Standards  >   Remote Access Protocols  >  

Secure Shell Protocol

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The Secure Shell Charter (SSH Charter) is a set of papers produced by the Secure Shell Working Group (SSH Working Group), an organization dedicated to updating and standardizing the popular Unix-based interface and protocol known as Secure Shell (SSH or secsh). The SSH Working Group is administered by the Internet Engineering Task Force (IETF), an international body that defines standard network operating  … 
Definition continues below.
Secure Shell Protocol Multimedia (View All Report Types)
Changes in Financial Management Systems and Regulations
sponsored by Workday
WEBCAST: Watch this in-depth webcast to find out about the changes in financial management systems and regulations.
Posted: 21 Apr 2014 | Premiered: Feb 12, 2014


Remote Data Protection Demo
sponsored by IBM
SOFTWARE DEMO: Backup is a pretty complex ecosystem. There's data explosion, increasing recovery demands, a shrinking backup window and a limited IT budget. In this webinar you'll hear 2 key backup experts discuss the best practices around critical success factors.
Posted: 31 Oct 2008 | Premiered: 30 Oct 2008


IBM Rational Build Forge Demos
sponsored by IBM
PRODUCT DEMO: Learn more about Rational Build Forge and how it can help you to automate, streamline and standardize your software assembly processes.
Posted: 17 Mar 2010 | Premiered: 17 Mar 2010


Dirk Hohndel on Intel and the Linux Foundation
sponsored by Intel
VIDEO: In this video, Dirk Hohndel, Chief Linux and Open Source Technologist at Intel, discusses the importance of standards organizations like the Linux Foundation as well as thought on the future of Open Source at Intel.
Posted: 01 Nov 2010 | Premiered: 01 Nov 2010


The Benefits of Client-Aware Cloud Computing for Mobile Users
sponsored by Intel
VIDEO: Mobility can be seen as both a challenge and an opportunity when it comes to client-aware cloud computing. Learn why.
Posted: 17 Aug 2011 | Premiered: 16 Aug 2011


Mobile Remote access services from ATT Video
sponsored by AT&T Corp
WEBCAST: Mobile workers need access to the same tools and applications they use in the office. Mobile Remote Access Services (MRAS) from AT&T provide added security to help keep employees connected to the tools they need to be efficient and productive.
Posted: 13 Oct 2011 | Premiered: Oct 13, 2011

AT&T Corp

Windows PowerShell 2.0
sponsored by Microsoft
WEBCAST: Explore how Windows PowerShell 2.0 can help increase the productivity of IT professionals by providing a powerful, complete scripting language to automate repetitive tasks and conduct remote troubleshooting. It delivers a growing set of cmdlets that can be used to manage Windows-based PCs and servers, and it can be easily extended.
Posted: 12 Jun 2009 | Premiered: Jan 9, 2009


Ericom Blaze — RDP Acceleration
sponsored by Ericom Software
TRIAL SOFTWARE: Slow and choppy RDP experiences make it hard to work productively with graphics-rich PDFs, PPTs, Flash, etc. in Terminal Services and VDI environments. Today's organizations need to deliver the best quality of experience for the allocated network bandwidth.
Posted: 27 Jan 2011 | Premiered: 14 Jan 2011

Ericom Software

Automate Your Enterprise Apps to Ensure Secure Mobile Data Access
sponsored by Citrix
WEBCAST: In this webcast, Security Strategists Stacy Bruzek Banerjee and Kurt Roemer share their advice on how and where to protect the enterprise data that matters. Tune in to receive guidance on automating your enterprise data and apps, so that your people can access sensitive data when—and where—they need it.
Posted: 28 Oct 2015 | Premiered: Oct 28, 2015


Multifactor Authentication Security School
sponsored by
VIRTUAL ENVIRONMENT: In this virtual security classroom, Michael Cobb, a renowned security author with over 20 years of experience in the IT industry, surveys the latest authentication methods and technologies coming onto the market.
Posted: 16 Dec 2014 | Premiered: 15 Dec 2014

Security School: Effective Analyze SIEM Data
sponsored by
VIRTUAL ENVIRONMENT: Achieving the promise of SIEM is a matter of understanding the technology, and this webcast series will help you do so. Watch these interesting presentations from a leading security expert to learn all you need to know to make SIEM work for you.
Posted: 04 Aug 2015 | Premiered: 10 May 2013

Meet HDAP: Directory Innovation Based on Big Data Technology
sponsored by Radiant Logic, Inc.
WEBCAST: View this webcast to discover the advantages of big data-run highly available directory access protocol (HDAP) for today's more scalable user environments.
Posted: 27 May 2014 | Premiered: May 27, 2014

Radiant Logic, Inc.

