SSH Communications Solutions Lower Cost, Ease Deployment Of Securing Data

SSH Communications Security Corp. recently announced the general availability of SSH Tectia Client 6.0, SSH Tectia Server 6.0, SSH Tectia Manager 6.0 and the new SSH Tectia ConnectSecure 6.0.

The company will showcase the products at Booth 1535 during GovSec, U.S. Law and Ready.

Enterprises and government agencies are faced with increasing pressure from regulations such as PCI DSS and SOX, as well as internal and external audits to secure their mission-critical data. SSH Tectia 6.0 is an ideal solution for organizations that need to secure their file transfers and data-in-transit to help achieve regulatory compliance and meet government mandates with minimal resource overhead.

Leveraging SSH's in-depth experience with major network security deployments and the pervasive Secure Shell protocol itself, SSH Tectia ConnectSecure 6.0 works with any commercial SSH or openSSH server product, thereby significantly expanding the range of enterprises, financial institutions, major retailers, and government agencies that can easily leverage the new cost-saving features. SSH Tectia ConnectSecure includes automatic and transparent FTP to SFTP conversion, Transparent FTP Tunneling, and Transparent TCP Tunneling modules, which enable organizations to secure their business-critical data without modifications to their existing network infrastructure or applications. SSH Tectia ConnectSecure also includes key features to ease migration and is available on Unix, Linux and Windows platforms.

SSH Tectia Client, Server and ConnectSecure, combined with SSH Tectia Manager, enable IT departments to replace unsecure protocols with proven secure file transfer and data-in-transit protocols in hours or days, rather than weeks or months.

SSH Tectia Manager 6.0 can centrally deploy, configure, update, and audit the SSH Tectia environment from a central location, providing a cost-effective solution for large enterprises by drastically reducing the cost to upgrade, patch, and change security policies and by easing the auditing burdens placed on IT resources.

“SSH's focus over the last years has been on providing secure file transfer and data-in-transit solutions for companies and government agencies with large heterogeneous networks”, said Arto Vainio, CEO of SSH Communications Security. “These organizations have rigorous security requirements and need to comply with regulations such as PCI DSS and SOX. The enhancements in SSH Tectia 6.0 including the new SSH Tectia ConnectSecure provide major enhancements to address the increasing need for cost-effective security solutions for these complex and demanding environments, as well as significantly helping our broad installed base of existing SSH Tectia customers to smoothly grow their environments.”

With the new release of SSH Tectia 6.0, enterprises can implement high-performance secure automated file transfer, secure application connectivity and secure system administration throughout heterogeneous networks comprising Windows, Unix, Linux, and IBM mainframe systems. SSH Tectia can be centrally managed with SSH Tectia Manager enabling IT teams to deploy security policies faster and to swiftly respond to security attacks, helping enterprises to reduce the total cost of ownership and to ensure regulatory compliance.

Featured

  • AI Is Now the Leading Cybersecurity Concern for Security, IT Leaders

    Arctic Wolf recently published findings from its State of Cybersecurity: 2025 Trends Report, offering insights from a global survey of more than 1,200 senior IT and cybersecurity decision-makers across 15 countries. Conducted by Sapio Research, the report captures the realities, risks, and readiness strategies shaping the modern security landscape. Read Now

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

  • Motorola Solutions Named Official Safety Technology Supplier of the Ryder Cup through 2027

    Motorola Solutions has today been named the Official Safety Technology Supplier of the 2025 and 2027 Ryder Cup, professional golf’s renowned biennial team competition between the United States and Europe. Read Now

  • Evolving Cybersecurity Strategies

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.