温馨提示:本站仅提供公开网络链接索引服务,不存储、不篡改任何第三方内容,所有内容版权归原作者所有
AI智能索引来源:http://www.ssh.com/blog/patented_pam
点击访问原文链接

PrivX: the passwordless and partly patented PAM solution

PrivX: the passwordless and partly patented PAM solution About us Investors Partners Careers Solutions SOLUTIONS Zero Trust Suite Quantum-Safe Cryptography (QSC) SalaX Secure Collaboration Security Risk Assessment, Quantification & Mitigation By Topic Just-in-Time Access Secure vendor access Credentials & Secrets Management Hybrid & multi-cloud access management Interactive tour: Privileged Access in the Cloud M2M connections IT Audits & Compliance Secure file transfer By Industry Managed Service Providers (MSP) Operational Technology (OT) Federal Government Security Products SECURE ACCESS & SECRETS MANAGEMENT SECURE FILE TRANSFER & ENCRYPTION NQX™ quantum-ready encryption Tectia™ SSH Client/Server Tectia™ z/OS SalaX Secure Collaboration Secure Mail 2024 Secure Messaging 2024 SalaX Secure Collaboration Solutions SOLUTIONS PrivX Zero Trust Suite SalaX Secure Collaboration Strong ID-based access with Entra ID & Zero Trust Suite Quantum-Safe Cryptography (QSC) Security Risk Assessment, Quantification & Mitigation Device trust & access and identity verification Identity-based authentication & converged IAM and PAM TOPICS Just-in-Time Access Secure vendor access Credentials & Secrets Management Hybrid & Multi-Cloud Access Management Interactive tour: Privileged Access in the Cloud M2M Connections Management IT Audits & Compliance Secure File Transfer INDUSTRIES Managed Service Providers (MSP) Operational Technology (OT) Federal Government Security Healthcare Data Security OT Security IT/OT convergence of data & systems Zero Trust Access and ZSP Workflow approvals Secure remote access  Secure patch management  OT Compliance Discovery and threat intelligence Phishing-resistant MFA & device trust Products SalaX SECURE COLLABORATION Secure Mail Secure Messaging Secure Sign SalaX Secure Collaboration FQX File Encryptor SECURE ACCESS & SECRETS MANAGEMENT PrivX™ PAM PrivX™ OT Edition PrivX Key Manager SECURE FILE TRANSFER & ENCRYPTION Tectia™ SSH Server Tectia™ SSH Server for IBM z/OS PrivX Desktop NQX™ quantum-safe encryption Services SSH Risk Assessment™ Professional Services Support Contact us Customer cases PrivX Zero Trust PAM Enterprise Key Management UKM Tectia SFTP for servers & mainframes SSH Secure Collaboration Resources SSH Academy Content library Blog References Press releases Downloads Manuals Events & Webinars Media Legal Report a vulnerability Solutions SOLUTIONS PrivX Zero Trust Suite SalaX Secure Collaboration Strong ID-based access with Entra ID & Zero Trust Suite Quantum-Safe Cryptography (QSC) Security Risk Assessment, Quantification & Mitigation Device trust & access and identity verification Identity-based authentication & converged IAM and PAM TOPICS Just-in-Time Access Secure vendor access Credentials & Secrets Management Hybrid & Multi-Cloud Access Management Interactive tour: Privileged Access in the Cloud M2M Connections Management IT Audits & Compliance Secure File Transfer INDUSTRIES Managed Service Providers (MSP) Operational Technology (OT) Federal Government Security Healthcare Data Security OT Security IT/OT convergence of data & systems Zero Trust Access and ZSP Workflow approvals Secure remote access  Secure patch management  OT Compliance Discovery and threat intelligence Phishing-resistant MFA & device trust Products SalaX SECURE COLLABORATION Secure Mail Secure Messaging Secure Sign SalaX Secure Collaboration FQX File Encryptor SECURE ACCESS & SECRETS MANAGEMENT PrivX™ PAM PrivX™ OT Edition PrivX Key Manager SECURE FILE TRANSFER & ENCRYPTION Tectia™ SSH Server Tectia™ SSH Server for IBM z/OS PrivX Desktop NQX™ quantum-safe encryption Services SSH Risk Assessment™ Professional Services Support Contact us Customer cases PrivX Zero Trust PAM Enterprise Key Management UKM Tectia SFTP for servers & mainframes SSH Secure Collaboration Resources SSH Academy Content library Blog References Press releases Downloads Manuals Events & Webinars Media Legal Report a vulnerability About us Investors Partners Careers September 3, 2020 PrivX: the passwordless and partly patented PAM solution Written by: Jani Virkkula Editor's note: This blog post was originally published on February 4, 2020 and was updated to include details about the second and third patent granted for PrivX and to highlight the recognitions from the KuppingerCole analysts group.

Early last year, we announced that The United States Patent and Trademarks Office (USPTO) has granted SSH.COM a patent (US10523445), which covers secure passwordless access to hosts in hybrid networks comprising on-premise and cloud resources. This technology is used in our lean privileged access management (PAM) solution called PrivX. Get the full details of US10523445 here.

September last year, we announced a further patent (US10764263) granted by the same authority. This one covers the role-based generation and provisioning of short-lived ephemeral certificates for passwordless access to critical systems, applications, and data.

Last month, USPTO granted SSH.COM patent number US10951421 that covers the monitoring of connections established using ephemeral certificate-based passwordless access.

And finally, this project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 881221.