How to Remove the Barriers to Cloud Collaboration Adoption
sponsored by Mimecast
WEBCAST: In this webinar, join Forrester Research-backed experts as they take you through the advantages of adopting cloud collaboration technology, overcoming security challenges, and developing a flexible strategy.
Posted: 27 Oct 2015 | Premiered: Oct 27, 2015


Upgrade and Onboard Enterprise Mobile Devices to Windows 10
sponsored by Microsoft
WEBCAST: In this webinar, Jack Madden explains how to upgrade and onboard new and existing enterprise mobile devices to Windows 10. Watch this video now to learn why this migration is simpler than Windows XP to 7.
Posted: 20 Nov 2015 | Premiered: Nov 20, 2015


Enable Your Hyper-Connected Enterprise with Next-Generation UC
sponsored by Oracle Corporation
VIDEO: In this webcast you will learn how to transform your organization into a hyper-connected enterprise with next-generation UC. Discover how to create a successful communications architecture that connects employees from any device.
Posted: 02 Nov 2015 | Premiered: 02 Nov 2015

Oracle Corporation

Improve Your User Experience with Mobile Application Development
sponsored by IBM
WEBCAST: In this webcast, you will learn how transform customer information garnered from your mobile apps into actionable data. Access this video to accelerate the delivery of your mobile strategy provide users with a more engaging experience.
Posted: 30 Oct 2015 | Premiered: Jun 18, 2015


Cloud-Based Communication Case Study: Upgrading TheLadders
sponsored by ThinkingPhones
WEBCAST: In this webcast case study, Nick Giordano, Technical Support Specialist at TheLadders, explains how his organization upgraded their infrastructure by transitioning from a legacy system to cloud-enabled business communications through a third-party service.
Posted: 01 Sep 2015 | Premiered: Aug 10, 2015


Become a Technology Partner with Citrix and Expand Your Business Reach
sponsored by Citrix
PODCAST: In this podcast, you will discover how to expand your business reach and mobilize your enterprise with Citrix mobility and Windows 10. Get the insider's look at how Windows 10 can transform your business, as well as 10 tips to ensure your W10 readiness.
Posted: 17 Nov 2015 | Premiered: Nov 6, 2015


VoIP: Real Deployment Stories from the Field
sponsored by 8x8, Inc.
WEBCAST: This webcast features VoIP pioneer Bryan Martin, a seasoned VoIP veteran with real-world experience from thousands of successful deployments, detailing how VoIP-based technology has changed, where it is going, and where it might take companies like yours tomorrow. Watch now to learn more.
Posted: 23 Nov 2015 | Premiered: May 22, 2015

8x8, Inc.

Today's Top 10 Web Hacking Technique
sponsored by WhiteHat Security
WEBCAST: In this webcast, you'll learn today's top 10 web hacking techniques, such as Heartbleed and ShellShock, and how to protect your network as we continue through 2015. View it now to discover the 3 keys to email and web security.
Posted: 01 Oct 2015 | Premiered: Apr 9, 2015

WhiteHat Security

Secure, Efficient File-Sharing
sponsored by FinalCode
VIDEO: This brief video looks at a security system that keeps files safe without altering the way employees share them.
Posted: 05 Oct 2015 | Premiered: 29 May 2015


Enterprise Mobility University: Enterprise BYOD Management
sponsored by SearchMobileComputing
VIRTUAL ENVIRONMENT: This classroom discusses security, application management, authentication, and best practices for developing and implementing a workable BYOD strategy.
Posted: 17 Mar 2014 | Premiered: 13 Mar 2014


