You Thought Shadow IT Was Bad? Meet Your Company’s Shadow Administrators

  • LANGUAGE: English DATE: Thursday, September 01, 2016 TIME: 11:00am CEST
Upcoming Webinars
You Thought Shadow IT Was Bad? Meet Your Company’s Shadow Administrators

How lax infrastructure management may turn the ubiquitous security tool into a ticking time bomb

Despite being over 20 years old, Secure Shell (SSH) is still one of the most commonly used methods for both network encryption and secure user authentication. Nearly every server from distributed platforms to mainframes and the majority of network devices include an SSH server as a standard component. Many workstations come equipped with an SSH client, making it one of the most widely available tools for IT professionals. In every organization, SSH is used daily to access remote systems, run automated processes or transfer data over the network.

Unfortunately, as opposed to traditional certificate-based public key infrastructures, SSH does not require nor define a central authority for key management, and most organizations leave these functions to end users. With time, this has led to uncontrolled proliferation of keys spread across a large number of servers, devices and workstations, which makes it increasingly difficult to keep track of them, control who has access to where and revoke previously granted access rights.

Can you even tell how many SSH keys are currently deployed across your corporate network? Dozens? Hundreds? For a large enterprise the number is likely to be closer to a million or more. And what access those keys enable, where and to whom? Each of those keys can be a potential security risk or compliance violation. And can you be sure that revoking this particular key won’t disrupt a critical business process somewhere?

This KuppingerCole Webinar covers the following topics:

  • The range of applications of the SSH protocol in modern IT;
  • The fundamental difference between SSH and Enterprise PKI;
  • Security risks and compliance challenges related to unmanaged SSH infrastructures;
  • Automation as the crucial component of SSH management;

In the first part of this webinar, Alexei Balaganski, Lead Analyst at KuppingerCole, will present an overview of the security and compliance risks of unmanaged SSH keys and demonstrate how severely underestimated this problem is in many organizations.

In the second part, Kalle Jääskeläinen, Vice-president for Enterprise Key Management at SSH Communications Security, will present a solution to this challenge, which combines discovery, monitoring and automated management of SSH infrastructures across multiple platforms.


Alexei is an analyst with specific focus on cybersecurity. His deep technical understanding allows him to support customers even with complex architectural and security challenges. Previously he has served as KuppingerCole's CTO. After graduating with an MSc degree in Mathematics and...

Lead Sponsor

SSH.COM is one of the most trusted cyber security mavericks. We foster a culture of innovation and purpose-driven engineering to secure access to the digital core.

Since inventing the SSH protocol in 1995, we’ve been safeguarding the digital economy. 3000+ security-aware customers, ranging from “digital-borns” to the world´s largest banks & fortune 500 enterprises, trust our expertise.

Our product promise is built-on the principles of zero-inertia, zero-friction and zero-credential risk.

Watch now


Popular Webcasts

Next Webinar


Solving Problems in Privileged Access Management with Automation

While businesses race ahead with digital transformation, security and identity management are often being left behind. The complexity of modern organizations of all sizes has undermined the traditional concepts of privileged access management (PAM) and privileged account usage. Help desks and IT security teams are often too busy and understaffed to be able to give PAM the attention it deserves.

Next Conference


European Identity & Cloud Conference 2020

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

Next Seminar


KC Master Class - PAM for the 2020s

Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password management and automatic rotation, enforcement of the least privilege principle, vulnerability identification, risk management, central analysis, session management and monitoring, and efficient, comprehensive auditing. In four chapters, you will receive a multi-channel training including interactive online sessions, up-to-date research documents and an all-day workshop with final exam at the European Identity & Cloud Conference 2020 in Munich, Germany. Step-by-step KuppingerCole Analysts will turn you into a PAM Master that meets and exceeds privileged access management challenges of the 2020s!

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00