SAP Selects SSH Tectia for Secure Server Access
SSH Tectia Helps SAP Protect Large-Scale, Heterogeneous Server Environment
Helsinki, Finland and Wellesley, Mass. - April 3, 2006, SSH Communications Security Corp. (HEX:SSH1V), a world-leading provider of enterprise security solutions and end-to-end communications security, and the original developer of the Secure Shell protocol, today announced that SAP AG, the world’s leading provider of business software solutions, has chosen SSH Tectia to secure data communications in its internal network.
SSH Tectia provides SAP with an enterprise-class security solution for encrypting and authenticating all system administration, file transfer, and other application connections throughout heterogeneous environments consisting of Windows, Unix, Linux, and IBM mainframes. The initial deployment took place in January when SSH Tectia was successfully rolled out to 1,700 Windows servers in the SAP developer network.
The total cost of ownership was one of the key reasons why SAP selected SSH Tectia as the platform for securing internal data communications. Based on extensive product evaluations, competing solutions, including products based on open-source software, were too costly to maintain and support, and could not offer SAP the same level of enterprise-class functionality as SSH Tectia.
“Due to the size and diversity of SAP’s network, we were looking for a flexible security solution that provides seamless integration with multiple operating systems and authentication methods,” said Matthias Kaempfer, Solution Architect, SAP AG. “SSH Tectia with its broad platform support, adaptable authentication, robust product architecture, and responsive support services was the only solution to meet all these requirements. “
“We are proud that SAP selected SSH Tectia for securing their data communications,” said Arto Vainio, CEO of SSH Communications Security. “Close co-operation with globally leading enterprises like SAP during their evaluation, deployment, and production phases will result in constant product improvement that benefits all large SSH Tectia customers. It also strengthens the role of SSH Tectia as the leading enterprise-class Secure Shell solution.”
About SSH Tectia
SSH Tectia is the leading end-to-end communications security solution for the enterprise. The SSH Tectia solution is based on the SSH Secure Shell and SSH’s other industry-leading technologies used by millions worldwide. SSH Tectia enables secure system administration, secure file transfer, and secure application connectivity with centralized management throughout the internal and external network. SSH Tectia products provide transparent strong encryption and authentication, and are available for all key enterprise platforms including Windows, Unix, Linux and mainframes to easily integrate into heterogeneous network environments.
About SSH Communications Security
SSH Communications Security is a world-leading provider of enterprise security solutions and end-to-end communications security, and the original developer of the Secure Shell protocol. The company’s SSH Tectia solution addresses the most critical needs of large enterprises, financial institutions, and government agencies. With SSH Tectia, organizations can cost-effectively secure their system administration, file transfers and application connectivity against both internal and external security risks. As the original developer of the Secure Shell protocol and other key network security technologies, SSH has for 10 years developed end-to-end communications security solutions specifically for the enterprise. Currently more than 100 of Global Fortune 500 companies are using SSH security solutions. SSH shares are quoted on the Helsinki Exchanges Main List. For more information, please visit www.ssh.com.
© 2006 SSH Communications Security Corp. All rights reserved. ssh® is a registered trademark of SSH Communications Security Corp in the United States and in certain other jurisdictions. All other names and marks are property of their respective owners.
Any statements contained in this document that are not historical facts are forward-looking statements as defined in the U.S. Private Securities Litigation Reform Act of 1995. Words such as “anticipate,” “believe,” “estimate,” “expect,” “forecast,” “intend,” “may,” “plan,” “project,” “predict,” “should” and “will” and similar expressions as they relate to SAP are intended to identify such forward-looking statements. SAP undertakes no obligation to publicly update or revise any forward-looking statements. All forward-looking statements are subject to various risks and uncertainties that could cause actual results to differ materially from expectations The factors that could affect SAP’s future financial results are discussed more fully in SAP’s filings with the U.S. Securities and Exchange Commission (“SEC”), including SAP’s most recent Annual Report on Form 20-F filed with the SEC. Readers are cautioned not to place undue reliance on these forward-looking statements, which speak only as of their dates.
Copyright © 2006 SAP AG. All rights reserved. SAP, SAP NetWeaver and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG in Germany and in several other countries all over the world. All other product and service names mentioned are the trademarks of their respective companies. Data contained in this document serve informational purposes only. National product specifications may vary.
- Contact Information
- Byron Rashed
- Americas Contact
- SSH Communications Security Corp.
- Contact via E-mail
This news content was configured by WebWire editorial staff. Linking is permitted.
News Release Distribution and Press Release Distribution Services Provided by WebWire.