Back to Congress
Latest Sponsored Events
Related Videos
Event Recording
Aug 21, 2020
David Wishart: How to Solve the Top 5 Access Management Challenges in Hybrid Cloud Environments

SSH.COM polled 625 IT and application development professionals across the United States, United Kingdom, France, and Germany to find out more about their working practices. We found that cloud and hybrid access solutions, including privileged access management software, slow down daily work for IT and application development professionals. These hurdles encourage users to take risky shortcuts and workarounds that put corporate IT data at risk. 

Join SSH.COM’s David Wishart, VP Global Partnerships, to learn:

  • Why the user experience of the privileged access management (PAM) solution matters for IT admins and developers in hybrid cloud environments
  • How just-in-time access, without leaving behind credentials, helps towards that goal while improving operational speed
Event Recording
Aug 21, 2020
Interview with Dave Wishart
Webinar Recording
Sep 02, 2016
You Thought Shadow IT Was Bad? Meet Your Company's Shadow Administrators
Despite being over 20 years old, Secure Shell (SSH) is still one of the most commonly used methods for both network encryption and secure user authentication. Nearly every server from distributed platforms to mainframes and the majority of network devices include an SSH server as a standard component. Many workstations come equipped with an SSH client, making it one of the most widely available tools for IT professionals. In every organization, SSH is used daily to access remote systems, run automated processes or transfer data over the network.