SSH Enables Secure Remote Management Of Network Devices With SSH Secure Shell Toolkit 4.0

Secure Shell Toolkit 4.0 Allows Manufacturers of Embedded Devices to Add Efficient, Robust Security for Remote Administration and Updates

HELSINKI, FINLAND, PALO ALTO, Calif. and TOKYO, JAPAN – Feb. 18, 2003 – SSH Communications Security (HEX:SSH1V), a world-leading developer of Internet security solutions, today announced the extension of its award-winning desktop and server encryption software family, SSH Secure Shell Toolkit 4.0, for use within network infrastructure products, such as routers, switches and network appliances. SSH Secure Shell Toolkit 4.0 and has been optimized for embedded systems, enabling manufacturers to quickly and efficiently incorporate SSH Secure Shell technology into existing remotely managed devices.

“Network infrastructure equipment is a key point of vulnerability for business today,” said Tatu Yl?¶nen, CTO of SSH Communications Security Corp. “Non-secure remote management systems expose these critical devices to unintended access, placing businesses and home users at risk. For this reason, SSH is proud to offer the same award-winning SSH Secure Shell technology for networked devices and appliances.”

SSH Secure Shell Toolkit is designed for constrained environments where memory space and CPU cycles are limited. Runtime memory usage has been minimized in order to enable integration into existing designs without hardware or software re-engineering. SSH Secure Shell Toolkit includes native support for the most popular embedded operating systems, Monta Vista Linux and VxWorks.

SSH Secure Shell Toolkit 4.0 protects management access by encrypting both the login credentials and the sessions themselves. The authentication phase uses DSA and Diffie-Hellman algorithms and the session itself is protected using one of five alternatives ciphers (AES, 3DES, DES, Twofish, or Blowfish) together with SHA-1 and MD5 hash algorithms.

About SSH Secure Shell
Invented in 1995 by Tatu Yl?¶nen, SSH Secure Shell is a program to log into another computer over the Internet. SSH Secure Shell secures the connection over the Internet by encrypting passwords and other data. Once launched, it transparently provides strong authentication and secure communications over insecure networks. Benefits of the Secure Shell technology include ease-of-use, strong security and flexibility. With several million users in over 80 countries, it is the de-facto standard for remote logins, and increasingly many organizations are completely prohibiting any other form of access to their networks from the public Internet.

Product Pricing
SSH Secure Shell Toolkit 4.0 is available for licensing and immediate delivery. For pricing and ordering information, please contact SSH sales on the Web at www.ssh.com (SSH sales in Helsinki, Finland, at +358 20 500 7030; Palo Alto, Calif., USA, at +1 650 251 2700; or Tokyo, Japan at +81 3 3459 6830).

About SSH Communications Security
SSH Communications Security, a world-leading supplier of Internet security solutions, offers a broad range of award-winning products designed to address the most critical security issues for businesses, financial institutions and governments worldwide. SSH’s award-winning remote access software, SSH Secure Shell, the de facto standard for secure remote access and data transfer, and SSH Sentinel(TM), a feature-rich remote access VPN “smart” client are ideal solutions for securing wireline and wireless networks. The SSH Certifier(TM) product family provides a robust certification authority for flexible and strong authentication through digital certificates and tokens. The market-leading, award-winning SSH IPSec family of toolkits for OEMs and software developers enables fast time-to-market and reduced in-house development costs. SSH’s customers include market leaders Compaq, Ericsson, Intel, Lucent Technologies, Nokia, RSA, and Sun Microsystems, among others. SSH is traded publicly on the Helsinki Exchanges under HEX:SSH1V. For more information, please visit www.ssh.com




Share this