SSH Tectia now Offers Support for Sun Solaris 10 and Solaris Zones
Users Benefit from Powerful Combination of SSH Tectia® Secure File Transfer and System Administration Capabilities and Built-in Solaris Security Features
Support for Solaris 10 provides users the combined benefit of SSH Tectia's unsurpassed secure system administration, secure file transfers and application connectivity capabilities with the robust built-in security features of the Solaris 10 operating system. An ideal compliment for SUN servers running the SunSSH utility is the newly released SSH Tectia ConnectSecure.
SSH Tectia ConnectSecure will work with any Secure Shell (SSH) server product and features automatic and transparent FTP to SFTP conversion with a configurable FTP fallback option for ease of migration and transparent FTP tunneling. SSH Tectia ConnectSecure delivers advanced FTP SSH Tectia functionality to SSH and OpenSSH servers, including SunSSH servers, without modification to the existing infrastructure or applications.
SSH Tectia's support of Solaris Zones enables customers' to securely meet the growing demand for virtualization capabilities as more enterprises adopt the Solaris platform for tasks once reserved for large mainframes. Solaris Zones allow large, high-performance systems to operate as if they were two or more independent servers, completely isolated from one another, providing a level of security previously unavailable. SSH Tectia and Sun Solaris provide powerful, cost-effective solution with best-of-breed security features.
"Our support for Solaris Zones was the result of real-world needs by a wide range of our major enterprise customers with critical data sensitivity requirements," said George Adams, president and CEO of SSH Communications Security, Inc. "Now Sun users everywhere can enjoy the unparalleled protection of SSH Tectia, whether they employ Solaris with Global or Local Zones. In addition, we embrace Sun's commitment to the x86 hardware architecture and are delighted that Solaris users can now enable end-to-end security with SSH Tectia, whether they use Sun SPARC or x86 systems."
SSH Tectia provides end-to-end security for data in transit in large, heterogeneous enterprise networks where Solaris operating systems are commonly used. SSH Tectia provides the finest in authentication and encryption methods, including support for X.509 certificates, public keys, 3DES, AES, DSA, and RSA. Its broad platform support ensures seamless secure data communications for Solaris systems communicating with other key enterprise computing platforms, including Linux, UNIX, Windows, and IBM z/OS platforms.
About SSH Tectia
SSH Tectia is the leading end-to-end communications security solution for the enterprise. The SSH Tectia solution is based on the SSH Secure Shell and SSH's other industry-leading technologies used by millions worldwide. SSH Tectia enables secure system administration, secure file transfer and secure application connectivity with centralized management throughout the internal and external network. SSH Tectia products provide transparent, strong encryption and authentication, and are available for all key enterprise platforms, including Windows, UNIX, Linux, and mainframes to easily integrate into heterogeneous network environments.
SSH Communications Security is a world-leading provider of enterprise security solutions and end-to-end communications security, and the original developer of the Secure Shell protocol. The company's SSH Tectia solution addresses the most critical needs of large enterprises, financial institutions, and government agencies. With SSH Tectia, organizations can cost-effectively secure their system administration, file transfers, and application connectivity against both internal and external security risks. As the original developer of the Secure Shell protocol and other key network security technologies, SSH has since 1995 developed end-to-end communications security solutions specifically for the enterprise. Currently more than 100 of Global Fortune 500 companies are using SSH security solutions. SSH shares are quoted on the Helsinki Exchanges Main List. For more information, please visit www.ssh.com.
Press releases you might also be interested in
Weitere Informationen zum Thema "Sicherheit":
Was ist OPSEC?
Unter OPSEC (Operations Security) versteht man im IT-Umfeld die Summe von Prozessen und Strategien zum Schutz kritischer Daten. OPSEC basiert auf fünf iterativen Teilprozessen, die es nacheinander zu durchlaufen gilt. Ursprünglich stammt der Begriff OPSEC aus dem militärischen Bereich.Weiterlesen