You Thought Shadow IT Was Bad? Meet Your Company's Shadow Administrators

Please use your KuppingerCole account to log in or create one, if you don't have it yet.


Despite being over 20 years old, Secure Shell (SSH) is still one of the most commonly used methods for both network encryption and secure user authentication. Nearly every server from distributed platforms to mainframes and the majority of network devices include an SSH server as a standard component. Many workstations come equipped with an SSH client, making it one of the most widely available tools for IT professionals. In every organization, SSH is used daily to access remote systems, run automated processes or transfer data over the network.

Language: English • Duration: 01:00:21 • Resolution: 1280x720

Learn more about this webinar