SSH Celebrates Secure Shell Tenth Anniversary

HELSINKI, Finland; WELLESLEY, Mass. – June 21, 2005 – SSH Communications Security (HEX:SSH1V), a world-leading provider of enterprise security solutions and end-to-end communications security, and the original developer of the Secure Shell protocol, announced the tenth anniversary of the first release of Secure Shell. Secure Shell was the first product to offer a secure and highly functional means to remotely login and execute commands on remote servers in TCP/IP networks, and remains the de facto standard for secure file transfer and system administration used by millions worldwide. It solved the most important security problem on the Internet at the time by encrypting passwords sent over the network. Today, Secure Shell not only protects passwords, but also enables users to send and receive mission-critical data securely both internally and externally throughout the network.

Secure Shell was first released on July 12, 1995 by Tatu Yl?¶nen, who later that year founded SSH Communications Security after receiving multiple requests for a feature-rich commercial version of the product. Secure Shell was originally developed to provide a secure drop-in replacement for “Berkeley services” on Unix, including the rsh (remote shell), rcp (remote copy), and rlogin (remote login) commands. Secure Shell is used by system administrators worldwide for securely managing remote servers and transferring files. Additionally, secure application connectivity is enabled by the port forwarding (tunneling) features of Secure Shell.

SSH Communications Security has also been an integral part of the IETF (Internet Engineering Task Force) in establishing the SSH1, SSH2, IPSec and NAT-T standard protocols, and remains active within the organization to define future technology standards.

“I developed Secure Shell to solve a concrete problem: preventing hackers and criminals from stealing user names, passwords, and other data while they were transmitted over the Internet,” said Yl?¶nen, founder of SSH. “I never dreamed that it would be adopted by the millions of people who rely on it today. A big part of the success is due to the team at SSH, who has worked hard to strengthen the security of the product and to make it even easier to install, manage and use for enterprises, government agencies financial institutions, and universities.”

The Secure Shell protocol (SSH2) is the basis for SSH Tectia, the leading end-to-end communications security solution for the enterprise. SSH Tectia enables secure system administration, secure file transfer and secure application connectivity with centralized management throughout the internal and external network. SSH Tectia products provide transparent strong encryption and authentication, and are available for all key enterprise platforms including Windows, Unix, Linux and IBM mainframes to easily integrate into heterogeneous network environments.

About SSH Communications Security
SSH Communications Security is a world-leading provider of enterprise security solutions and end-to-end communications security, and the original developer of the Secure Shell protocol. The company’s SSH Tectia solution addresses the most critical needs of large enterprises, financial institutions, and government agencies. With SSH Tectia, organizations can cost-effectively secure their system administration, file transfers, and application connectivity against both internal and external security risks. As the original developer of the Secure Shell protocol and other key network security technologies, SSH has for 10 years developed end-to-end communications security solutions specifically for the enterprise. Currently more than 100 of Global Fortune 500 companies are using SSH security solutions. SSH shares are quoted on the Helsinki Exchanges Main List. For more information, please visit www.ssh.com.

Don't miss