Courses

The Merging Worlds of Identity Access Management and Data Security

Who best to learn from about running a successful SSH key management project and how to manage and monitor encrypted traffic? We are the company behind the protocol and yeah, you could say we know a couple of things about encrypted traffic.

We are pleased to offer you on-line or webinar based “courses” to help you with the tasks of running a successful SSH key management project and to demonstrate how you can gain control around privileged access within your network.

Webcast Spotlight

How can you easily determine where your keys are located and how can you get control of the people using them?

The Myth of Key Discovery
demo

featured Courses

1 5 June

Risk Reduction in SSH Key Management

Learn More
Matthew McKenna

Chief Strategy Officer
SSH Communications Security
@ProtocolPirate

demo

Gaining the Benefits of Risk Reduction for your SSH Key Management Project

0300pm - 0400pm

Live Webcast EEST TIME ZONE EMEA & APAC

Too often enterprises want to boil the ocean when it comes to reducing risk related to SSH user key based access. In this session, you will learn how to approach SSH user key and access management control and remediation in a controlled risk based approach with minimum disruption to your existing IT operations and processes.

Register
demo

featured Courses

1 3 July

Own Your SSH? Or Pwned by SSH? A Lesson in Compliance

Learn More
Fuoad Khalil

Director of Compliance
SSH Communications Security

demo

Compliance & SSH Key Management

0300pm - 0400pm

Live Webcast EEST TIME ZONE EMEA & APAC

Who is accountable for SSH related key-based access in your organization? In many enterprises, this is not clear. In this session, we approach the challenge of SSH user key-based access from the perspective of compliance.

Register
demo

featured Courses

2 8 July

WHY YOUR FIREWALL ISN'T NEXT-GEN

Learn More
Craig Riddell

Principal Security Sales Engineer
SSH Communications Security

Encrypted Privileged Access Control as an Extension of Your Firewall

0300pm - 0400pm

Live Webcast EEST TIME ZONE EMEA & APAC

With the perimeters of access becoming more nebulous, the approaches we apply to controlling encrypted privileged access and data transfers must be reconsidered. During this session you will learn how privileged access control for encrypted access can be achieved at a network level as an extension of our existing firewall infrastructures without the need of deploying agents and re-architecting network design.

Register