Centralize and automate oversight of SSH keys
Learn how Universal SSH Key Manager resolves problems associated with Identity Access Management (IAM). This educational and complimentary webinar discusses:
- 2017 data access and compliance survey results
- SSH keys – the gaping hole in IAM
- Universal SSH Key Manager information & demo
Bob Thomas, Enterprise Systems Media
Tatu Ylönen, SSH Communications Security
Kalle Jaaskelainen, SSH Communications Security
Enterprises have accumulated SSH credentials for 20 years and they have gone under the radar for most IAM projects. Today, many organizations have hundreds of SSH credentials per server – typically 90% of them unused and granting root access.
SSH is used in every data center, in every enterprise for network management, system administration, file transfers, and configuration automation.
SSH keys can be used for stealthy attacks, spread from server to server and data center to data center – including backups and disaster recovery. Think government hackers, think hacktivists, think ransomware, think cyberwarfare – enterprise-wide, impacting most critical servers and data. This webinar will help you understand the problem and how to approach solving it.
This webinar is sponsored by Software Diversified Services (SDS) in partnership with SSH Communications Security.