Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


12:20 PM
Dark Reading
Dark Reading
Products and Releases

SSH Communications Security Introduces Tectia Guardian Solution

Offering enables real-time session and file transfer monitoring with intrusion detection system (IDS) or data loss prevention (DLP) integration capabilities

HELSINKI, FINLAND and WELLESLEY, Mass. " May 19, 2009 " SSH Communications Security (HEX:SSH1V), a world-leading provider of enterprise security solutions and end-to-end communications security, today announced SSH Tectia' Guardian, a new technology solution that enables real-time session and file transfer monitoring with Intrusion Detection System (IDS) or Data Loss Prevention (DLP) integration capabilities, as well as replay of sessions for post-session auditing of encrypted traffic.

This unique security solution enables both real-time inspection, and full replay of SSH, Secure File Transfer Protocol (SFTP), Telnet, and Remote Desktop Protocol (RDP) traffic and sessions to meet compliance, governance, auditing, and forensics requirements in enterprises and government entities. In addition, SSH Tectia Guardian provides flexible and powerful policy enforcement at the user, group, host, time, SSH subsystem, and even SSH command level to enforce security policies. SSH Tectia Guardian enables full monitoring for root and power user accounts, as required by Payment Card Industry (PCI) Data Security Standard (DSS).

SSH Tectia Guardian creates a formidable enterprise IT security system, delivering unparalleled visibility and auditing capabilities to easily monitor all activities of internal or external file transfers and remote access. In addition, PCI DSS mandates, Service Level Agreement (SLA) requirements, and outsourced operations can be controlled and policies enforced with ease.

In today's IT environment, the possibility of accidental security breaches, or worse, malicious activity by internal and external sources, are very real threats to corporate data integrity. SSH Tectia Guardian provides an easy-to-deploy, layered approach to establishing, maintaining and monitoring the security of sensitive corporate data in transit, as well as addressing the human factor.

Strict IDS requirements have in the past prevented the use of encryption in critical environments. Now, however, with SSH Tectia Guardian, end-to-end encryption can be utilized between any hosts, without the threat of malicious use of encrypted channels. SSH Tectia Guardian adds further security controls in environments where SSH Tectia ConnectSecure and other SSH Tectia solutions are used to secure File Transfer Protocol (FTP) and other unsecured data-in-transit operations. This maintains the real-time intrusion detection capability as any defined audit, IDS or DLP control points can now be assigned to protect encrypted, e.g. PCI DSS regulated, hosts and databases with virtually no latency or scalability issues.

SSH Tectia is the leading end-to-end communications security solution for the enterprise. Providing transparent, strong encryption and authentication, SSH Tectia enables secure file transfers, secure system administration, and secure application connectivity with centralized management throughout internal and external networks. SSH Tectia Guardian is a unique governance tool that fully integrates into IDS solutions for a layered security approach by adding additional protection between the DMZ and parallel firewalls.

Packet inspection of the SSH, Telnet and RDP protocols helps to ensure the accountability of root access and to meet the data security compliance for Sarbanes-Oxley Act (SOX), PCI DSS, Federal Information Security Management Act (FISMA), and U.S. Department of Defense (DoD) directives and other mandates requiring encrypted traffic to be inspected, audited and controlled.

"To achieve reliable auditing of encrypted server administration, the data collection has to be independent from the client and server, or a skilled attacker could easily mask his actions," said Jari Mielonen, CEO of SSH Communications Security Corp. "SSH Tectia Guardian brings a new level of governance and security to encrypted internal and external traffic, and will help enterprises better mitigate risk, achieve accurate real-time auditing, preserve the integrity of IT data, and more effectively achieve compliance with key regulatory requirements, including SOX, PCI DSS, HIPAA, and Basel II."

SSH Tectia Guardian is the only solution to log and record every session and perform a step-by-step inspection and auditing of both the encrypted and unencrypted traffic to resolve any potential threats to the internal and external network. Accountability of file transfers and remote access with detailed access reports eases the burden of internal and external auditing. Full playback and archiving of sessions creates a valuable auditing and forensics tool eliminating many potential security threats. SSH Tectia Guardian provides fast real-time response to true malicious threats by applying a proactive set of security controls on the most critical channels in the environment, to minimize the risk of breaches.

SSH Tectia Guardian is available today directly from SSH Communications Security, and from its global network of distribution partners. Visit www.ssh.com for more information.

About SSH Communications Security

SSH Communications Security is a world-leading provider of enterprise security solutions and end-to-end communications security, and the original developer of the Secure Shell protocol. The company's SSH Tectia solution addresses the most critical needs of large enterprises, financial institutions, and government agencies. With SSH Tectia, organizations can cost-effectively secure their system administration, file transfers, and application connectivity against both internal and external security risks. As the original developer of the Secure Shell protocol and other key network security technologies, SSH has since 1995 developed end-to-end communications security solutions specifically for the enterprise. Currently more than 200 of Global Fortune 500 companies are using SSH security solutions. SSH shares are quoted on the NASDAQ OMX Exchange. For more information, please visit www.ssh.com.


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
Introducing 'Secure Access Service Edge'
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  7/3/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-09
An information leak was discovered on Yubico YubiKey 5 NFC devices 5.0.0 to 5.2.6 and 5.3.0 to 5.3.1. The OTP application allows a user to set optional access codes on OTP slots. This access code is intended to prevent unauthorized changes to OTP configurations. The access code is not checked when u...
PUBLISHED: 2020-07-09
In TimelineJS before version 3.7.0, some user data renders as HTML. An attacker could implement an XSS exploit with maliciously crafted content in a number of data fields. This risk is present whether the source data for the timeline is stored on Google Sheets or in a JSON configuration file. Most T...
PUBLISHED: 2020-07-09
The tough library (Rust/crates.io) prior to version 0.7.1 does not properly verify the threshold of cryptographic signatures. It allows an attacker to duplicate a valid signature in order to circumvent TUF requiring a minimum threshold of unique signatures before the metadata is considered valid. A ...
PUBLISHED: 2020-07-09
A reflected Cross-Site Scripting (XSS) Vulnerability in the KingComposer plugin through 2.9.4 for WordPress allows remote attackers to trick a victim into submitting an install_online_preset AJAX request containing base64-encoded JavaScript (in the kc-online-preset-data POST parameter) that is execu...
PUBLISHED: 2020-07-09
IBM Guardium Activity Insights 10.6 and 11.0 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure l...