally identifiable information.
  • Venafi protects machine identity types by orchestrating cryptographic keys and digital certificates for SSL/TLS, IoT, code signing, mobile and SSH.

Venafi to Exhibit at Black Hat USA 2019

Retrieved on: 
Monday, August 5, 2019

Venafi is the cybersecurity market leader in machine identity protection, securing machine-to-machine connections and communications.

Key Points: 
  • Venafi is the cybersecurity market leader in machine identity protection, securing machine-to-machine connections and communications.
  • Venafi protects machine identity types by orchestrating cryptographic keys and digital certificates for SSL/TLS, code signing, IoT, code signing, mobile and SSH.
  • Venafi provides global visibility of machine identities and the risks associated with them for the extended enterprise on premises, mobile, virtual, cloud and IoT at machine speed and scale.
  • Venafi puts this intelligence into action with automated remediation that reduces the security and availability risks connected with weak or compromised machine identities while safeguarding the flow of information to trusted machines and preventing communication with machines that are not trusted.

SSH.COM Offers Access Management to Critical Assets Free of Charge

Retrieved on: 
Friday, June 7, 2019

Extra steps, bottlenecks and manual processes simply dont fit into that equation; its all about elasticity and automation.

Key Points: 
  • Extra steps, bottlenecks and manual processes simply dont fit into that equation; its all about elasticity and automation.
  • With PrivX, they get an access management solution that deploys in a matter of days, practically updates itself, provides monitoring of access traffic and delivers a simple user experience.
  • SSH.COMs PrivX offers just-in-time role-based access controls to multi-cloud and on-premises resources in development and production environments.
  • Access authorization is never permanent but is based on short-lived certificates that expire within a few minutes of establishing the RDP/SSH connection.

Venafi Gives Complimentary Doughnuts and Coffee to Federal Workers

Retrieved on: 
Wednesday, January 23, 2019

Blog: Government Shutdown Impacts More than Security.

Key Points: 
  • Blog: Government Shutdown Impacts More than Security.
  • Its Taking a Toll on Federal Employees
    Venafiis the cyber security market leader in machine identity protection, securing connections and communications between machines.
  • Venafi protects machine identity types by orchestrating cryptographic keys and digital certificates for SSL/TLS, IoT, mobile and SSH.
  • Venafi provides global visibility of machine identities and the risks associated with them for the extended enterpriseon premises, mobile, virtual, cloud and IoTat machine speed and scale.

Luminate Integrates With Demisto to Deliver Automated Cloud Access Management and Incident Response

Retrieved on: 
Tuesday, January 8, 2019

The bi-directional integration of Luminate's Secure Access Cloud and Demisto Enterprise solves these challenges and more.

Key Points: 
  • The bi-directional integration of Luminate's Secure Access Cloud and Demisto Enterprise solves these challenges and more.
  • It provides joint customers with cloud compliance enforcement and incident response across cloud and on-premise infrastructures.
  • Analysts receive incident data and unique SSH, RDP and HTTP access logs from Luminate within Demisto and trigger automated playbooks tied to those incidents.
  • Demisto enables security teams to reduce Mean Time to Response (MTTR), create consistent incident management processes, and increase analyst productivity.

New Partnerships and Customer Wins for SSH.COM

Retrieved on: 
Tuesday, December 4, 2018

LAS VEGAS, Dec. 4, 2018 /PRNewswire/ --(Gartner Identity & Access Management Summit Booth #224)--SSH Communications Security today announced that the new strategic partnerships and key customer wins announced recently highlight the strengthening position of the company in the cybersecurity market.

Key Points: 
  • LAS VEGAS, Dec. 4, 2018 /PRNewswire/ --(Gartner Identity & Access Management Summit Booth #224)--SSH Communications Security today announced that the new strategic partnerships and key customer wins announced recently highlight the strengthening position of the company in the cybersecurity market.
  • Partnership with Thales eSecurity enables the use of Thales's award-winning hardware security modules (HSMs) to secure UKM master keys for an added layer of security.
  • Partnerships with leading IAM, CIAM and IDaaS vendors including Fujitsu, ForgeRock and Ubisecure validate partner interest in the product and will help SSH reach a considerably wider audience with superior, seamless customer experience.
  • The customer wins validate the benefits of our products, and the new partnerships underline the strength of our portfolio and will help us widen our customer reach, driving our future success."