Access "SSHv2: Safe & Secure"
This article is part of the February 2005 issue of 12 security lessons for CISOs they don't teach you in security school
BITS & BOLTS The overhauled encryption protocol helps harden networks. SSH is a powerful suite of programs that enable enterprises to harness the power of encryption to protect data in transit. Some security managers shy away from encryption because it can be difficult and costly to implement. But SSHv2, a completely overhauled version of the protocol and often included free with Linux distributions, is a practical option that gives skilled practitioners a versatile tool to enhance confidentiality, integrity, authentication and nonrepudiation. SSH was created for two fundamental purposes: as a replacement for Telnet and as an encryption tunnel for protecting other protocols. This basic functionality can be leveraged to secure your network in many of the areas in which it's most vulnerable. SSHv2 is more secure and functional than the original protocol, although SSHv1 is still in widespread use. Applications like Telnet and FTP, which were fine for remote access and file transfers not that long ago, are now security nightmares. Authentication information, ... Access >>>
Premium Content for Free.
Secure Reads: The Network Security Bible
A review of the Network Security Bible by Eric Cole, Ronald Krutz and James W. Conley
Desktop Security: Senforce Portable Firewall Plus
Senforce's Senforce Portable Firewall Plus
Wireless security product review: AirTight Networks' SpectraGuard 2.0
A review of AirTight Networks' SpectraGuard 2.0
Database Security: Ingrian i211 DataSecure Platform
Ingrian Networks' Ingrian i211 DataSecure Platform
In MSSPs We Trust
Regulatory and cost-cutting pressures are forcing enterprises to reexamine the value of managed security services.
On the Job
12 lessons they don't teach you in security school about being a CISO.
- Secure Reads: The Network Security Bible
Recent Releases: Security product briefs, February 2005
Learn about the security products launched in February 2005.
IronPort C-Series Messaging Gateway: Antivirus, Antispam tool
Enhance your email security strategy with IronPort's C-Series Messaging Gateway. In this product review you will get information on cost, installation, reporting, configuration, and antivirus and antispam technology.
Hot Pick: Funk Software's Odyssey Client 3.03 and Odyssey Server 2.01
by Steven Weil, Contributor
Funk Software's Odyssey Client 3.03 and Odyssey Server 2.01
SSHv2: Safe & Secure
The overhauled encryption protocol helps harden networks.
Security: Measuring Up
by Pete Lindstrom, Contributor
Metrics are the key to measuring security. Learn how to gather data and calculate the answers you need.
- Recent Releases: Security product briefs, February 2005
Logoff: The battle against spyware
On the Radar
Perspectives: Symantec, Veritas pairing to change security
Symantec's merger with Veritas will change security managers' lives.
Editor's Desk: Nessus charges for signature updates
No Free Lunches
- Logoff: The battle against spyware
More Premium Content Accessible For Free
FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-ins is real. This guide to secure ...
As tablets and smartphones become more integrated into business environments, CISOs are scrambling to put effective countermeasures in place. But too...
This Technical Guide examines the necessary elements of, and how to implement, a sound mobile device management strategy. Devices will be lost...