Risk
8/21/2013
02:00 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

SSH Appoints New Americas President And CEO

Sami Ahvenniemi was most recently chairman of the SSH Communications Security board of directors

HELSINKI, Finland and WALTHAM, Mass., Aug. 21, 2013 ­ SSH Communications Security, known the world over as the inventor of the ubiquitous secure shell and SFTP protocols, today announced the appointment of Sami Ahvenniemi as president and CEO, Americas.

Key news facts:

>> Ahvenniemi was most recently chairman of the SSH Communications Security board of directors. Ahvenniemi will continue as a member of the board after his appointment.

>> Ahvenniemi¹s appointment underscores SSH¹s goal of expanding its U.S.

presence as the leading provider of Fortune 1000 Secure Shell management solutions.

>> Ahvenniemi was previously founding partner of Conor Venture Partners, an early-stage venture firm. Ahvenniemi has served on the boards of several high tech companies that have successfully broken into the U.S. market.

>> Ahvenniemi was responsible for establishing SSH operations and sales in North and South America.

Key SSH facts:

>> Mismanaged Secure Shell keys expose organizations to compliance issues and severe security risks especially when keys authorizing high levels of administrative privilege are uncontrolled and their use unmonitored.

>> Universal SSH Key Manager is the industry¹s only comprehensive Secure Shell access solution that automates the discovery, management, monitoring and reporting of Secure Shell keys in the network environment, thereby saving time and money while significantly reducing risk.

>> SSH¹s access control services facilitates risk, audit & compliance processes by discovering and remediating Secure Shell access control related security issues.

Supporting Quote:

Tatu Ylönen, CEO and founder of SSH Communications Security, said:

³The threat landscape is changing rapidly, and organizations must adopt comprehensive data security strategies that account for Secure Shell key management as an integral component. Sami is a key player at SSH, and we are grateful to have the benefit of his technical experience and commitment to excellence in such an important role.²

About SSH Communications Security

Founded in 1995, SSH Communications Security is the company that invented the SSH protocol - the gold standard protocol for data-in-transit security solutions. Today, over 3,000 customers across the globe - including seven of the Fortune 10 - trust our Information Assurance Platform to secure the path to their information assets. We enable and enhance business for thousands of customers in multiple industries in the private and public sectors around the world. A fast-growing company, SSH Communications Security operates in the Americas, Europe, and APAC regions, with headquarters located in Helsinki, Finland. The company shares (SSH1V) are quoted on the NASDAQ OMX Helsinki.

For more information on SSH Communications Security please visit http://www.ssh.com

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-0460
Published: 2014-04-16
The init script in kbd, possibly 1.14.1 and earlier, allows local users to overwrite arbitrary files via a symlink attack on /dev/shm/defkeymap.map.

CVE-2011-0993
Published: 2014-04-16
SUSE Lifecycle Management Server before 1.1 uses world readable postgres credentials, which allows local users to obtain sensitive information via unspecified vectors.

CVE-2011-3180
Published: 2014-04-16
kiwi before 4.98.08, as used in SUSE Studio Onsite 1.2 before 1.2.1 and SUSE Studio Extension for System z 1.2 before 1.2.1, allows attackers to execute arbitrary commands via shell metacharacters in the path of an overlay file, related to chown.

CVE-2011-4089
Published: 2014-04-16
The bzexe command in bzip2 1.0.5 and earlier generates compressed executables that do not properly handle temporary files during extraction, which allows local users to execute arbitrary code by precreating a temporary directory.

CVE-2011-4192
Published: 2014-04-16
kiwi before 4.85.1, as used in SUSE Studio Onsite 1.2 before 1.2.1 and SUSE Studio Extension for System z 1.2 before 1.2.1, allows attackers to execute arbitrary commands as demonstrated by "double quotes in kiwi_oemtitle of .profile."

Best of the Web