Overview

The origins of SSH Government Solutions go back to 1995 where we invented the Secure Shell protocol, which has become the gold standard for data-in-transit security. Today Secure Shell is one of the most widely used protocols in the world and provides SSH Government Solutions with the platform to be able to help manage and monitor privileged access to the networks for a majority of Federal agencies and protect their most critical data while in transit.

Throughout our history, we have developed leading edge security solutions that enable organizations across numerous sectors, including state and federal agencies, to protect against a rapidly growing threat landscape that includes both internal and external actors. Our platform-based approach to Secure Shell deployments and privileged access management provides the only solutions on the market that addresses the need for security, compliance and operational efficiency in today’s complex enterprise environments.

Products

  • CryptoAuditor™

    CryptoAuditor™:

    • Network-based, in-line virtual appliance that has the capability to control, monitor and audit encrypted sessions, 3rd party or privileged access, as well as file transfers.
    • Requires no agents to be deployed or access portals to go through, so it has no impact on end user experience or workflows. When coupled with IDS, IPS, DLP and AV solutions through ICAP, it allows you to control encrypted sessions running through SSH (SFTP), RDP or HTTPS.
    • Now also available in the AWS Marketplace!!
    Free Trial: http://www.ssh.com/products/crypto-auditor/aws

  • Universal SSH Key Manager™

    Universal SSH Key Manager™:

    • Allows organizations to discover and map SSH key based trust relationships for both interactive and machine to machine connections via an agentless or agent based approach as well as monitor how, when and from where those keys are being utilized.
    • Provides full capabilities around centralized SSH configuration management for environment lockdown as well as remediation and lifecycle management for key distribution, removals and rotation.
  • Tectia SSH Client/Server
    • Secure critical IT processes for file transfers and remote system administration
    • Add encryption to existing automated file transfer processes
    • Interoperable with open source Secure Shell and other standards compliant implementations
    • Support of IBM mainframes to add encryption without the need to update legacy applications.
    • Free ConnectSecure Trial: http://pages.ssh.com/ftp-to-sftp-converter.html

Contracts

GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- June 17, 2017


Resources

Many organizations use Secure Shell for privileged access to systems and data across the enterprise, yet few organizations have ever examined their deployments of Secure Shell for data breach risk and compliance exposures. Secure Shell HealthCheck is a security assessment service that delivers ...

ssh-logo.png
Datasheet
CryptoAuditor is a centrally managed inline or virtual appliance for auditing and reviewing encrypted data and monitoring privileged users’ activities in encrypted environments. It lowers security risks, increases resiliency and enables compliance.

In large and medium-sized enterprises, mainframes are still relied upon as the most trusted, secure repository for Big Data. Because the mainframe technology itself is a vault for core systems and databases, encryption of the connections coming to and from it needs to be emphasized as much as data...

As the inventors of the Secure Shell protocol, SSH Communica? ons Security is focused on helping IT organiza? ons secure the path to their informa? on assets. Our Universal SSH Key Manager is a mul? pla? orm, scalable solu? on that brings compliance and control to Secure Shell environments. Univer...