You Thought Shadow IT Was Bad? Meet Your Company’s Shadow Administrators

  • LANGUAGE: English DATE: Thursday, September 01, 2016 TIME: 11:00am CEST
Upcoming Webinars
You Thought Shadow IT Was Bad? Meet Your Company’s Shadow Administrators How lax infrastructure management may turn the ubiquitous security tool into a ticking time bomb

Despite being over 20 years old, Secure Shell (SSH) is still one of the most commonly used methods for both network encryption and secure user authentication. Nearly every server from distributed platforms to mainframes and the majority of network devices include an SSH server as a standard component. Many workstations come equipped with an SSH client, making it one of the most widely available tools for IT professionals. In every organization, SSH is used daily to access remote systems, run automated processes or transfer data over the network.

Unfortunately, as opposed to traditional certificate-based public key infrastructures, SSH does not require nor define a central authority for key management, and most organizations leave these functions to end users. With time, this has led to uncontrolled proliferation of keys spread across a large number of servers, devices and workstations, which makes it increasingly difficult to keep track of them, control who has access to where and revoke previously granted access rights.

Can you even tell how many SSH keys are currently deployed across your corporate network? Dozens? Hundreds? For a large enterprise the number is likely to be closer to a million or more. And what access those keys enable, where and to whom? Each of those keys can be a potential security risk or compliance violation. And can you be sure that revoking this particular key won’t disrupt a critical business process somewhere?

This KuppingerCole Webinar covers the following topics:

  • The range of applications of the SSH protocol in modern IT;
  • The fundamental difference between SSH and Enterprise PKI;
  • Security risks and compliance challenges related to unmanaged SSH infrastructures;
  • Automation as the crucial component of SSH management;

In the first part of this webinar, Alexei Balaganski, Lead Analyst at KuppingerCole, will present an overview of the security and compliance risks of unmanaged SSH keys and demonstrate how severely underestimated this problem is in many organizations.

In the second part, Kalle Jääskeläinen, Vice-president for Enterprise Key Management at SSH Communications Security, will present a solution to this challenge, which combines discovery, monitoring and automated management of SSH infrastructures across multiple platforms.


Alexei is an analyst with specific focus on cybersecurity. His deep technical understanding allows him to support customers even with complex architectural and security challenges. Previously he has served as KuppingerCole's CTO. After graduating with an MSc degree in Mathematics and...

Lead Sponsor

SSH.COM is one of the most trusted cyber security mavericks. We foster a culture of innovation and purpose-driven engineering to secure access to the digital core.

Since inventing the SSH protocol in 1995, we’ve been safeguarding the digital economy. 3000+ security-aware customers, ranging from “digital-borns” to the world´s largest banks & fortune 500 enterprises, trust our expertise.

Our product promise is built-on the principles of zero-inertia, zero-friction and zero-credential risk.

Watch now


Popular Videos

Next Webinar


New Methods to Accelerate Endpoint Vulnerability Remediation

IT endpoints are no longer just workstations and servers confined to corporate headquarters, branch offices, customer sites, and data centers, they can now be just about anything located anywhere, from employee homes to airports, hotels and in the cloud. But every endpoint represents a potential entry point for cyber attackers, and needs to be managed.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00