SSH Secure Shell for Workstations
May 01, 2003
SSH Communications Security, Inc.Product:
- Ease of Use:
- Value for Money:
- Overall Rating:
From the end-user perspective easy to use and navigate.
It lacked documentation in paper form on this occasion, although we know that this is usually of a high standard.
A solid and worthwhile approach to remote authentication for both user and organizational data security.
We have looked at solutions that are purely based within the teleworker's domain, but we are also taking the view that some organizations of the larger variety may wish to impose server-based network and system security solutions on their remote users.
From the teleworker's viewpoint, if these products are centrally installed and the end result is easy to use and secure then it will have achieved its objective, but that is not to say it will be the only required security solution for the user to contend with. Here we look at a means to provide strong authentication and have a secure file transfer system in place.
SSH Secure Shell for Workstations is the client-side application of SSH Secure Shell (see our March internet security Group Test) and basically sits on your employee's machine so that while they are teleworking all communications between the office are secure.
SSH Secure Shell for Workstations works both in the Windows and Unix environment and when ordering the software you can choose your preferred OS. It provides transparent authentication and encryption and enables files to be transferred securely to and from your server.
The workstation GUI is both intuitive and easy to use. This will encourage your users to perform secure file transfers by drag-and-dropping files to and from the remote server, making it the most simple of tasks.
Users also benefit from interoperability with PKI and RSA SecurID, which they may already be familiar with. Of course, many end-users are not that IT literate, but this solution really is easy to use. Once installed, which entails following the online prompts, it is ready to roll.
The Windows version of SSH Secure Shell for Workstations 3.2 is bundled with SSH Accession Lite. This provides the authentication agent, which gives easy and efficient authentication methods using public-key cryptography, and does not require a password.
For the organization that has both the need for solid security and flexible working this solution is going to sit well on the administrator's wish list. It is a practical and highly scaleable system of authentication using powerful encryption. It also offers, for those larger and more distributed companies, a choice of several languages for their users.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Senior Security Engineer
Loveworklife Recruitment - United Kingdom
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Microsoft update left Azure Linux virtual machines open to hacking
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- 9.2 million medical records for sale on darkweb
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?
- 90% of ITDMs believe IAM is crucial to digital transformation success
- Research: Hacked companies could see customer exodus if breached
- Misconfigured drive exposes locations of explosives used by oil industry