CIO Influence
CIO Influence News Digital Transformation IT and DevOps

SSH.COM Launches Zero Trust Solution Portfolio For Just-in-Time Access Management

SSH.COM Launches Zero Trust Solution Portfolio For Just-in-Time Access Management

SSH.COM announced the availability of their Zero Trust solution portfolio for just-in-time access and secrets management for super and power users in IT. The portfolio helps customers to move away from the complexity of managing static credentials like traditional passwords and digital keys to a Zero Trust model where the number of secrets under management is radically reduced and control automated when protecting critical data at rest, in transit and in use.

Recommended ITech News: Global Software Development Firm Selects 3CLogic to Streamline Customer Engagements and Solve Inquiries Faster

SSH’s Zero Trust solutions are well-suited for companies that want to strengthen their cybersecurity posture while reducing complexity, improving ease of use, and removing operational friction from secrets and access management. With the SSH portfolio, customers can migrate to more secure just-in-time (JIT) access to critical data – where risky passwords or credentials no longer need to be managed at all in many use cases. SSH Zero Trust non-intrusive solutions can be deployed without major changes to customers’ operating environments or configurations.

“Trends like Zero Trust and Zero Standing Privileges have emerged from the need to maintain security when organizations move their workloads to the hybrid cloud”, states SSH.COM’s CEO, Dr. Teemu Tunkelo.” From our discussions with customers, we have learned that they want to automate the control and radically reduce the number of active secrets, keys and credentials. Automation and reduced complexity mitigate risks and decreases the control overhead in critical data access.”

Recommended ITech News: Authentic8 Announces Technology Partnership with Palo Alt

“For most of our customers, this is a journey of gradual implementation”, Tunkelo continues. “With our Zero Trust solution portfolio we provide our customers with a safe method to manage existing secrets while supporting them on their path to passwordless, keyless and credential-less paradigm with less operational friction and lower Total Cost of Ownership (TCO), especially in dynamic multi-cloud and hybrid environments.”

The portfolio has three key elements:

  • UKM Zero Trust. Discovers, controls and audits millions of SSH keys in large enterprise environments and allows migrating to interactive access and automated system-to-system connections without static keys.
  • Tectia Zero Trust: Secure remote access for internal and external superusers from client to server without leaving any static keys or access credentials behind.
  • PrivX OT Zero Trust: Just-in-time (JIT) access to network devices, databases, applications, code repositories, industrial control systems or targets in the hybrid cloud without leave-behind credentials or passwords to manage.

Recommended ITech News: C Spire Begins Pre-orders For New Galaxy Z Fold3 5g And Galaxy Z Flip3 5g

Related posts

Nintex Process Mapping and Automation Solutions Security Audit Update

Wallarm Launches API Attack Surface Management (AASM)

Business Wire

Cloud Range Appoints Cybersecurity Leader Galina Antova to Board of Directors

Business Wire

Leave a Comment