温馨提示:本站仅提供公开网络链接索引服务,不存储、不篡改任何第三方内容,所有内容版权归原作者所有
AI智能索引来源:http://www.ssh.com/about/history/part-3
点击访问原文链接

SSH.COM History - Part 3

SSH.COM History - Part 3 About us Investors Partners Careers Solutions SOLUTIONS Zero Trust Suite Quantum-Safe Cryptography (QSC) SalaX Secure Collaboration Security Risk Assessment, Quantification & Mitigation By Topic Just-in-Time Access Secure vendor access Credentials & Secrets Management Hybrid & multi-cloud access management Interactive tour: Privileged Access in the Cloud M2M connections IT Audits & Compliance Secure file transfer By Industry Managed Service Providers (MSP) Operational Technology (OT) Federal Government Security Products SECURE ACCESS & SECRETS MANAGEMENT SECURE FILE TRANSFER & ENCRYPTION NQX™ quantum-ready encryption Tectia™ SSH Client/Server Tectia™ z/OS SalaX Secure Collaboration Secure Mail 2024 Secure Messaging 2024 SalaX Secure Collaboration Solutions SOLUTIONS PrivX Zero Trust Suite SalaX Secure Collaboration Strong ID-based access with Entra ID & Zero Trust Suite Quantum-Safe Cryptography (QSC) Security Risk Assessment, Quantification & Mitigation Device trust & access and identity verification Identity-based authentication & converged IAM and PAM TOPICS Just-in-Time Access Secure vendor access Credentials & Secrets Management Hybrid & Multi-Cloud Access Management Interactive tour: Privileged Access in the Cloud M2M Connections Management IT Audits & Compliance Secure File Transfer INDUSTRIES Managed Service Providers (MSP) Operational Technology (OT) Federal Government Security Healthcare Data Security OT Security IT/OT convergence of data & systems Zero Trust Access and ZSP Workflow approvals Secure remote access  Secure patch management  OT Compliance Discovery and threat intelligence Phishing-resistant MFA & device trust Products SalaX SECURE COLLABORATION Secure Mail Secure Messaging Secure Sign SalaX Secure Collaboration FQX File Encryptor SECURE ACCESS & SECRETS MANAGEMENT PrivX™ PAM PrivX™ OT Edition PrivX Key Manager SECURE FILE TRANSFER & ENCRYPTION Tectia™ SSH Server Tectia™ SSH Server for IBM z/OS PrivX Desktop NQX™ quantum-safe encryption Services SSH Risk Assessment™ Professional Services Support Contact us Customer cases PrivX Zero Trust PAM Enterprise Key Management UKM Tectia SFTP for servers & mainframes SSH Secure Collaboration Resources SSH Academy Content library Blog References Press releases Downloads Manuals Events & Webinars Media Legal Report a vulnerability Solutions SOLUTIONS PrivX Zero Trust Suite SalaX Secure Collaboration Strong ID-based access with Entra ID & Zero Trust Suite Quantum-Safe Cryptography (QSC) Security Risk Assessment, Quantification & Mitigation Device trust & access and identity verification Identity-based authentication & converged IAM and PAM TOPICS Just-in-Time Access Secure vendor access Credentials & Secrets Management Hybrid & Multi-Cloud Access Management Interactive tour: Privileged Access in the Cloud M2M Connections Management IT Audits & Compliance Secure File Transfer INDUSTRIES Managed Service Providers (MSP) Operational Technology (OT) Federal Government Security Healthcare Data Security OT Security IT/OT convergence of data & systems Zero Trust Access and ZSP Workflow approvals Secure remote access  Secure patch management  OT Compliance Discovery and threat intelligence Phishing-resistant MFA & device trust Products SalaX SECURE COLLABORATION Secure Mail Secure Messaging Secure Sign SalaX Secure Collaboration FQX File Encryptor SECURE ACCESS & SECRETS MANAGEMENT PrivX™ PAM PrivX™ OT Edition PrivX Key Manager SECURE FILE TRANSFER & ENCRYPTION Tectia™ SSH Server Tectia™ SSH Server for IBM z/OS PrivX Desktop NQX™ quantum-safe encryption Services SSH Risk Assessment™ Professional Services Support Contact us Customer cases PrivX Zero Trust PAM Enterprise Key Management UKM Tectia SFTP for servers & mainframes SSH Secure Collaboration Resources SSH Academy Content library Blog References Press releases Downloads Manuals Events & Webinars Media Legal Report a vulnerability About us Investors Partners Careers About us Strategy History People Awards Patents Analysts Press Blog SSH history After a password-sniffing attack at his university network, Tatu Ylönen designed the first version of the Secure Shell (SSH) protocol. 28 years later, more than 95% of the servers used to power the internet have SSH installed. The internet as we know is largely managed using SSH.

But how did this all happen? How did the protocol become a cornerstone of a safe internet, and what does a European Commissioner or a lego brick have to do with it?

