SSH Delivers New SSH Tectia® Guardian 2.0, with Powerful New Policy Control, Authentication, and Protocol Inspection Capabilities. HELSINKI, FINLAND and WELLESLEY, Mass. - October 6, 2009 SSH Communications Security (HEX:SSH1V), a world-leading provider of enterprise security solutions and end-to-end communications security, today announced the availability of SSH Tectia® Guardian 2.0, a major feature upgrade to its technology solution that enables real-time session monitoring with Intrusion Detection System (IDS) and Data Loss Prevention (DLP) integration capabilities. SSH Tectia Guardian provides a proactive set of security controls for critical data channels to minimize the risk of security breaches. It is a unique governance tool, which integrates into IDS solutions for a layered security approach. Strict IDS requirements have in the past prevented the use of encryption in certain critical environments, but with SSH Tectia Guardian, end-to-end encryption can be utilized between any hosts, without the threat of malicious use of encrypted channels. SSH Tectia Guardian is the only solution to log and record every session, and to perform a step-by-step inspection and auditing of both encrypted and unencrypted traffic. Detailed access reports ease the burden of auditing and provide accountability of file transfers and remote access. Full archival and playback of sessions create a valuable forensics tool. The new features include support for auditing and replaying RDP6, VNC, and T3270 protocols, as well as X11 traffic forwarded in Secure Shell connections. These new protocols add to the existing Secure Shell (SSH), RDP5, and Telnet inspection capabilities. SSH Tectia Guardian 2.0 further adds powerful capabilities for enforcing the four-eyes principle, enabling out-of-band authentication, authorization, and real-time monitoring of audited and encrypted connections. Advanced authentication options for audited traffic now include user mapping, key-bridging for x.509 certificates and public keys, as well as LDAP and RADIUS authentication. Improved audit reporting capabilities enable custom reports and full listings of commands executed by power users within encrypted terminal sessions. “Security policies and standards, such as the PCI DSS, require organizations to implement both encrypted channels, as well as policy enforcement and accountability controls, for its power users” said Jari Mielonen, CEO of SSH Communications Security Corp. “SSH Tectia Guardian enables organizations to encrypt their most critical data flows, without a tradeoff in intrusion detection, traffic inspection, or auditing capabilities”. SSH Tectia Guardian 2.0 is available today directly from SSH Communications Security, and from its global network of distribution partners. Visit www.ssh.com for more information. About SSH Tectia SSH Tectia solutions are based on enterprise-class security software and services. SSH Tectia provides managed and secure file transfer, auditing, monitoring, application connectivity, and system administration. The SSH Tectia software runs on key enterprise operating systems ranging from Windows to Unix and IBM mainframes. They are built on a distributed, versatile, and scalable platform, with a proven and successful deployment track record at many of the world's largest financial institutions, enterprises, and government agencies. The SSH Tectia platform scales flexibly to both large global environments and small and midsize deployments. SSH also offers professional services for evaluating, planning, and deploying the secure file transfer infrastructure with security audits and forensics. About SSH Communications Security SSH Communications Security Corp. enables its customers to secure, automate and govern their vital business information flows in corporate and public networks. We provide innovative solutions that consist of software and services. Our solution is unique in its ability to seamlessly adapt to the existing infrastructure and business processes, and in its flexibility to cost-effectively accommodate changes and extensions to the business environment. SSH has operations in the Americas, Europe and APAC, with headquarters located in Finland. SSH was established in 1995, and its shares are quoted on the NASDAQ OMX exchange, under the trading code of SSH1V. For more information, please visit www.ssh.com. # # # SSH Corp. PR Contact: Jouni Leinonen SSH Corp. +358 20 500 7540 jouni.leinonen@ssh.com Global Marketing Contact: Tommi Lampila SSH Corp. +1 781 247 2106 tommi.lampila@ssh.com Investor Relations Contact: Mikko Karvinen SSH Corp. +358 20 500 7419 mikko.karvinen@ssh.com © 2009 SSH Communications Security Corp. All rights reserved. ssh® and Tectia® are registered trademarks of SSH Communications Security Corp in the United States and in certain other jurisdictions. The SSH and Tectia logos are trademarks of SSH Communications Security Corp and may be registered in certain jurisdictions. All other names and marks are the property of their respective owners.
Groundbreaking New Features and Expanded Protocol Support for the SSH Governance and Compliance Solution
| Source: SSH Communications Security Oyj