SSH to Address Limitations of Perimeter Security at the 2006 Techno Security Conference
May 26, 2006
SSH Inc CEO to Outline Benefits of an End-to-End Security Enterprise Solution
Helsinki, Finland and Wellesley, Mass. - SSH Communications Security Corp. (HEX:SSH1V), a world-leading provider of enterprise security solutions and end-to-end communications security, and the original developer of the Secure Shell protocol, today announced that George Adams, president and CEO of SSH Communications Security Inc., will be speaking at the 2006 Techno Security Conference. Addressing the limitations of relying solely on perimeter security, Adams’ presentation will take place Tuesday, June 6 at 4:30 p.m. in Myrtle Beach, S.C.
Today, the majority of enterprise security initiatives focus on perimeter security, which traditionally consists of a front line of firewalls and anti-virus software. However, with an increasing number of security breaches occurring within the perimeter by employees and other internal sources, relying only on perimeter security is no longer a viable option.
End-to-end communications security is an approach that overcomes the limitations of perimeter-based enterprise security strategies by protecting critical data communications from the source to the destination. Operating between the applications and the IT infrastructure, an end-to-end communications security solution ensures data integrity and enforcement of policy across the enterprise.
In his presentation, Adams will address the inherent restrictions of existing enterprise security approaches amidst new threats and the increasing regulatory environment, and show how end-to-end security and central manageability can provide unparalleled improvement in security against both internal and external threats.
About the 2006 Techno Security Conference
The eighth annual Techno Security Conference is known as a world-class training and networking event with thousands of security and forensics specialists attending from 40 different countries. The conference provides training and networking opportunities and has become a secondary meeting place for many groups over the past seven years. It will offer a considerable number of forensic-based training sessions and labs while offering multiple conference hosting opportunities. More information about the 2006 Techno Security Conference can be found at http://www.techsec.com/html/Techno2006.html.
About SSH Tectia
SSH Tectia is the leading end-to-end communications security solution for the enterprise. The SSH Tectia solution is based on the SSH Secure Shell and SSH’s other industry-leading technologies used by millions worldwide. SSH Tectia enables secure system administration, secure file transfer and secure application connectivity with centralized management throughout the internal and external network. SSH Tectia products provide transparent, strong encryption and authentication, and are available for all key enterprise platforms including Windows, UNIX, Linux, and mainframes to easily integrate into heterogeneous network environments.
About SSH Communications Security
SSH Communications Security is a world-leading provider of enterprise security solutions and end-to-end communications security, and the original developer of the Secure Shell protocol. The company’s SSH Tectia solution addresses the most critical needs of large enterprises, financial institutions, and government agencies. With SSH Tectia, organizations can cost-effectively secure their system administration, file transfers and application connectivity against both internal and external security risks. As the original developer of the Secure Shell protocol and other key network security technologies, SSH has for 10 years developed end-to-end communications security solutions specifically for the enterprise. Currently more than 100 of Global Fortune 500 companies are using SSH security solutions. SSH shares are quoted on the Helsinki Exchanges Main List. For more information, please visit www.ssh.com.
- Contact Information
- Byron Rashed
- SSH Communications Security, Inc.
- Contact via E-mail
This news content was configured by WebWire editorial staff. Linking is permitted.
News Release Distribution and Press Release Distribution Services Provided by WebWire.