The internet without SSH? In 2024 SSH is one of the most trusted brands in cyber security, boasting customers from multiple Fortune 500 companies to SMBs and across various sectors such as Finance, Retail, Industrial, Critical Infrastructure, Healthcare, and Government.

These companies and government organizations all around the world have partnered with SSH to solve major security challenges.

“SSH’s perspective on cryptography is special.” Sam Curry says. “The company has an ability to make high quality crypto code in a world where most companies can't. And that's kind of special.”

And the protocol itself – it is used for managing more than half of the world's web servers and basically any Unix or Linux computer, on-premise and in the cloud. Information security specialists and system administrators use it to configure, manage, maintain, and operate most firewalls, routers, switches, and servers in the millions of mission-critical networks and environments of our digital world. It is also embedded inside many file transfer and systems management solutions.

Considering all that, how would the internet look like without SSH?

“Well, that’s a good question. It is safe to say that the internet would look tremendously different, but how? We can’t really know”, Ylönen says. “If I would not have come up with the protocol, someone would have invented something else. What that would look like – we can only imagine.”

Nearly 30 years of innovation - together with our customers and partners For the last 28 years, SSH has provided easy-to-use, best-of-breed cybersafety products for its diverse customer base. The company ‘s core idea has remained true all these years: encrypt and manage access to critical IT infrastructures, databases, applications or network devices.

While the first, trusted products like Tectia and UKM will be equally needed in the future, SSH has developed new future-proof tools to serve complex cloud environments where permanent digital keys need to be replaced with intelligent policy-based access control.

The future of encryption needs to have an answer for the challenges of quantum technology. With NQX, the company introduced quantum-safe encryption software for protecting classified data in transit. Since then, the company has implemented quantum-safe algorithms to its wider portfolio to to protect long-term secrets against the emerging threat of quantum computers. 

The company has also added Secure Collaboration 2024 for protecting sensitive business communications to its portfolio. 

The SSH protocol is not going anywhere, but it’s implementation is moving towards key-less and credentials direction. In a way, this is a logical development. 

First, there was a need to secure and encrypt data traffic, which lead to the birth of the SSH protocol and the Tectia product - the gold standard in secure file transfer. 

Then, the access credential of the protocol itself - SSH key - turned into a risk factor, since keys could be generated almost at will, used without proper oversight and there was no way for companies to centrally manage them. This lead to the birth of UKM - the most comprehensive SSH key management solution on the market.

Now we have cloud services and servers, which are never permanent and are used on-demand, it’s only logical to build access solutions that provide on-demand access without permanent credentials or keys. This lead to the birth of the PrivX product - the lean, easy-to-use and passwordless privileged access management solution with a great return on investment (ROI) .

We at SSH are proud of our history. We’ve also had the pleasure and privilege of working with some of the most demanding customers and technologies in the world for nearly 30 years. That’s not a small feat in a constantly evolving IT world, and it has required a high level or expertise, culture of innovation and determination. 

We would not be here without our customers who keep our business running, help us develop our products and always push us forward. We could not have done this without our partners who expand our reach beyond our own capabilities. We would not be the company we are today without the hundreds of fantastic people all over the world who have worked hard towards making the world a safer place. 

Here’s to the next three decades of the SSH protocol, the company behind it and the safe internet! 

Read previous The growth of the protocol and the company - and secure access without keys SSH is a leading defensive cybersecurity company that secures communications between humans, systems, and networks. We specialize in Zero Trust Privileged Access Controls and Quantum Safe Network Security. Our customers include a diverse range of enterprises, from multiple Fortune 500 companies to SMBs across various sectors such as Finance, Retail, Technology, Industrial, Healthcare, and Government. 25% of Fortune 100 companies rely on SSH’s solutions. Recent strategic focus has expanded SSH business to Defence, Critical Infrastructure Operators, Manufacturing OT Security and Public Safety.

Leonardo S.p.A invests 20.0 million EUR in SSH, becoming the largest shareholder of the company. SSH solutions form a Center of Excellence for Zero Trust privileged access management and quantum-safe network encryption in Leonardo - a global industrial group that creates multi-domain technological capabilities in the Aerospace, Defence and Security sector with 17.8 billion EUR revenue in 2024. SSH company’s shares (SSH1V) are listed on Nasdaq Helsinki.

 

Solutions Zero Trust Suite Zero Trust Suite & Entra ID Integration Quantum-Safe Cryptography (QSC) SalaX Secure Collaboration Security Risk Mitigation OT security MSP Security Device Trust Monitoring & Threat Intelligence Credentials & Secrets Management IT Audits & Compliance Products PrivX™ Hybrid PAM PrivX Key Manager Tectia SSH Client/Server™ Tectia™ z/OS Secure Messaging Secure Mail Secure Sign NQX™ Quantum-Safe Services SSH Risk Assessment™ Professional Services Support Resources Careers References Downloads Manuals Events & Webinars Blog Company About us Contact Investors Partners Press Stay on top of the latest in cybersecurity Be the first to know about SSH’s new solutions, product updates, new features, and other SSH news!

Thanks for submitting the form. © Copyright SSH • 2025 • Legal

智能索引记录