CIO Influence
CIO Influence News Security

SSH Communications Security and Beyond Identity Announce Partnership to Improve Endpoint and Session Control Security

SSH Communications Security and Beyond Identity Announce Partnership

SSH Communications Security and Beyond Identity have partnered to significantly enhance the security of the new borderless security posture. The partnership integrates SSH’s Session control solution PrivX with Beyond Identity’s next-generation multi-factor authentication (MFA). The integration adds passwordless, keyless, and Zero Trust Authentication to further protect SSH customers’ most critical systems without a need to separate intranet, extranet, and internet.

“We are thrilled to partner with SSH to further enhance security for its marquis list of customers. By combining passwordless and phishing-resistant MFA with device trust, we can ensure that only authorized users and secure devices access privileged accounts. Together, we are empowering organizations to protect against modern identity and access-related threats,” said Kurt Johnson, Chief Strategy Officer and Head of Alliances for Beyond Identity.

CIO INFLUENCE News: Cradlepoint Partners with Los Angeles County to Modernize Election Network Infrastructure with 5G-Optimized Hybrid WAN

Strong Authentication, Continuous Verification, and Real-time Action

Organizations are moving away from static perimeter-based cyber defense to a Zero Trust model, where, in the end, there are no firewalls, DMZ solutions, static passwords, or keys. The increased need for remote work, multi-cloud environments, and third-party access have created the need for solutions that make cyber defense easy, rigorous, and borderless.

This joint solution represents a significant step forward in identity and access management (IAM) and privileged access management (PAM). It will enable organizations to continuously monitor, verify, and control access to their systems in a highly efficient manner through the automation of access control processes and easy verification of the actor’s identity. The protection of systems with walls is replaced by controlling access.

CIO INFLUENCE News: Suki’s Unparalleled Flexibility Expands With The Launch of Mac App

“Our partnership with Beyond Identity helps our customers implement a cybersecurity solution that is passwordless, keyless, and borderless. It makes access management more convenient, removing the need for traditional SMS messages or forced password rotation solutions. Access is granted in a highly automated manner based on users’ profiles, enabling just-in-time and just-enough system access equally to customers and their suppliers regardless of the connection through the internet, extranet, or in the corporate network,” said Dr. Teemu Tunkelo, CEO of SSH.

“This is a great addition to our modular Zero Trust Suite, which offers comprehensive cybersecurity solutions in the areas of Zero Trust, Operational Technologies, and Post-Quantum-Safe computing,” finishes Dr. Teemu Tunkelo, CEO of SSH.

CIO INFLUENCE News: Renesas Embraces Microsoft Visual Studio Code Across Its Entire Industry-Leading MCU and MPU Lineup

[To share your insights with us, please write to sghosh@martechseries.com]

Related posts

OTP Bank Selects SambaNova Systems to Build Europe’s Fastest AI Supercomputer

CIO Influence News Desk

PORT Network The First dApp to Harness Sustainable Processing Power for Both Cloud and Volunteer Computing

CIO Influence News Desk

Joint Tsinghua-Liverpool Research Team Discover New Charge Storage Mechanism