Tip

Secure remote access: SSH Tectia Manager

SSH Tectia Manager
SSH Communications Security
Price: Starts at $14,500

With its new central management solution, SSH is scaling up secure access for remote systems administration and proprietary e-commerce applications.

SSH products have long provided point-to-point access security based on the Secure Shell protocol. Until now, enterprise deployment -- using SSH or, alternatively, SSL -- has required considerable administrative and integration work for each point-to-point implementation, with inefficient update and configuration change management capabilities. SSH Tectia Manager makes SSH technology far more attractive as an enterprise-wide option.

    Requires Free Membership to View

More Information

Learn five ways to harden the network infrastructure.

View this presentation from Information Security Decisions and learn six strategies for building layered security in networks.

The agent-based Tectia Manager leverages SSH's new middleware, Tectia Connector, to provide multiplatform encrypted communications and authentication for client/server apps and secure remote administration. It provides automated distribution of public host keys. And, it supports strong, two-factor authentication through smart cards and hardware tokens, as well as PKI, using either Tectia Certifier or a third-party solution.

Each device requires SSH client or server software (also dubbed Tectia with their new releases), but these can now be centrally deployed, managed and updated. Through the management GUI, security managers can configure servers and workstations individually or through group assignments.

Tectia's rebranding of the SSH product line is more than a marketing ploy to get out from under the image of a useful, but limited security tool. With Tectia Manager and its underlying middleware, SSH steps up to enterprise-level solutions.

About the Author

Neil Roiter is Senior Technology Editor with Information Security magazine.

This review orginally appeared in Information Security magazine.

This was first published in December 2005

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.