Standards  >   Remote Access Protocols  >  

Secure Shell Protocol

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The Secure Shell Charter (SSH Charter) is a set of papers produced by the Secure Shell Working Group (SSH Working Group), an organization dedicated to updating and standardizing the popular Unix-based interface and protocol known as Secure Shell (SSH or secsh). The SSH Working Group is administered by the Internet Engineering Task Force (IETF), an international body that defines standard network operating  … 
Definition continues below.
Secure Shell Protocol White Papers (View All Report Types)
 
The Technical Complexities and Risks of Public Key Authentication: The Lack of SSH User Key Management in Large Enterprises Today
sponsored by SSH Communications Security Corp.
WHITE PAPER: While SSH (Secure Shell) user keys are often used for granting system access for system administrators, many organizations lack the proper processes for effectively managing them, introducing a number of security risks. This paper highlights ten (10) technical challenges and risks related to public key authentication and how to address them.
Posted: 21 May 2012 | Published: 21 May 2012

SSH Communications Security Corp.

Fundamental Principles of Network Security
sponsored by Schneider Electric
WHITE PAPER: This paper covers the fundamentals of secure networking systems, including firewalls, network topology and secure protocols.
Posted: 10 Jul 2009 | Published: 09 Jul 2009

Schneider Electric

7 Things Every System Administrator Should Know about OpenSSH
sponsored by Global Knowledge
WHITE PAPER: This paper will focus on the OpenSSH implementation, which was initially developed as part of the OpenBSD project and is installed by default on most modern BSD and Linux-based operating systems, including Red Hat Enterprise Linux and Fedora.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

Global Knowledge

Guide: 9 Steps the CIO Must Take for Successful Divestitures
sponsored by SNP America, Inc.
WHITE PAPER: Since divestitures are not considered everyday business for most organizations, they typically land on the CIO's already-full plate. But for a CIO, there can be great benefits for doing things the right way, but a wrongly done divestiture can lead to dire consequences. Inside, discover 9 steps CIOs can take to achieve a successful divestiture.
Posted: 24 Jan 2017 | Published: 24 Jan 2017

SNP America, Inc.

Open Trusted Technology Provider Standard (O-TTPS)
sponsored by ComputerWeekly.com
WHITE PAPER: This standard is aimed at enhancing the integrity of commercial off the shelf ICT products and helping customers to manage sourcing risk.
Posted: 10 Apr 2013 | Published: 10 Apr 2013

ComputerWeekly.com

Juniper Networks VPN Decision Guide
sponsored by Juniper Networks, Inc.
WHITE PAPER: This paper looks at how IPsec and SSL VPNs differ, and examines the criteria for deciding which technology best fits each business need. It is an ideal resource for IT personnel trying to determine when to deploy IPsec VPN vs. SSL VPN for their companies’ remote access needs.
Posted: 15 Mar 2010 | Published: 15 Mar 2010

Juniper Networks, Inc.

Optimizing Microsoft® SharePoint with Dell
sponsored by Dell EMC and Microsoft
WHITE PAPER: The workplace is quickly becoming a highly mobilized environment where employees can work remotely. As executives work from home or during travel, important company data is housed in remote buildings far from the protection of the office walls. View this resource to learn more about protecting your business with governance and compliance.
Posted: 15 Apr 2013 | Published: 15 Apr 2013

Dell EMC and Microsoft

Securing End-User Mobile Devices in the Enterprise
sponsored by IBM
WHITE PAPER: As your mobile enterprise expands and devices grow more robust, security risks increase. With careful preparation, you can use the latest tools and expertise to protect your assets. Read this white paper to learn how to develop an enforceable mobile security policy for your organization.
Posted: 12 Aug 2011 | Published: 12 Aug 2011

IBM

Beyond the Balance Sheet: Assessing the Impact of the New Lease Accounting Standard
sponsored by IBM
WHITE PAPER: This white paper will help CFOs deal with the 2015 FASB and IASB changes, which eliminate all operating leases from the income statement and move them onto the balance sheet as a capital expense.
Posted: 02 Nov 2012 | Published: 31 Jan 2012

IBM

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.
 
 
SECURE SHELL PROTOCOL DEFINITION (continued): …  protocols.SSH is used to securely access and remotely control computers and servers. SSH provides automatic encryption, authentication and compression, facilitating secure rlogin, file transfers and TCP/IP communications. The SSH Working Group endeavors to make certain that SSH is easy to implement at the application level without intensive user interaction. Other goals of the group are to ensure that SSH will always: Provide optimum and continually updated protection against external threats Function efficiently without a global key management or certificate infrastructure Utilize existing … 
Secure Shell Protocol definition sponsored by SearchEnterpriseLinux.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement