温馨提示:本站仅提供公开网络链接索引服务,不存储、不篡改任何第三方内容,所有内容版权归原作者所有
AI智能索引来源:http://www.ssh.com/about/history
点击访问原文链接

SSH History - Part 1

SSH History - Part 1 About us Investors Partners Careers Solutions SOLUTIONS Zero Trust Suite Quantum-Safe Cryptography (QSC) SalaX Secure Collaboration Security Risk Assessment, Quantification & Mitigation By Topic Just-in-Time Access Secure vendor access Credentials & Secrets Management Hybrid & multi-cloud access management Interactive tour: Privileged Access in the Cloud M2M connections IT Audits & Compliance Secure file transfer By Industry Managed Service Providers (MSP) Operational Technology (OT) Federal Government Security Products SECURE ACCESS & SECRETS MANAGEMENT SECURE FILE TRANSFER & ENCRYPTION NQX™ quantum-ready encryption Tectia™ SSH Client/Server Tectia™ z/OS SalaX Secure Collaboration Secure Mail 2024 Secure Messaging 2024 SalaX Secure Collaboration Solutions SOLUTIONS PrivX Zero Trust Suite SalaX Secure Collaboration Strong ID-based access with Entra ID & Zero Trust Suite Quantum-Safe Cryptography (QSC) Security Risk Assessment, Quantification & Mitigation Device trust & access and identity verification Identity-based authentication & converged IAM and PAM TOPICS Just-in-Time Access Secure vendor access Credentials & Secrets Management Hybrid & Multi-Cloud Access Management Interactive tour: Privileged Access in the Cloud M2M Connections Management IT Audits & Compliance Secure File Transfer INDUSTRIES Managed Service Providers (MSP) Operational Technology (OT) Federal Government Security Healthcare Data Security OT Security IT/OT convergence of data & systems Zero Trust Access and ZSP Workflow approvals Secure remote access  Secure patch management  OT Compliance Discovery and threat intelligence Phishing-resistant MFA & device trust Products SalaX SECURE COLLABORATION Secure Mail Secure Messaging Secure Sign SalaX Secure Collaboration FQX File Encryptor SECURE ACCESS & SECRETS MANAGEMENT PrivX™ PAM PrivX™ OT Edition PrivX Key Manager SECURE FILE TRANSFER & ENCRYPTION Tectia™ SSH Server Tectia™ SSH Server for IBM z/OS PrivX Desktop NQX™ quantum-safe encryption Services SSH Risk Assessment™ Professional Services Support Contact us Customer cases PrivX Zero Trust PAM Enterprise Key Management UKM Tectia SFTP for servers & mainframes SSH Secure Collaboration Resources SSH Academy Content library Blog References Press releases Downloads Manuals Events & Webinars Media Legal Report a vulnerability Solutions SOLUTIONS PrivX Zero Trust Suite SalaX Secure Collaboration Strong ID-based access with Entra ID & Zero Trust Suite Quantum-Safe Cryptography (QSC) Security Risk Assessment, Quantification & Mitigation Device trust & access and identity verification Identity-based authentication & converged IAM and PAM TOPICS Just-in-Time Access Secure vendor access Credentials & Secrets Management Hybrid & Multi-Cloud Access Management Interactive tour: Privileged Access in the Cloud M2M Connections Management IT Audits & Compliance Secure File Transfer INDUSTRIES Managed Service Providers (MSP) Operational Technology (OT) Federal Government Security Healthcare Data Security OT Security IT/OT convergence of data & systems Zero Trust Access and ZSP Workflow approvals Secure remote access  Secure patch management  OT Compliance Discovery and threat intelligence Phishing-resistant MFA & device trust Products SalaX SECURE COLLABORATION Secure Mail Secure Messaging Secure Sign SalaX Secure Collaboration FQX File Encryptor SECURE ACCESS & SECRETS MANAGEMENT PrivX™ PAM PrivX™ OT Edition PrivX Key Manager SECURE FILE TRANSFER & ENCRYPTION Tectia™ SSH Server Tectia™ SSH Server for IBM z/OS PrivX Desktop NQX™ quantum-safe encryption Services SSH Risk Assessment™ Professional Services Support Contact us Customer cases PrivX Zero Trust PAM Enterprise Key Management UKM Tectia SFTP for servers & mainframes SSH Secure Collaboration Resources SSH Academy Content library Blog References Press releases Downloads Manuals Events & Webinars Media Legal Report a vulnerability About us Investors Partners Careers About us Strategy History People Awards Patents Analysts Press Blog SSH history After a password-sniffing attack at his university network, Tatu Ylönen designed the first version of the Secure Shell (SSH) protocol. 30 years later, more than 95% of the servers used to power the internet have SSH installed. The internet as we know is largely managed using SSH.

But how did this all happen? How did the protocol become a cornerstone of a safe internet, and what does a European Commissioner or a lego brick have to do with it?

A hacking incident was the mother of invention “How can I use the internet safely? What can I do not to be afraid?” Tatu Ylönen, the founder of the defensive cybersecurity company SSH, witnessed a hacking incident in the Finnish university network, and that made him wonder. It was 1995, and the internet was becoming more and more crucial part of every organization’s operations, but there still was not a way to use it securely.

“I was a university researcher at the time, and I didn’t know anything about cryptography. But I read a book about it, had some conversations with friends and in three months, I came up with a program called SSH.”

Ylönen published SSH as open source in the summer of 1995 to fill a significant void in cryptography. With SSH, it was possible to operate network services securely over an unsecured network by building a channel over it. That was a long-awaited solution not only to password sniffing but some other major cybersecurity issues as well, but not everyone was happy about it. “I was quite nervous. I knew I was stepping on the toes of some important people. What if they wanted to put me aside one way or another?”

At the time, there was a large debate about cryptography overall. The US was heavily lobbying for restraining encryption in Europe for cyberwarfare reasons. “I didn’t think that one party having all the information and an ability to wipe out systems was a good idea – sooner or later the system would have been abused. In other words, I had major political motivations for publishing SSH as freeware.”

“Luckily, it took only two weeks and the protocol had gained such popularity, there was no sense in wiping me out anymore” Ylönen laughs. “I started getting around 150 emails a day. Even huge organizations, such as the University of California, were asking for my help to implement SSH.”

The protocol became surprisingly widespread for a reason: it was easy to use and did not need a centralized infrastructure to work. Funnily enough, it also didn’t need passwords. Still, there were a lot of organizations that were approaching Ylönen commercial applications in mind. Consequently, Ylönen founded SSH Communications Security Corp 31st of December in 1995.

"First came the protocol, then the company. The rest is history.” “It took off virally, absolutely virally”, says Sam Curry, a cybersecurity pioneer. “SSH filled a crucial niche at a time when no one else had anything. The ability for people with hard jobs to create trusted links on demand easily and without having to go to anybody else for approval… No wonder the company has almost an unfair authority when discussing the protocol.”

SSH had some large-scale customers since the very beginning, from universities to corporations. Regardless of the success, the first years of the company were challenging, to put it mildly. “I made some bad contracts at the time”, Ylönen says. “I had a lot to learn.”

In the third year the CEO resigned, presuming that the company would be filing for bankruptcy in three months. “I had all my savings in the company and hadn’t been paying myself in three years, even though I was working all the time. When the CEO resigned, I was about to give up.”

Instead, Ylönen decided to roll up his sleeves and occupy the CEO position. “I started calling for potential customers, and we got companies such as Sun Microsystems, Nokia and Ericsson. We grew 350 percent that year.”

For commercial applications of SSH, the company had developed Tectia. It enabled secure high-speed file transfer and remote access, and quickly became the established market leader for enterprise SSH that it still is today, after 28 years of its first implementations.

Tectia formed a major part of SSH’s business and attracted new customers, enabling SSH to grow together with its customers. Due to Tectia’s success, the company decided to open an office in the US, since most of its customers were based in Silicon Valley. Ylönen was traveling between the two countries nonstop.

“In order to make the US office profitable, we had to use every possible means to gain new customers. One time I took a 10 people team to a giant tech fair. 100 companies had a stand there – we certainly were not big enough to be one of them. We split into teams and started chatting with the marketing and tech managers of those companies. And that is how we got a lot of important clients, even though we didn’t even have our own stand there.”

For the first five years, SSH approximately doubled in size every year. It was the time of the tech bubble. Suvi Lampila, a long-term employee and current Fellow at SSH, started her career with the company when the times were crazy.

“When I started in 2001, we had to arrange training for new employees every two weeks. People had to gain new skills continuously, and occupy different roles. That was my fortune – I started with an intranet project as a non-technical novice but soon became a web master. As well as many others like me, I really got to go off the deep end with SSH.”

When the tech bubble burst, SSH had to focus its operations. Yet, it had built a firm foundation for the future. Even so, the company and Ylönen himself had become a trusted authority in cybersecurity. “When the European Union was making decisions on encryption, European Commissioner Erkki Liikanen dropped by our office just two hours before the release of the decision. We discussed the importance of cryptography, and what it would mean to Europe not to be able to use encryption. Thankfully, the decision was fair – I guess Liikanen had done his homework.”

Towards the end of 1995, the SSH user base was 20,000 users in fifty countries. By 2000, there were approximately 2,000,000 users of the protocol, SSH, the company, being the most trusted SSH partner.

Read next The growth of the protocol and the company - and secure access without keys SSH is a leading defensive cybersecurity company that secures communications between humans, systems, and networks. We specialize in Zero Trust Privileged Access Controls and Quantum Safe Network Security. Our customers include a diverse range of enterprises, from multiple Fortune 500 companies to SMBs across various sectors such as Finance, Retail, Technology, Industrial, Healthcare, and Government. 25% of Fortune 100 companies rely on SSH’s solutions. Recent strategic focus has expanded SSH business to Defence, Critical Infrastructure Operators, Manufacturing OT Security and Public Safety.

Leonardo S.p.A invests 20.0 million EUR in SSH, becoming the largest shareholder of the company. SSH solutions form a Center of Excellence for Zero Trust privileged access management and quantum-safe network encryption in Leonardo - a global industrial group that creates multi-domain technological capabilities in the Aerospace, Defence and Security sector with 17.8 billion EUR revenue in 2024. SSH company’s shares (SSH1V) are listed on Nasdaq Helsinki.

 

Solutions Zero Trust Suite Zero Trust Suite & Entra ID Integration Quantum-Safe Cryptography (QSC) SalaX Secure Collaboration Security Risk Mitigation OT security MSP Security Device Trust Monitoring & Threat Intelligence Credentials & Secrets Management IT Audits & Compliance Products PrivX™ Hybrid PAM PrivX Key Manager Tectia SSH Client/Server™ Tectia™ z/OS Secure Messaging Secure Mail Secure Sign NQX™ Quantum-Safe Services SSH Risk Assessment™ Professional Services Support Resources Careers References Downloads Manuals Events & Webinars Blog Company About us Contact Investors Partners Press Stay on top of the latest in cybersecurity Be the first to know about SSH’s new solutions, product updates, new features, and other SSH news!

Thanks for submitting the form. © Copyright SSH • 2025 • Legal

智能索引记录