Risk
8/21/2013
02:00 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

SSH Appoints New Americas President And CEO

Sami Ahvenniemi was most recently chairman of the SSH Communications Security board of directors

HELSINKI, Finland and WALTHAM, Mass., Aug. 21, 2013 ­ SSH Communications Security, known the world over as the inventor of the ubiquitous secure shell and SFTP protocols, today announced the appointment of Sami Ahvenniemi as president and CEO, Americas.

Key news facts:

>> Ahvenniemi was most recently chairman of the SSH Communications Security board of directors. Ahvenniemi will continue as a member of the board after his appointment.

>> Ahvenniemi¹s appointment underscores SSH¹s goal of expanding its U.S.

presence as the leading provider of Fortune 1000 Secure Shell management solutions.

>> Ahvenniemi was previously founding partner of Conor Venture Partners, an early-stage venture firm. Ahvenniemi has served on the boards of several high tech companies that have successfully broken into the U.S. market.

>> Ahvenniemi was responsible for establishing SSH operations and sales in North and South America.

Key SSH facts:

>> Mismanaged Secure Shell keys expose organizations to compliance issues and severe security risks especially when keys authorizing high levels of administrative privilege are uncontrolled and their use unmonitored.

>> Universal SSH Key Manager is the industry¹s only comprehensive Secure Shell access solution that automates the discovery, management, monitoring and reporting of Secure Shell keys in the network environment, thereby saving time and money while significantly reducing risk.

>> SSH¹s access control services facilitates risk, audit & compliance processes by discovering and remediating Secure Shell access control related security issues.

Supporting Quote:

Tatu Ylönen, CEO and founder of SSH Communications Security, said:

³The threat landscape is changing rapidly, and organizations must adopt comprehensive data security strategies that account for Secure Shell key management as an integral component. Sami is a key player at SSH, and we are grateful to have the benefit of his technical experience and commitment to excellence in such an important role.²

About SSH Communications Security

Founded in 1995, SSH Communications Security is the company that invented the SSH protocol - the gold standard protocol for data-in-transit security solutions. Today, over 3,000 customers across the globe - including seven of the Fortune 10 - trust our Information Assurance Platform to secure the path to their information assets. We enable and enhance business for thousands of customers in multiple industries in the private and public sectors around the world. A fast-growing company, SSH Communications Security operates in the Americas, Europe, and APAC regions, with headquarters located in Helsinki, Finland. The company shares (SSH1V) are quoted on the NASDAQ OMX Helsinki.

For more information on SSH Communications Security please visit http://www.ssh.com

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-3946
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

CVE-2012-5723
Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

CVE-2013-6738
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before 1.2.0.0-CSI-SCALA-IF0003 allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

CVE-2014-0188
Published: 2014-04-24
The openshift-origin-broker in Red Hat OpenShift Enterprise 2.0.5, 1.2.7, and earlier does not properly handle authentication requests from the remote-user auth plugin, which allows remote attackers to bypass authentication and impersonate arbitrary users via the X-Remote-User header in a request to...

CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

Best of the Web