We believe in passwordless IT infrastructures As IT workloads move to the cloud, privileged access management (PAM) solutions are essential for enterprises of all sizes when adopting multi-cloud services (AWS, Azure, Google Cloud, and other) into use in their IT infrastructure. This is because IT infrastructures host business-critical information, and PAM solutions manage who has access to where and with what rights.

These patents provide SSH.COM's PrivX offering a substantial differentiating edge in the fast-growing multi-billion-dollar market of next-generation PAM solutions because not all PAMs are created equal.

PrivX is a multi-cloud-born (but also on-prem friendly) PAM in which cloud features are not "just an add-on" or an attempt to retrofit legacy architectures to cloud. We simply ditched traditional passwords, permanent credentials, and standing privileges that are easily lost, stolen, misconfigured, have to be managed and need to be rotated. As Gartner puts it:

“The existence of privileged access carries significant risk, and even with PAM tools in place, the residual risk of users with standing privileges remains high. Security and risk management leaders engaged in IAM must implement a zero standing privileges strategy through a just-in-time model.”- Remove Standing Privileges Through a Just-in-Time PAM Approach by Gartner.

With PrivX, your internal or external developers and admins don't handle any standing privileges or passwords. Instead, they are authenticated just-in-time with the right amount of privilege for the task at hand, and that authentication is revoked automatically every time.

We understand that you cannot get rid of all the credentials in your critical IT, so to that end, PrivX also has a password vault for when you absolutely have to store them. We just recommend you use ephemeral access as much as you can.

This is because ephemeral certificates that are created just-in-time are a huge boost to operations: take a look at our quick two-minute explainer video to see what the fuss is all about. You might notice that our lean, scalable and very deployable PAM is a great fit for also growth driven and small & medium sized companies. 

Recognitions beyond the patents While we are excited of this patent (it does once again validate that we are doing something pretty cool and unique), we are even prouder and more excited about the path we are on with PrivX and some of the milestones we have reached:

A steadily growing roster of paying customers from all across the globe (In fact, Antarctica is currently the only continent we are missing. Penguins: we're coming for you!) A growing pipeline of large enterprises interested in and adopting PrivX KuppingerCole's recognition of PrivX as an overall leader in their 2020 PAM Leadership Compass (you can learn more about PrivX customers in the blog post as well) Recognition of PrivX as a leader in the DevOps PAM segment by KuppingerCole. Increasing recognition of PrivX and its ephemeral certificate based authentication approach as the leading ZSP (zero-standing privileges) PAM and just-in-time access tool on the market A cool €2M in EU funding for further development of PrivX The patents (and we have several other applications in the pipeline) All this gives us even more energy to keep developing PrivX and reimagining what a truly modern Privileged Access Management solution is and should be. We have some very cool new developments cooking up that we hope to announce over the coming months.

In the meantime, if you want to know what a truly user-friendly, multi-cloud proof, and easy-to-deploy PAM is, take a look at PrivX. You can either try PrivX for free, sign up for a guided tour with a test drive within your browser, or ask for a quick demo.

 

Tag(s): Zero Trust , just-in-time Jani Virkkula Currently employed by SSH.COM as Product Marketing Manager, Jani is a mixed-marketing artist with a strong background in operator and cybersecurity businesses. His career path of translator->-tech writer -> marketer allows him to draw inspiration from different sources and gives him a unique perspective on all types...

Connect with the author Other posts you might be interested in IAM 11 min read | August 13, 2021 Access security: why PAM should come before IAM Read More cybersecurity 13 min read | September 2, 2020 5 must-haves for future-proof multi-cloud privileged access management Read More Zero Trust 12 min read | January 9, 2020 Cool PAM with great auditing and easy access to IT assets in the cloud Read More Subscribe to email updates SSH is a leading defensive cybersecurity company that secures communications between humans, systems, and networks. We specialize in Zero Trust Privileged Access Controls and Quantum Safe Network Security. Our customers include a diverse range of enterprises, from multiple Fortune 500 companies to SMBs across various sectors such as Finance, Retail, Technology, Industrial, Healthcare, and Government. 25% of Fortune 100 companies rely on SSH’s solutions. Recent strategic focus has expanded SSH business to Defence, Critical Infrastructure Operators, Manufacturing OT Security and Public Safety.

Leonardo S.p.A invests 20.0 million EUR in SSH, becoming the largest shareholder of the company. SSH solutions form a Center of Excellence for Zero Trust privileged access management and quantum-safe network encryption in Leonardo - a global industrial group that creates multi-domain technological capabilities in the Aerospace, Defence and Security sector with 17.8 billion EUR revenue in 2024. SSH company’s shares (SSH1V) are listed on Nasdaq Helsinki.

 

Solutions Zero Trust Suite Zero Trust Suite & Entra ID Integration Quantum-Safe Cryptography (QSC) SalaX Secure Collaboration Security Risk Mitigation OT security MSP Security Device Trust Monitoring & Threat Intelligence Credentials & Secrets Management IT Audits & Compliance Products PrivX™ Hybrid PAM PrivX Key Manager Tectia SSH Client/Server™ Tectia™ z/OS Secure Messaging Secure Mail Secure Sign NQX™ Quantum-Safe Services SSH Risk Assessment™ Professional Services Support Resources Careers References Downloads Manuals Events & Webinars Blog Company About us Contact Investors Partners Press Stay on top of the latest in cybersecurity Be the first to know about SSH’s new solutions, product updates, new features, and other SSH news!

Thanks for submitting the form. © Copyright SSH • 2025 • Legal

智能索引记录