SSH Financial Services Company Gains Visibility & Control Over External Contractors Case Study
For this Financial Services company, controlling access to confidential data is not only crucial to the security of the business, but also mandated by national and international regulation. With over 400,000 financial transactions in excess of several billion USD…
SSH Monitor, Audit & Control Privileged Users in the Cloud Case Study
The customer serves thousands of customers worldwide and is a leading provider of application development, consulting services, product development and cloud hosting. Their customer base consists a number of verticals including government, financial, energy, healthcare, manufacturing, retail and media….
SSH Solution Case Study
As part of a system update, Tamro Corporation decided to upgrade security for its file transfer operations. Since a key requirement was also to ensure compliance with public accountability regulations, the company chose SSH to secure the sharing of…
SSH Key Mobile ID Case Study
A government agency in Singapore needed a flexible and easily-deployed secure authentication solution for its system administrators. SSH solutions allowed the organization to ensure that the right people had access to its mission-critical data with minimal intervention. Complete the…
SSH Key Manager Case Study
In order to meet the challenges of a deadline driven environment, this leading news and media organization needed to streamline provisioning and access controls for application developers and IT staff. Complete the form to download this resource in full.
SSH Tectia Mainframe Case Study
A global automobile manufacturer with major operations in Europe and North America needed to replace numerous batch processes sending data in the clear with secure, encrypted file transfers. Using SSH Communications Security Tectia Solutions for Mainframe z/OS, this global…
SSH Andritz Group Case Study
ANDRITZ GROUP integrated SSH MobileID with VPN access to provide an intuitive, administration- free, and tokenless two-factor authentication for its mobile workforce and partners. Complete the form to download this resource in full.
SSH Cloud Security Case Study
Clearmanage has already implemented security tools and appropriate encryption to protect sensitive information in-transit and in-storage in the cloud environment; however, being able to monitor privileged user activities in the encrypted networks presents an additional layer of complexity. In…
Secure Islands Data Interceptor for Opentext
Secure Islands Data Immunization concept focuses on the data itself, rather than trying to control the users, channels or storage. Uniquely embedding persistent classification and protection within the data itself at the moment of creation or initial organizational access,…
Secure Islands IQProtector for ISO 27001 Compliance
ISO 27001 certification is rapidly becoming a requirement to do business with many major multinationals. Even in situations where certification is not strictly required, vendors who are certified are preferred. But beyond this, achieving ISO 27001 compliance is an…

















