Zero Trust: How to Strike the Balance
SSH.COM
by
2y ago
Picture this - have you ever been driving on a highway behind two cars that stay at the same slow speed, both refusing to accelerate or slow down even though it would benefit all those driving around them? Pretty frustrating, right? Now imagine one of the cars is the business operations team and the other is the security team of your business ..read more
Visit website
Access security: why PAM should come before IAM
SSH.COM
by
2y ago
Identity and Access Management (IAM) projects are all the rage at the moment. This is understandable, since digital ecosystems are expanding and the number of applications (like GSuite, Office 365 and Slack) just keeps on growing, so the consolidation of access to the applications from different sources under one roof increases security and productivity ..read more
Visit website
DevOps and secure access: 5 questions companies should ask themselves
SSH.COM
by
2y ago
“DevOps was a kind of revolution in IT because it focused on people and a change in culture to get things done as much as technology." - Paul Fisher, KuppingerCole Analysts, in KuppingerCole Privileged Access Management for DevOps Report. There are naturally many reasons why DevOps has gained popularity. But maybe what Paul Fisher stated above actually is one of the key reasons why the methodology was so well-received by companies and developers: it put the people first. And what do forward-thinking software developers appreciate? Probably: a high degree of automation minimal need fo ..read more
Visit website
MSPs and PAM for access: why it’s a WIN, WIN, WIN
SSH.COM
by David Wishart
3y ago
Managed Service Providers (MSP) are an important part of the growing IT ecosystem as more and more enterprises outsource parts or most of their infrastructure to MSPs ..read more
Visit website
Why the Manufacturing Industry Should Get Serious About Zero Trust and Just-in-time Access
SSH.COM
by Jaakko Sormunen
3y ago
Let’s face it – manufacturers, critical infrastructure operators and utility companies are experiencing an unprecedented volume of threats in the cyber domain. In addition to the proliferation of malware attacks and digital theft attempts, industrial operators need to deal with increasing pressure on operating costs and sustainability, regulatory scrutiny, and a heightened public awareness of cybersecurity. It’s no wonder that more and more companies have realized the importance of secure remote access to their site. After all, they are being accessed by internal admins, 3rd party technician ..read more
Visit website
SSH.COM’s Customer Advisory Board 2021: Expert views, user experiences & the future of Digital Keys
SSH.COM
by Jaakko Sormunen
3y ago
We had our 2021 Customer Advisory Board (CAB) event just a while ago. This year, the CAB was organized virtually and was attended by more than 30 customers from the EMEA region. The participants represented leading European organizations in financial services, manufacturing, IT services, and transportation, among others. The full-day event gave the attendees an opportunity to hear from industry experts and SSH.COM’s technology teams as well as share user experiences and feedback on solution implementation and best practices. Digital keys: needed but dangerous if left unmanaged Rami Raulas, He ..read more
Visit website
NQX-VPN-salain etenee kohti kvanttivalmiutta ja PQC-kvanttiprojekti palkittiin
SSH.COM
by Jorma Mellin
3y ago
Kvanttiteknologia ja sen kehittäminen ei ole ollut enää vähään aikaan pelkästään tulevaisuuden visio, vaan ihan tätä päivää osalle alan johtavista organisaatioista ja yrityksistä. Olemmekin sen vuoksi erityisen iloisia siitä, että kansallinen Post-Quantum Cryptography -hanke (PQC), jossa SSH.COM on yksi johtavista osallistujista, on palkittu Finnish Security Awards -tapahtuman vuoden 2020 tulevaisuustekona. PQC-hankkeessa tutkitaan ja kehitetään teknologioita, joiden avulla kriittinen tieto voidaan salata myös kvanttilaskennan myötä syntyvien uusien tietoturvauhkien maailmassa. Hankkeessa keh ..read more
Visit website
What does it take for a cybersecurity solution to exist for 25 years?
SSH.COM
by Jussi Rautio
3y ago
2020 is a special year in more ways than one. I don’t want to mention the ‘C-word’, since everyone knows it is what this year will be remembered for. Be that as it may, this year marks the 25th anniversary of an evergreen cybersecurity product. It’s a robust Secure File Transfer Protocol (SFTP) product for interactive and automated file transfers from the inventors of the Secure Shell (SSH) protocol – us at SSH.COM. Some of you probably already know which product we are talking about, but let’s reveal the hero at the end. In the meantime, let’s look at some of the reasons why this product has ..read more
Visit website
Immutable Infrastructure and admin access – how do they fit together?
SSH.COM
by
3y ago
TL;DR. Cloudification introduces a new level of abstraction to IT environments. One potential game changer is the concept of immutable infrastructure where resources, such as servers, services, or generic infrastructure deployments are not changed after they deployed but the entire setup is discarded and replaced with a new one when needed. What are the benefits and what is the impact of such environment to privileged access, or does the immutable paradigm eliminate the need for anyone to access the environment altogether ..read more
Visit website
Securing The Network Effect for Privileged Access Management
SSH.COM
by
3y ago
The Network Effect states the value of a telecommunications network is proportional to the square of the number of connected users of the system (N2). A decade in the naming, this law was a marketing tool to help 3Com sell more Ethernet cards (Token Ring was the IBM developed competitor at the time). It argued that the value of communications rises over time with the number of connections and hence the better affordability for an initial investment. George Gilder named this condition Metcalf's Law in 1993 and people have been arguing about it ever since ..read more
Visit website

Follow SSH.COM on FeedSpot

Continue with Google
Continue with Apple
OR