SSH Communications Security Introduces Tectia Guardian Solution

Offering enables real-time session and file transfer monitoring with intrusion detection system (IDS) or data loss prevention (DLP) integration capabilities

May 26, 2009

4 Min Read


HELSINKI, FINLAND and WELLESLEY, Mass. " May 19, 2009 " SSH Communications Security (HEX:SSH1V), a world-leading provider of enterprise security solutions and end-to-end communications security, today announced SSH Tectia' Guardian, a new technology solution that enables real-time session and file transfer monitoring with Intrusion Detection System (IDS) or Data Loss Prevention (DLP) integration capabilities, as well as replay of sessions for post-session auditing of encrypted traffic.

This unique security solution enables both real-time inspection, and full replay of SSH, Secure File Transfer Protocol (SFTP), Telnet, and Remote Desktop Protocol (RDP) traffic and sessions to meet compliance, governance, auditing, and forensics requirements in enterprises and government entities. In addition, SSH Tectia Guardian provides flexible and powerful policy enforcement at the user, group, host, time, SSH subsystem, and even SSH command level to enforce security policies. SSH Tectia Guardian enables full monitoring for root and power user accounts, as required by Payment Card Industry (PCI) Data Security Standard (DSS).

SSH Tectia Guardian creates a formidable enterprise IT security system, delivering unparalleled visibility and auditing capabilities to easily monitor all activities of internal or external file transfers and remote access. In addition, PCI DSS mandates, Service Level Agreement (SLA) requirements, and outsourced operations can be controlled and policies enforced with ease.

In today's IT environment, the possibility of accidental security breaches, or worse, malicious activity by internal and external sources, are very real threats to corporate data integrity. SSH Tectia Guardian provides an easy-to-deploy, layered approach to establishing, maintaining and monitoring the security of sensitive corporate data in transit, as well as addressing the human factor.

Strict IDS requirements have in the past prevented the use of encryption in critical environments. Now, however, with SSH Tectia Guardian, end-to-end encryption can be utilized between any hosts, without the threat of malicious use of encrypted channels. SSH Tectia Guardian adds further security controls in environments where SSH Tectia ConnectSecure and other SSH Tectia solutions are used to secure File Transfer Protocol (FTP) and other unsecured data-in-transit operations. This maintains the real-time intrusion detection capability as any defined audit, IDS or DLP control points can now be assigned to protect encrypted, e.g. PCI DSS regulated, hosts and databases with virtually no latency or scalability issues.

SSH Tectia is the leading end-to-end communications security solution for the enterprise. Providing transparent, strong encryption and authentication, SSH Tectia enables secure file transfers, secure system administration, and secure application connectivity with centralized management throughout internal and external networks. SSH Tectia Guardian is a unique governance tool that fully integrates into IDS solutions for a layered security approach by adding additional protection between the DMZ and parallel firewalls.

Packet inspection of the SSH, Telnet and RDP protocols helps to ensure the accountability of root access and to meet the data security compliance for Sarbanes-Oxley Act (SOX), PCI DSS, Federal Information Security Management Act (FISMA), and U.S. Department of Defense (DoD) directives and other mandates requiring encrypted traffic to be inspected, audited and controlled.

"To achieve reliable auditing of encrypted server administration, the data collection has to be independent from the client and server, or a skilled attacker could easily mask his actions," said Jari Mielonen, CEO of SSH Communications Security Corp. "SSH Tectia Guardian brings a new level of governance and security to encrypted internal and external traffic, and will help enterprises better mitigate risk, achieve accurate real-time auditing, preserve the integrity of IT data, and more effectively achieve compliance with key regulatory requirements, including SOX, PCI DSS, HIPAA, and Basel II."

SSH Tectia Guardian is the only solution to log and record every session and perform a step-by-step inspection and auditing of both the encrypted and unencrypted traffic to resolve any potential threats to the internal and external network. Accountability of file transfers and remote access with detailed access reports eases the burden of internal and external auditing. Full playback and archiving of sessions creates a valuable auditing and forensics tool eliminating many potential security threats. SSH Tectia Guardian provides fast real-time response to true malicious threats by applying a proactive set of security controls on the most critical channels in the environment, to minimize the risk of breaches.

SSH Tectia Guardian is available today directly from SSH Communications Security, and from its global network of distribution partners. Visit for more information.

About SSH Communications Security

SSH Communications Security is a world-leading provider of enterprise security solutions and end-to-end communications security, and the original developer of the Secure Shell protocol. The company's SSH Tectia solution addresses the most critical needs of large enterprises, financial institutions, and government agencies. With SSH Tectia, organizations can cost-effectively secure their system administration, file transfers, and application connectivity against both internal and external security risks. As the original developer of the Secure Shell protocol and other key network security technologies, SSH has since 1995 developed end-to-end communications security solutions specifically for the enterprise. Currently more than 200 of Global Fortune 500 companies are using SSH security solutions. SSH shares are quoted on the NASDAQ OMX Exchange. For more information, please visit

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like

More Insights