Partner Details
Karvaamokuja 2B • 00380 Helsinki • Finland
Email: sales.de@ssh.com
Internet: https://www.ssh.com/
SSH helps organizations safeguard their mission-critical digital assets at rest, in transit, and in use. We have 5,000+ customers worldwide, including 40 percent of Fortune 500 companies, and major organizations in Finance, Government, Retail, and Industrial segments. |
Sponsored Events
Date | Title |
---|---|
May 10 ‑ May 13, 2022 |
Hybrid Event
European Identity and Cloud Conference 2022After more than a decade of successful events in Munich, the European Identity and Cloud Conference will move to Berlin in 2022. For the first time, Europe’s leading identity conference will gather the finest experts from around the world in Germany’s capital. |
Sep 13 ‑ Sep 16, 2021 |
Hybrid Event
European Identity and Cloud Conference 2021The European Identity and Cloud Conference returns fully digitalized, reacting to the global pandemic. We have collected a lot of experience in virtual conferencing throughout 2020 to be able to offer you a safe and hygienic event experience – on-site, virtual, and hybrid. |
Aug 20, 2020 |
Virtual Event
Advanced Privileged Access Management & New TrendsThis virtual event is dedicated to advanced methodologies in Privileged Access Management. Expert speakers and panelists will talk about successfully securing and managing privileged access which is a tough task and is only getting harder to solve. |
May 12 ‑ May 15, 2020 |
Congress
European Identity & Cloud Conference 2020Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers. |
Oct 08 ‑ Oct 10, 2019 |
Conference
CyberNext Summit 2019Cybersecurity is shifting toward more distributed and dynamic models. Decentralized security infrastructure brings its challenges and opportunities. CyberNext Summit (#CNS19) will focus on the capabilities needed to achieve security in such a distributed environment, especially in the context of ever-increasing security threats. |
May 15 ‑ May 18, 2018 |
Congress
European Identity & Cloud Conference 2018Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 15-18, 2018, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers. |
May 09 ‑ May 12, 2017 |
Congress
European Identity & Cloud Conference 2017European Identity & Cloud Conference 2017 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT. The EIC has become a kind of family gathering, the place where the global identity and cloud community meets every year. So take the opportunity to meet IT professionals and colleagues who are involved in this community, get advice from people who are fervent about IAM and Cloud Security. |
Sep 01, 2016 |
Webinar
You Thought Shadow IT Was Bad? Meet Your Company’s Shadow AdministratorsDespite being over 20 years old, Secure Shell (SSH) is still one of the most commonly used methods for both network encryption and secure user authentication. Nearly every server from distributed platforms to mainframes and the majority of network devices include an SSH server as a standard component. Many workstations come equipped with an SSH client, making it one of the most widely available tools for IT professionals. In every organization, SSH is used daily to access remote systems, run automated processes or transfer data over the network. |
May 10 ‑ May 13, 2016 |
Congress
European Identity & Cloud Conference 2016European Identity & Cloud Conference 2016 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT. |
Reports
Date | Title | Price |
---|---|---|
Aug 03, 2017 |
Leadership Compass: Privilege Management - 72330Die führenden Unternehmen im Privilege Management - Markt bezüglich Innovationen, Produktfunktionalität und Marktführerschaft. Wie kann man den Zugriff auf kritische… |
€1295.00 |
Jun 12, 2017 |
Leadership Compass: Privilege Management - 72330Leaders in innovation, product features, and market reach for Privilege Management. How do you control access to your critical systems and business information while allowing secure and… |
€1295.00 |
Videos
Date | Language | Title |
---|---|---|
Aug 21, 2020 |
![]() |
David Wishart: How to Solve the Top 5 Access Management Challenges in Hybrid Cloud EnvironmentsSSH.COM polled 625 IT and application development professionals across the United States, United Kingdom, France, and Germany to find out more about their working practices. We found that cloud and hybrid access solutions, including privileged access management software, slow down daily work for IT and application development professionals. These hurdles encourage users to take risky shortcuts and workarounds that put corporate IT data at risk. Join SSH.COM’s David Wishart, VP Global Partnerships, to learn: Why the user experience of the privileged access management (PAM) solution matters for IT admins and developers in hybrid cloud environments How just-in-time access, without leaving behind credentials, helps towards that goal while improving operational speed |
Aug 21, 2020 |
![]() |
Interview with Dave Wishart |
Sep 02, 2016 |
![]() |
You Thought Shadow IT Was Bad? Meet Your Company's Shadow AdministratorsDespite being over 20 years old, Secure Shell (SSH) is still one of the most commonly used methods for both network encryption and secure user authentication. Nearly every server from distributed platforms to mainframes and the majority of network devices include an SSH server as a standard compo... |
Stay Connected
Latest Research
Trending Videos
How can we help you