Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Black Hat

SSH Launches CryptoAuditor to Harden SFTP, RDP, and Secure Shell Traffic

Black Hat 2012

Black Hat 2012

LAS VEGAS – BLACK HAT USA – The company responsible for the SSH protocol, SSH Communications Security, announced a new product from the show floor at Black Hat this morning in Las Vegas. Called CryptoAuditor, the offering is the second one released this year as part of SSH’s information assurance platform, following the release of the Universal SSH Key Manager during the RSA Conference.

SSH LogoCryptoAuditor will help prevent data loss across encrypted secure shell, RDP, and SFTP traffic, the company explained in a press release. When combined with their Universal SSH Key Manager, the two will work alongside any existing security and auditing setups, including DLP and SIEM. Both modules employ key management capabilities, including group-based access controls and automatic key discovery, deployment and removal.

“Our platform’s key management capabilities provide controls over who can gain access to what information in secure shell environments,” said Jason Thompson, SSH director of global marketing.

“By combining our key management capabilities with CryptoAuditor, organizations will see immediate ROI by solving issues surrounding auditing, control and key management.”

SSH Communications Security will be in Las Vegas during the Black Hat security briefings, and more details on their information assurance platform is available here

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Black Hat

Black Hat 2019 recently wrapped in Las Vegas, where somewhere between 15,000 and 20,000 experts descended to experience the latest developments in the world...

Black Hat

Cris Thomas, also known as Space Rogue, was a founding member of the Lopht Heavy Industries hacker collective.

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...