Home Page ContentPress Releases SSH Communications Security Selected as Best Cloud Computing Security Finalist for SC Awards 2015 Europe

SSH Communications Security Selected as Best Cloud Computing Security Finalist for SC Awards 2015 Europe

by david.nunes

SSH Communications Security Selected as Best Cloud Computing Security Finalist for SC Awards 2015 Europe

— CryptoAuditor Honored for Bringing Privileged Access Management and Monitoring to Amazon EC2 Cloud Environments

HELSINKI and WALTHAM, Massachusets, May 26, 2015 – SSH Communications Security today announced that it has been selected as a finalist in the SC Awards 2015 Europe for outstanding threat solution products and services in information security. CryptoAuditor is recognized in the Best Cloud Computing Security category, which acknowledges superior products and services that help customers address the most pressing cybersecurity threats. For more information, visit: http://www.ssh.com/products/crypto-auditor.

NEWS FACTS:

  • PAM in the cloud: CryptoAuditor enables major enterprises, financial institutions, government agencies and cloud providers to take control of privileged access to their assets in the cloud, delivering distributed virtual appliance architecture and transparent monitoring capabilities.
  • Encrypted data monitoring: The solution can intercept, monitor, record and replay the content of the most common data-in-transit encryption protocols used in enterprise environments for interactive and automated sessions.
  • Data exfiltration prevention: CryptoAuditor helps prevent data loss across encrypted channel traffic with real-time, transparent audit capabilities for enterprises transmitting sensitive information to the cloud.
  • SC Awards: The Awards honor both the cybersecurity professionals working in the trenches, and the products and services that help protect today’s corporate world from a myriad of ever-changing threats.

Harri Koponen, CEO, SSH Communications Security, said: “Enterprises, financial institutions and federal agencies are concerned about making the transition to cloud services, despite the obvious benefits in flexibility and reductions in cost. Malicious actors often use encrypted channels to hide theft of sensitive data from the network environment. We designed the latest version of CryptoAuditor to deploy into federal and commercial cloud environments to transparently monitor, audit and control encrypted channels throughout the application layer and OS-level cloud stack while minimizing the risks that arise from third-party access to server data. This gives organizations unprecedented transparency while ensuring that work flow is maintained in the cloud environment.”

Tony Morbin, editor in chief, SC Magazine UK, said: “SSH Communications Security’s solution represents some of the most innovative and effective security technology on the market today. As attackers develop and practice new approaches to compromising sensitive information, companies are challenged to keep pace. CryptoAuditor was nominated an SC Award finalist for its efforts to raise the bar for the security industry.”

About SSH Communications Security

As the inventor of the SSH protocol, we have a twenty-year history of leading the market in developing advanced security solutions that enable, monitor, and manage encrypted networks. Over 3,000 customers across the globe trust the company’s encryption, access control and encrypted channel monitoring solutions to meet complex compliance requirements, improve their security posture and save on operational costs. SSH Communications Security is headquartered in Helsinki and has offices in the Americas, Europe and Asia. The company’s shares (SSH1V) are quoted on the NASDAQ OMX Helsinki. For more information, visit www.ssh.com 

Related Articles

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More