Standards  >   Remote Access Protocols  >  

Secure Shell Protocol

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The Secure Shell Charter (SSH Charter) is a set of papers produced by the Secure Shell Working Group (SSH Working Group), an organization dedicated to updating and standardizing the popular Unix-based interface and protocol known as Secure Shell (SSH or secsh). The SSH Working Group is administered by the Internet Engineering Task Force (IETF), an international body that defines standard network operating  … 
Definition continues below.
Secure Shell Protocol White Papers (View All Report Types)
 
7 Things Every System Administrator Should Know about OpenSSH
sponsored by Global Knowledge
WHITE PAPER: This paper will focus on the OpenSSH implementation, which was initially developed as part of the OpenBSD project and is installed by default on most modern BSD and Linux-based operating systems, including Red Hat Enterprise Linux and Fedora.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

Global Knowledge

The Technical Complexities and Risks of Public Key Authentication: The Lack of SSH User Key Management in Large Enterprises Today
sponsored by SSH Communications Security Corp.
WHITE PAPER: While SSH (Secure Shell) user keys are often used for granting system access for system administrators, many organizations lack the proper processes for effectively managing them, introducing a number of security risks. This paper highlights ten (10) technical challenges and risks related to public key authentication and how to address them.
Posted: 21 May 2012 | Published: 21 May 2012

SSH Communications Security Corp.

Fundamental Principles of Network Security
sponsored by Schneider Electric
WHITE PAPER: This paper covers the fundamentals of secure networking systems, including firewalls, network topology and secure protocols.
Posted: 10 Jul 2009 | Published: 09 Jul 2009

Schneider Electric

Ensuring the Quality of Data in Motion: The Missing Link in Data Governance
sponsored by Infogix
WHITE PAPER: This white paper outlines a framework for ensuring the integrity of both transactional and non-transactional data using automated information controls and continuous monitoring. Click through now to discover how this system can help you detect and prevent information errors.
Posted: 24 Feb 2016 | Published: 24 Feb 2016

Infogix

Top 10 Measurement and Planning Mistakes and How to Avoid Them
sponsored by Information Builders
WHITE PAPER: Access this white paper to review the 10 most common planning and measurement errors that businesses commit. In addition to examining these blunders, discover real-world examples of how an enterprise can avoid or correct them. Learn strategic solutions, such as setting sensible goals.
Posted: 08 Apr 2015 | Published: 31 Dec 2014

Information Builders

Facilitating “sound practices” in risk management with IBM OpenPages ORM
sponsored by IBM
WHITE PAPER: This white paper discusses operational risk management (ORM) in the context of "Sound Practices for the Management and Supervision of Operational Risk," a paper from the Basel Committee.
Posted: 08 Feb 2012 | Published: 08 Feb 2012

IBM

Field Service Mobility Best Practices
sponsored by NetMotion Wireless
WHITE PAPER: Delivering applications and data to mobile workers is a key initiative among modern organizations. Mobile field initiatives offer tangible benefits, such as improved customer service and productivity.  Learn how a virtual private network (VPN) helps achieve a seamless deployment while providing reliable network connections for mobile workers.
Posted: 22 Jun 2011 | Published: 22 Jun 2011

NetMotion Wireless

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

Guidelines for Specification of Data Center Power Density
sponsored by Schneider Electric
WHITE PAPER: Specifying data center density has yet to conform to an established standard within the industry. This paper describes the science and practical application of an improved method for the specification of power and cooling infrastructure for data centers.
Posted: 30 Oct 2006 | Published: 01 Jan 2005

Schneider Electric

Juniper Networks VPN Decision Guide
sponsored by Juniper Networks, Inc.
WHITE PAPER: This paper looks at how IPsec and SSL VPNs differ, and examines the criteria for deciding which technology best fits each business need. It is an ideal resource for IT personnel trying to determine when to deploy IPsec VPN vs. SSL VPN for their companies’ remote access needs.
Posted: 15 Mar 2010 | Published: 15 Mar 2010

Juniper Networks, Inc.
 
 
SECURE SHELL PROTOCOL DEFINITION (continued): …  protocols.SSH is used to securely access and remotely control computers and servers. SSH provides automatic encryption, authentication and compression, facilitating secure rlogin, file transfers and TCP/IP communications. The SSH Working Group endeavors to make certain that SSH is easy to implement at the application level without intensive user interaction. Other goals of the group are to ensure that SSH will always: Provide optimum and continually updated protection against external threats Function efficiently without a global key management or certificate infrastructure Utilize existing … 
Secure Shell Protocol definition sponsored by SearchEnterpriseLinux.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement