Bob Thomas, Enterprise Systems Media
Tatu Ylönen, SSH Communications Security
Kalle Jaaskelainen, SSH Communications Security
Enterprises have accumulated SSH credentials for 20 years and they have gone under the radar for most IAM projects. Today, many organizations have hundreds of SSH credentials per server – typically 90% of them unused and granting root access.
SSH is used in every data center, in every enterprise for network management, system administration, file transfers, and configuration automation.
SSH keys can be used for stealthy attacks, spread from server to server and data center to data center – including backups and disaster recovery. Think government hackers, think hacktivists, think ransomware, think cyberwarfare – enterprise-wide, impacting most critical servers and data. This webinar will help you understand the problem and how to approach solving it.
This webinar is sponsored by Software Diversified Services (SDS) in partnership with SSH Communications Security.