SSH Communications Security Lowers the Barrier to Implement Secure File Transfers to and from IBM Mainframes
SSH Tectia Server for IBM z/OS is an advanced, cost-effective file transfer solution for the IBM environment supporting key mainframe features such as: direct MVS (Multiple Virtual Storage) file system access, hardware encryption acceleration, SMF logging, automatic character set conversion, strong authentication through RACF, ACF and TopSecret, X.509 certificate support as well as fast data streaming technology.
SSH Tectia Server 5.5 for z/OS introduces Advanced Tunneling technology, based on the SSHG3Ô architecture, which for the first time allows IT organizations to cost-effectively and effortlessly eliminate the risk associated with transmitting confidential data and passwords in plaintext.
One of the key design goals for the new version was to lower the overall cost of the user's remediation project. With SSH Tectia, the reduced remediation efforts yield significant cost advantages, as setup and configuration time is typically measured in hours rather than days or weeks required by other solutions.
The new features can be activated system-wide or restricted to specific FTP jobs or user ID's, making the product the ideal solution for secure file transfers in complex, heterogeneous environments with Windows, Unix, Linux platforms, as well as IBM mainframes.
"During the past years, most enterprises have been aware of the security risks associated with transmitting passwords and data in the clear, but have not been able to eliminate them due to costly and time consuming remediation projects" says Arto Vainio, CEO of SSH Communications Security Corp.
"A cost-effective solution to this problem has become a high priority for IT managers, and with the release of SSH Tectia 5.5 for IBM z/OS, enterprises are now for the first time able to secure their file transfers without expensive additional development or integration projects and with minimal disruption to their production systems."
About SSH Tectia
SSH Tectia is the leading end-to-end communications security solution for the enterprise. The SSH Tectia solution is based on the SSH Secure Shell and SSH's other industry-leading technologies used by millions worldwide. SSH Tectia enables secure system administration, secure file transfer and secure application connectivity with centralized management throughout the internal and external network.
SSH Tectia products provide transparent, strong encryption and authentication, and are available for all key enterprise platforms including Windows, Unix, Linux, and mainframes to easily integrate into heterogeneous network environments.
SSH Communications Security is a world-leading provider of enterprise security solutions and end-to-end communications security, and the original developer of the Secure Shell protocol. The company's SSH Tectia solution addresses the most critical needs of large enterprises, financial institutions, and government agencies. With SSH Tectia, organizations can cost-effectively secure their system administration, file transfers, and application connectivity against both internal and external security risks. As the original developer of the Secure Shell protocol and other key network security technologies, SSH has since 1995 developed end-to-end communications security solutions specifically for the enterprise. Currently more than 100 of Global Fortune 500 companies are using SSH security solutions. SSH shares are quoted on the Helsinki Exchanges Main List. For more information, please visit www.ssh.com.
Press releases you might also be interested in
Weitere Informationen zum Thema "Sicherheit":
Kali Linux installieren und Hacking-Lab aufsetzen
Angehende Sicherheitsexperten, Pentester und IT-Verantwortliche finden in Kali eine umfangreiche Plattform, um digitale Attacken zu planen und durchzuführen. Warum sollte man dies tun? Zum einen um sich mit potentiellen Angriffen auf die eigenen Systeme auseinanderzusetzen und zum zweiten um interne oder externe Schwachstellentests besser zu verstehen. Im ersten Teil stellen wir Kali genauer vor und erklären, wie sich ein Hacking-Lab aufzusetzen lässt.Weiterlesen