Select and Implement a Managed File Transfer Solution
sponsored by Linoma Software
VIDEO: This short video introduces a managed file transfer system that secures data from unauthorized access and creates a record of who has controlled the file.
Posted: 29 Oct 2015 | Premiered: 07 Oct 2015

Linoma Software

File Sharing Insecurity: The Final Data Leakage Frontier
sponsored by FinalCode
WEBCAST: In this webinar, discover how you can strengthen security for you shared files without staunching innovation and collaboration.
Posted: 21 Sep 2015 | Premiered: Oct 8, 2015


STW Group Securely Manages Its National Network
sponsored by Palo Alto Networks
WEBCAST: In this case study, Tom Ceglarek, Chief Information Officer at STW Group, examines how STW securely managed their explosive growth of video and applications across its national network. Learn how to employ next-generation firewalls with parallel code to take your security to the next level.
Posted: 16 Oct 2015 | Premiered: Oct 16, 2015

Palo Alto Networks

How to Power Your Enterprise Network and Transform Your Data Center
sponsored by Cisco Systems, Inc and Citrix
WEBCAST: This webcast explains how to automate network provisioning and control based on application requirements and policies, both for datacenter and enterprise environments. View now to learn how to transform your enterprise network with accelerated application deployment.
Posted: 06 Nov 2015 | Premiered: Aug 31, 2014

Cisco Systems, Inc and Citrix

Software-Defined Security and the Agile Data Center
sponsored by CloudPassage
WEBCAST: On this webinar, you'll hear from Neil MacDonald, VP Distinguished Analyst from Gartner Research, and CloudPassage's Co-founder and Chief Strategy Officer, Carson Sweet. They'll share insights into the changes required for security and compliance in the new, more agile data center.
Posted: 22 Jun 2015 | Premiered: Jun 22, 2015


The Ins and Outs of Secure File Sharing
sponsored by BlackBerry
WEBCAST: One big gap persists in the file sync and sharing market: highly secure content delivery. This webcast features Jeff Holleran and Tim Choi, as they relay the challenges of compliant collaboration on multiple devices. Tune in and learn what is needed to keep content from being leaked during file sync and sharing.
Posted: 14 Jul 2015 | Premiered: May 14, 2015


Bring File Transfers out of the Shadows with Centralized Managed File Transfer: Part 2
sponsored by Axway
WEBCAST: In this webcast, learn how to address shadow IT in the context of centralized managed file transfer. Additionally, learn the business opportunities shared services can provide, including economies of scale, consolidated automated transfers for a single, centralized solution, and more.
Posted: 24 Nov 2015 | Premiered: Nov 18, 2015


Security Has Failed Us - But it's not Too Late
sponsored by Unisys
VIDEO: Watch this brief video as security solutions expert Tom Patterson explains the failures of the security industry and how they've worsened due to new threats and environments. Tune in and discover the surprising way to overcome these failures.
Posted: 23 Nov 2015 | Premiered: 09 Nov 2015


APM Overview
sponsored by SolarWinds, Inc.
VIDEO: Join SolarWinds’ Head Geek for a video overview of Orion Application Performance Monitor (APM) module. See how easy it is to monitor, alert, and report on your critical applications and servers with Orion APM’s agentless application monitoring. You will also learn how you can leverage the default component monitors as well as build your own.
Posted: 17 Sep 2009 | Premiered: 17 Sep 2009

SolarWinds, Inc.

Quest Recovery Manager for Active Directory - Tips and Tricks
sponsored by Dell Software
WEBCAST: Are you using Quest Recovery Manager for Active Directory to its full potential? We have a Webcast that will show you some of the great things that Recovery Manager has to offer.
Posted: 06 Nov 2006 | Premiered: Nov 3, 2006

Dell Software
SECURE SHELL PROTOCOL DEFINITION (continued): …  protocols.SSH is used to securely access and remotely control computers and servers. SSH provides automatic encryption, authentication and compression, facilitating secure rlogin, file transfers and TCP/IP communications. The SSH Working Group endeavors to make certain that SSH is easy to implement at the application level without intensive user interaction. Other goals of the group are to ensure that SSH will always: Provide optimum and continually updated protection against external threats Function efficiently without a global key management or certificate infrastructure Utilize existing … 
Secure Shell Protocol definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement