Extend. Manage. Secure. More than 30 years in the business. Over 65,000 customers.
Home » Resources » Solution Briefs & White Papers » Fortified SSH: A Cost-Effective Way to Safeguard Your Network
Contact Attachmate
1.800.872.2829

Fortified SSH
A Cost-Effective Way to Safeguard Your Network

The threats to enterprise systems and data continue to escalate at an alarming rate. It’s still relatively easy for hackers to break into corporate or government networks and cause irreversible damage. The risks aren’t limited to data exposure, but also include threats to data integrity, access, and authentication.

One of the products at the forefront in the war to keep data secure is a small, robust, easy-to-configure software solution called Secure Shell, or SSH. SSH is a set of tools based on the SSH protocol. The main purpose of SSH is to securely transmit data over network connections using strong encryption and authentication methods. SSH is a replacement for nonsecure Telnet, FTP, X11, and Berkeley r-commands (rlogin, rcp, and rsh)—all of which transmit data in the clear.

This paper provides an in-depth look at SSH—the features that give it such power, how it counters attacks, and when it will not help.

Open the PDF to read the full brief.