SSH Announces First End-to-End Security Solution for Securing Data Across Multi-Platform U.S. Government Computing Systems Using Common Access Cards Combining SSH Tectia(R) with Common Access Cards Enables Government

Agencies to Meet HSPD-12 Requirements Across IBM Mainframe, UNIX and

Windows Platforms



    HELSINKI, Finland and WELLESLEY, Mass., June 11 /PRNewswire/ -- SSH
 Communications Security (HEX: SSH1V), a world-leading provider of
 enterprise security solutions and end-to-end communications security, and
 the original developer of the Secure Shell protocol, today announced that
 SSH Tectia supports a number of leading Common Access Cards (CACs) across
 all key enterprise-class hardware/software platforms.
     In 2004, Homeland Security Presidential Directive-12 (HSPD-12) mandated
 that a standard be developed and implemented for secure and reliable
 identification for communications among U.S. government agencies and their
 contractors. This resulted in the use of CACs to provide identification and
 strong two-factor authentication for the U.S. Department of Defense (DoD)
 systems. Several CAC solutions have been developed by vendors to meet the
 new standard, but only SSH Tectia delivers secure end-to-end communications
 to work with these cards across all key enterprise-class platforms.
     Using SSH Tectia, in conjunction with CACs, enables secure remote
 logins, promotes single sign-on, and encrypts data communications for
 various applications, including system administration, file transfer and
 secure e-mail, in compliance with the HSPD-12 mandate. For more information
 about using CACs with SSH Tectia, please visit
 http://www.ssh.com/documents/50/CAC_CompatibilityNote.pdf.
     SSH Tectia is certified through Federal Information Processing
 Standards (FIPS) 140-2, a security standard developed to protect sensitive
 federal government information. SSH Tectia supports Public Key
 Infrastructure (PKI) authentication and X.509 v3 certificates, X.509 v2 CRL
 fetching as well as Online Certificate Status Protocol (OCSP), enabling it
 to seamlessly support strong authentication for even the largest of U.S.
 government applications with major CACs across IBM mainframe, UNIX, Linux,
 and Windows platforms.
     "CACs are becoming the standard to reliably identify the person
 accessing data, but they only solve part of the problem," said George
 Adams, president and CEO of SSH Communications Security, Inc. "To truly
 achieve total end-to-end security, these cards must work flawlessly with a
 system that seamlessly accesses PKI certificates and encrypts all data
 communications among heterogeneous platforms. Only SSH Tectia delivers CAC
 authentication for end-to-end communications security enabling secure
 system administration, file transfer and application connectivity on
 multiple enterprise platforms."
     About SSH Tectia
     SSH Tectia is the leading end-to-end communications security solution
 for the enterprise. The SSH Tectia solution is based on the SSH Secure
 Shell and SSH's other industry-leading technologies used by millions
 worldwide. SSH Tectia enables secure system administration, secure file
 transfer and secure application connectivity with centralized management
 throughout the internal and external network. SSH Tectia products provide
 transparent, strong encryption and authentication, and are available for
 all key enterprise platforms including Windows, UNIX, Linux, and mainframes
 to easily integrate into heterogeneous network environments.
     About SSH Communications Security
     SSH Communications Security is a world-leading provider of enterprise
 security solutions and end-to-end communications security, and the original
 developer of the Secure Shell protocol. The company's SSH Tectia solution
 addresses the most critical needs of large enterprises, financial
 institutions and government agencies. With SSH Tectia, organizations can
 cost-effectively secure their system administration, file transfers and
 application connectivity against both internal and external security risks.
 As the original developer of the Secure Shell protocol and other key
 network security technologies, SSH has for 10 years developed end-to-end
 communications security solutions specifically for the enterprise.
 Currently more than 100 of Global Fortune 500 companies are using SSH
 security solutions. SSH shares are quoted on the Helsinki Exchanges. For
 more information, please visit http://www.ssh.com.
     (C) 2007 SSH Communications Security Corp. All rights reserved. ssh(R)
 is a registered trademark of SSH Communications Security Corp in the United
 States and in certain other jurisdictions. Tectia is a trademark of SSH
 Communications Security Corp and may be registered in certain
 jurisdictions. All other names and marks are the property of their
 respective owners.
     SSH Corp. and Europe Contact:      Americas Regional Contact:
     Bo Sorensen                        Byron Rashed
     SSH Corp.                          SSH Inc.
     +358 20 500 7404                   +1 949 643 0733
     bo.sorensen@ssh.com                byron.rashed@ssh.com
 
     Asia Pacific Regional Contact:     Americas Agency Contact:
     Shiho Hashimoto                    Cheryl Taylor
     SSH Corp.                          Walt & Company
     +358 20 500 7470                   +1 408 496 0900 x 2981
     shiho@ssh.com                      ssh@walt.com
 
     Investor Relations Contact:
     Mika Peuranen
     SSH Corp.
     +358 20 500 7419
     mika.peuranen@ssh.com
 
 

SOURCE SSH Communications Security

More by this Source


Custom Packages

Browse our custom packages or build your own to meet your unique communications needs.

Start today.

 

PR Newswire Membership

Fill out a PR Newswire membership form or contact us at (888) 776-0942.

Learn about PR Newswire services

Request more information about PR Newswire products and services or call us at (888) 776-0942.