SSH Communications Security announced that SSH Tectia supports a number of leading Common Access Cards (CACs) across all platforms. Using SSH Tectia, in conjunction with CACs, enables secure remote logins, promotes single sign-on, and encrypts data communications for various applications, including system administration, file transfer and secure e-mail, in compliance with the HSPD-12 mandate.
SSH Announces First End-to-End Security Solution for Securing Data Across Multi-Platform U.S. Government Computing Systems Using Common Access Cards
HELSINKI, Finland and WELLESLEY, Mass., June 11 — SSH Communications Security (HEX: SSH1V), a world-leading provider of enterprise security solutions and end-to-end communications security, and the original developer of the Secure Shell protocol, today announced that SSH Tectia supports a number of leading Common Access Cards (CACs) across all key enterprise-class hardware/software platforms.
In 2004, Homeland Security Presidential Directive-12 (HSPD-12) mandated that a standard be developed and implemented for secure and reliable identification for communications among U.S. government agencies and their contractors. This resulted in the use of CACs to provide identification and strong two-factor authentication for the U.S. Department of Defense (DoD) systems. Several CAC solutions have been developed by vendors to meet the new standard, but only SSH Tectia delivers secure end-to-end communications to work with these cards across all key enterprise-class platforms.
Using SSH Tectia, in conjunction with CACs, enables secure remote logins, promotes single sign-on, and encrypts data communications for various applications, including system administration, file transfer and secure e-mail, in compliance with the HSPD-12 mandate. For more information about using CACs with SSH Tectia, please download this PDF.
SSH Tectia is certified through Federal Information Processing Standards (FIPS) 140-2, a security standard developed to protect sensitive federal government information. SSH Tectia supports Public Key Infrastructure (PKI) authentication and X.509 v3 certificates, X.509 v2 CRL fetching as well as Online Certificate Status Protocol (OCSP), enabling it to seamlessly support strong authentication for even the largest of U.S. government applications with major CACs across IBM mainframe, UNIX, Linux, and Windows platforms.
“CACs are becoming the standard to reliably identify the person accessing data, but they only solve part of the problem,” said George Adams, president and CEO of SSH Communications Security, Inc. “To truly achieve total end-to-end security, these cards must work flawlessly with a system that seamlessly accesses PKI certificates and encrypts all data communications among heterogeneous platforms. Only SSH Tectia delivers CAC authentication for end-to-end communications security enabling secure system administration, file transfer and application connectivity on multiple enterprise platforms.”
About SSH Tectia
SSH Tectia is the leading end-to-end communications security solution for the enterprise. The SSH Tectia solution is based on the SSH Secure Shell and SSH’s other industry-leading technologies used by millions worldwide. SSH Tectia enables secure system administration, secure file transfer and secure application connectivity with centralized management throughout the internal and external network. SSH Tectia products provide transparent, strong encryption and authentication, and are available for all key enterprise platforms including Windows, UNIX, Linux, and mainframes to easily integrate into heterogeneous network environments.
About SSH Communications Security
SSH Communications Security is a world-leading provider of enterprise security solutions and end-to-end communications security, and the original developer of the Secure Shell protocol. The company’s SSH Tectia solution addresses the most critical needs of large enterprises, financial institutions and government agencies. With SSH Tectia, organizations can cost-effectively secure their system administration, file transfers and application connectivity against both internal and external security risks. As the original developer of the Secure Shell protocol and other key network security technologies, SSH has for 10 years developed end-to-end communications security solutions specifically for the enterprise. Currently more than 100 of Global Fortune 500 companies are using SSH security solutions. SSH shares are quoted on the Helsinki Exchanges. For more information, please visit http://www.ssh.com.
(C) 2007 SSH Communications Security Corp. All rights reserved. ssh(R) is a registered trademark of SSH Communications Security Corp in the United States and in certain other jurisdictions. Tectia is a trademark of SSH Communications Security Corp and may be registered in certain jurisdictions. All other names and marks are the property of their respective owners.
Research and evaluate FIPS 201 Approved Products and get the latest info on compliant credentialing systems at FIPS201.com. Click to visit FIPS201.com.