Standards  >   Remote Access Protocols  >  

Secure Shell Protocol

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The Secure Shell Charter (SSH Charter) is a set of papers produced by the Secure Shell Working Group (SSH Working Group), an organization dedicated to updating and standardizing the popular Unix-based interface and protocol known as Secure Shell (SSH or secsh). The SSH Working Group is administered by the Internet Engineering Task Force (IETF), an international body that defines standard network operating  … 
Definition continues below.
Secure Shell Protocol Reports
 
Taming the Beast- Controlling SSH for Security and Compliance
sponsored by FoxT
WHITE PAPER: Are SSH keys the saviors of identity management and access security for your organizations? With several different styles of keys, it's imperative you know the differences and guidelines to using them. Access this white paper to learn more about SSH keys and taking the next step to centralizing SSH session access control to boost security.
Posted: 05 Jan 2016 | Published: 11 Nov 2015

FoxT

7 Things Every System Administrator Should Know about OpenSSH
sponsored by Global Knowledge
WHITE PAPER: This paper will focus on the OpenSSH implementation, which was initially developed as part of the OpenBSD project and is installed by default on most modern BSD and Linux-based operating systems, including Red Hat Enterprise Linux and Fedora.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

Global Knowledge

The Technical Complexities and Risks of Public Key Authentication: The Lack of SSH User Key Management in Large Enterprises Today
sponsored by SSH Communications Security Corp.
WHITE PAPER: While SSH (Secure Shell) user keys are often used for granting system access for system administrators, many organizations lack the proper processes for effectively managing them, introducing a number of security risks. This paper highlights ten (10) technical challenges and risks related to public key authentication and how to address them.
Posted: 21 May 2012 | Published: 21 May 2012

SSH Communications Security Corp.

Fundamental Principles of Network Security
sponsored by Schneider Electric
WHITE PAPER: This paper covers the fundamentals of secure networking systems, including firewalls, network topology and secure protocols.
Posted: 10 Jul 2009 | Published: 09 Jul 2009

Schneider Electric

WS_FTP Professional and WS_FTP Server with SSH
sponsored by Ipswitch WhatsUp Gold
DATA SHEET: Secure file transfer products enable businesses to manage data, control access, and securely move files between locations. This white paper highlights how going beyond the basic FTP solutions is necessary for secure and reliable file transfer.
Posted: 01 Aug 2007 | Published: 01 Jul 2007

Ipswitch WhatsUp Gold

Open Trusted Technology Provider Standard (O-TTPS)
sponsored by ComputerWeekly.com
WHITE PAPER: This standard is aimed at enhancing the integrity of commercial off the shelf ICT products and helping customers to manage sourcing risk.
Posted: 10 Apr 2013 | Published: 10 Apr 2013

ComputerWeekly.com

Security Report Card: Do You Meet NIST Standards?
sponsored by LogRhythm, Inc.
WHITE PAPER: The collection, management, and analysis of log data is integral to meeting many NIST-CSF requirements, and precautions taken can be summarized in five words: identify, protect, detect, respond, and recover. This white paper outlines the complete updated NIST-CSF guidelines, and highlights one comprehensive log management and analysis solution.
Posted: 04 Aug 2015 | Published: 31 Dec 2014

LogRhythm, Inc.

The Industry Standards Mystery: Learn What Industry Standards Mean for Your Business
sponsored by IBM
EBOOK: Although industry standards were designed to make business communications simpler, the specific and complex nature of the standards themselves can seem intimidating. In this eBook, readers can gain a more in-depth understanding of industry standards.
Posted: 24 Sep 2015 | Published: 24 Sep 2015

IBM

Facilitating “sound practices” in risk management with IBM OpenPages ORM
sponsored by IBM
WHITE PAPER: This white paper discusses operational risk management (ORM) in the context of "Sound Practices for the Management and Supervision of Operational Risk," a paper from the Basel Committee.
Posted: 08 Feb 2012 | Published: 08 Feb 2012

IBM

Solving the Scalability Problem with Big Data
sponsored by WANdisco
EGUIDE: A centralized computing strategy can keep your organization from realizing the value of big data. In this expert e-guide, learn how embracing a more distributed architecture can solve traditional scalability problems and lead to big data success. Also inside, discover the value of NoSQL options.
Posted: 03 Sep 2013 | Published: 03 Sep 2013

WANdisco
 
 
SECURE SHELL PROTOCOL DEFINITION (continued): …  protocols.SSH is used to securely access and remotely control computers and servers. SSH provides automatic encryption, authentication and compression, facilitating secure rlogin, file transfers and TCP/IP communications. The SSH Working Group endeavors to make certain that SSH is easy to implement at the application level without intensive user interaction. Other goals of the group are to ensure that SSH will always: Provide optimum and continually updated protection against external threats Function efficiently without a global key management or certificate infrastructure Utilize existing … 
Secure Shell Protocol definition sponsored by SearchEnterpriseLinux.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement