Your Peace of Mind is our Commitment

Contact Us English Recent Articles

SSH Tectia® Certified With RSA Secured® Partner Program

First published: 30th September 2008

SSH Communications Security Corp., a world-leading provider of enterprise security solutions and end-to-end communications security, and the original developer of the Secure Shell protocol, today announced it has joined the RSA Secured® Partner Program and certified interoperability between the SSH Tectia Client/Server and SSH Tectia ConnectSecure™ from SSH Communications Security and both the RSA® SecurID and RSA® Certificate Manager solutions from RSA, The Security Division of EMC. SSH Communications Security believes that its enterprise customers will benefit from this interoperability partnership through enhanced data security, reduced deployment time and lower overall cost of ownership.

Together, SSH Tectia and RSA SecurID help to protect mission-critical file transfers and data-in-transit with two-factor authentication for secure access control and a more reliable chain of custody. RSA Certificate Manager is engineered to provide a scalable system that automates and centralizes the management of cryptographic keys and digital certificates.

“It is more critical than ever for companies to increase the security and integrity of their valuable information. In order to help our joint customers better protect their information, we are pleased to be working with SSH Communications Security to achieve interoperability between RSA technology and SSH Tectia Client/Server and SSH Tectia ConnectSecure,” said D.J. Long, senior director, Corporate Development at RSA. “Our organizations are committed to help mitigate risk to sensitive information throughout its lifecycle to ensure that it is always an asset, and not a liability, and allows organizations to accelerate their business objectives.”

SSH Tectia Client/Server is the de facto standard enterprise security solution used by millions worldwide for secure file transfers, system administration and application connectivity throughout the network. SSH Tectia provides transparent, strong encryption, flexible authentication options, direct support for all major industry platforms, and superior performance, without requiring modifications to the existing infrastructure or applications. It also helps organizations meet regulatory compliance requirements, including the Federal Information Processing Standards (FIPS) 140-2 certified cryptographic algorithm for use in U.S. federal government applications. In addition, the commercially supported SSH Tectia solution with SSH Tectia Manager helps enterprises achieve compliance with PCI DSS and other government regulatory requirements.

The award-winning SSH Tectia ConnectSecure enables organizations to quickly and cost-effectively secure any File Transfer Protocol (FTP) file transfer and data-in-transit without any modification to the existing infrastructure, scripts or applications, and is compatible with any commercial SSH or OpenSSH environment.

The SSH Tectia solution, which includes SSH Tectia Client, Server, Manager, ConnectSecure, and Server for IBM z/OS, allows enterprises to implement high-performance secure file transfers, secure application connectivity and secure system administration throughout heterogeneous networks. SSH Tectia ConnectSecure provides revolutionary features, including automatic FTP-to-SFTP conversion, transparent FTP, and TCP/IP application tunneling to quickly replace unsecure protocols with secure ones. SSH Tectia ConnectSecure significantly increases the number of enterprises, financial institutions, major retailers, and government agencies that can leverage its cost-saving benefits. “Many of the world’s largest enterprises and government agencies have come to rely on SSH Tectia to secure even their most sensitive company and consumer data,” said George Adams, CEO, SSH Communications Security, Inc. “By providing interoperability with leading digital certificate management and authentication solutions, we are offering joint customers an unmatched level of data security and an additional layer of powerful protection for key corporate assets.”