Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


12:20 PM
Dark Reading
Dark Reading
Products and Releases

SSH Communications Security Introduces Tectia Guardian Solution

Offering enables real-time session and file transfer monitoring with intrusion detection system (IDS) or data loss prevention (DLP) integration capabilities

HELSINKI, FINLAND and WELLESLEY, Mass. " May 19, 2009 " SSH Communications Security (HEX:SSH1V), a world-leading provider of enterprise security solutions and end-to-end communications security, today announced SSH Tectia' Guardian, a new technology solution that enables real-time session and file transfer monitoring with Intrusion Detection System (IDS) or Data Loss Prevention (DLP) integration capabilities, as well as replay of sessions for post-session auditing of encrypted traffic.

This unique security solution enables both real-time inspection, and full replay of SSH, Secure File Transfer Protocol (SFTP), Telnet, and Remote Desktop Protocol (RDP) traffic and sessions to meet compliance, governance, auditing, and forensics requirements in enterprises and government entities. In addition, SSH Tectia Guardian provides flexible and powerful policy enforcement at the user, group, host, time, SSH subsystem, and even SSH command level to enforce security policies. SSH Tectia Guardian enables full monitoring for root and power user accounts, as required by Payment Card Industry (PCI) Data Security Standard (DSS).

SSH Tectia Guardian creates a formidable enterprise IT security system, delivering unparalleled visibility and auditing capabilities to easily monitor all activities of internal or external file transfers and remote access. In addition, PCI DSS mandates, Service Level Agreement (SLA) requirements, and outsourced operations can be controlled and policies enforced with ease.

In today's IT environment, the possibility of accidental security breaches, or worse, malicious activity by internal and external sources, are very real threats to corporate data integrity. SSH Tectia Guardian provides an easy-to-deploy, layered approach to establishing, maintaining and monitoring the security of sensitive corporate data in transit, as well as addressing the human factor.

Strict IDS requirements have in the past prevented the use of encryption in critical environments. Now, however, with SSH Tectia Guardian, end-to-end encryption can be utilized between any hosts, without the threat of malicious use of encrypted channels. SSH Tectia Guardian adds further security controls in environments where SSH Tectia ConnectSecure and other SSH Tectia solutions are used to secure File Transfer Protocol (FTP) and other unsecured data-in-transit operations. This maintains the real-time intrusion detection capability as any defined audit, IDS or DLP control points can now be assigned to protect encrypted, e.g. PCI DSS regulated, hosts and databases with virtually no latency or scalability issues.

SSH Tectia is the leading end-to-end communications security solution for the enterprise. Providing transparent, strong encryption and authentication, SSH Tectia enables secure file transfers, secure system administration, and secure application connectivity with centralized management throughout internal and external networks. SSH Tectia Guardian is a unique governance tool that fully integrates into IDS solutions for a layered security approach by adding additional protection between the DMZ and parallel firewalls.

Packet inspection of the SSH, Telnet and RDP protocols helps to ensure the accountability of root access and to meet the data security compliance for Sarbanes-Oxley Act (SOX), PCI DSS, Federal Information Security Management Act (FISMA), and U.S. Department of Defense (DoD) directives and other mandates requiring encrypted traffic to be inspected, audited and controlled.

"To achieve reliable auditing of encrypted server administration, the data collection has to be independent from the client and server, or a skilled attacker could easily mask his actions," said Jari Mielonen, CEO of SSH Communications Security Corp. "SSH Tectia Guardian brings a new level of governance and security to encrypted internal and external traffic, and will help enterprises better mitigate risk, achieve accurate real-time auditing, preserve the integrity of IT data, and more effectively achieve compliance with key regulatory requirements, including SOX, PCI DSS, HIPAA, and Basel II."

SSH Tectia Guardian is the only solution to log and record every session and perform a step-by-step inspection and auditing of both the encrypted and unencrypted traffic to resolve any potential threats to the internal and external network. Accountability of file transfers and remote access with detailed access reports eases the burden of internal and external auditing. Full playback and archiving of sessions creates a valuable auditing and forensics tool eliminating many potential security threats. SSH Tectia Guardian provides fast real-time response to true malicious threats by applying a proactive set of security controls on the most critical channels in the environment, to minimize the risk of breaches.

SSH Tectia Guardian is available today directly from SSH Communications Security, and from its global network of distribution partners. Visit www.ssh.com for more information.

About SSH Communications Security

SSH Communications Security is a world-leading provider of enterprise security solutions and end-to-end communications security, and the original developer of the Secure Shell protocol. The company's SSH Tectia solution addresses the most critical needs of large enterprises, financial institutions, and government agencies. With SSH Tectia, organizations can cost-effectively secure their system administration, file transfers, and application connectivity against both internal and external security risks. As the original developer of the Secure Shell protocol and other key network security technologies, SSH has since 1995 developed end-to-end communications security solutions specifically for the enterprise. Currently more than 200 of Global Fortune 500 companies are using SSH security solutions. SSH shares are quoted on the NASDAQ OMX Exchange. For more information, please visit www.ssh.com.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-11-14
STMicroelectronics ST33TPHF2ESPI TPM devices before 2019-09-12 allow attackers to extract the ECDSA private key via a side-channel timing attack because ECDSA scalar multiplication is mishandled, aka TPM-FAIL.
PUBLISHED: 2019-11-14
SnowHaze before 2.6.6 is sometimes too late to honor a per-site JavaScript blocking setting, which leads to unintended JavaScript execution via a chain of webpage redirections targeted to the user's browser configuration.
PUBLISHED: 2019-11-14
In klibc 1.5.20 and 1.5.21, the DHCP options written by ipconfig to /tmp/net-$DEVICE.conf are not properly escaped. This may allow a remote attacker to send a specially crafted DHCP reply which could execute arbitrary code with the privileges of any process which sources DHCP options.
PUBLISHED: 2019-11-14
The SQLDriverConnect() function in unixODBC before 2.2.14p2 have a possible buffer overflow condition when specifying a large value for SAVEFILE parameter in the connection string.
PUBLISHED: 2019-11-14
A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages are logged when $RepeatedMsgReduction was enabled. A local attacker could use this flaw to cause a denial of the rsyslogd daemon service by crashing the service via a sequence of repeated log messages sent withi...