HELSINKI, Finland and WELLESLEY, Mass., Sept. 8 /PRNewswire/ -- SSH Communications Security Corp. (OMX: SSH1V), a world-leading provider of enterprise security solutions and end-to-end communications security, and the original developer of the Secure Shell protocol, today announced a set of consulting services. The new SSH Tectia(R) Consulting Services are designed to help enterprise IT managers in evaluating the SSH Tectia products in their IT infrastructure and to assist with the selection, deployment and management of the appropriate SSH Tectia solution.
HELSINKI, Finland and WELLESLEY, Mass., Sept. 8 /PRNewswire/ — SSH Communications Security Corp. (OMX: SSH1V), a world-leading provider of enterprise security solutions and end-to-end communications security, and the original developer of the Secure Shell protocol, today announced a set of consulting services. The new SSH Tectia(R) Consulting Services are designed to help enterprise IT managers in evaluating the SSH Tectia products in their IT infrastructure and to assist with the selection, deployment and management of the appropriate SSH Tectia solution.
"IT environments are becoming more complex every day, and no two enterprises have exactly the same challenges or infrastructure requirements," said George Adams, CEO, SSH Communications Security, Inc. "SSH Tectia Consulting Services are designed to leverage SSH's long-standing network security expertise to help enterprises navigate through these complexities and meet their individual IT security requirements quickly and easily. Maintaining adequate security at all times can be difficult and time-consuming, and our goal is to give enterprises the tools and assistance they need, so that they can focus their attention where it should be: on their core businesses."
Five service plans are available through the new SSH Tectia Consulting Services. Ranging from SSH Tectia solution evaluation and deployment planning assistance to ongoing SSH Tectia operations assistance, SSH Tectia training, and customer-specific development of new functionality for SSH Tectia products, the five service plans include:
— Evaluation Assistance: Helps IT managers evaluating the SSH Tectia solution to validate and ensure that all their business processes and applications can be secured by the SSH Tectia solution. SSH's experienced consultants will help customers to create proof-of-concept test plans that validate the effectiveness of the SSH Tectia solution in the customer's unique IT environment. — Deployment Planning: Helps enterprise customers to plan the deployment of the SSH Tectia solution to happen as quickly and efficiently as possible. The SSH consultants will develop a comprehensive, phased SSH Tectia deployment plan encompassing both technical and operational guidelines. — Operational Assistance: Assists enterprise customers to operate SSH Tectia after the deployment is completed. On-site consulting and training services for customers will be provided to ensure the transfer of operational knowledge to their IT personnel. Includes development of an SSH Tectia operational plan documenting the best practices to test, deploy and manage the SSH Tectia products in the customer's environment, including installation, configuration and key/script management. — Upgrade Planning: Helps IT managers meet the challenge of maintaining security in their evolving IT environments by taking advantage of the new, advanced versions of SSH Tectia. The SSH consultants will help customers create a detailed SSH Tectia upgrade plan, documenting all required production environment changes, and outlining test cases that will confirm proper SSH Tectia security deployment and operation after the upgrade. — Customer-Specific Development: The development of new SSH Tectia product functionalities to meet individual customer needs. The Customer-specific Development services help customers create a high-level requirement for a new SSH Tectia product functionality, and include an initial development project and a maintenance period of up to three years.
SSH co-operates with integration and outsourcing partners to jointly offer SSH Tectia Consulting Services together with their other services to enterprises. SSH's consultants participate in the initial service projects in order to transfer their SSH Tectia expertise and deployment knowledge to complement the other services from integration and outsourcing partners.
SSH Tectia is the leading end-to-end communications security solution for the enterprise, providing transparent, strong encryption, flexible authentication options, multi-platform support, and superior performance, without modification to the existing infrastructure or applications. The SSH Tectia product family includes SSH Tectia Client, Server, Manager, ConnectSecure(TM), and Server for IBM z/OS.
SSH Tectia Client/Server is the de facto standard for secure file transfers, system administration, and application connectivity used by millions worldwide. SSH Tectia Manager offers centralized management of the SSH Tectia solution, easing the logging and audit burdens on valuable IT resources to help achieve lower total cost of ownership (TCO) and an attractive return on investment (ROI). The award-winning SSH Tectia ConnectSecure provides automatic File Transfer Protocol to Secure File Transfer Protocol (FTP-SFTP) conversion, automatic transparent FTP tunneling and automatic transparent TCP (Transmission Control Protocol) tunneling, to quickly replace unsecured protocols with secure-proven protocols and secure data-in-transit.
For pricing and more information about the SSH Tectia Consulting Services, please contact your SSH sales representative or SSH partner, or visit http://www.ssh.com/products/services/consulting/.
About SSH Tectia
SSH Tectia is the leading end-to-end communications security solution for the enterprise. The SSH Tectia solution is based on the SSH Secure Shell and SSH's other industry-leading technologies used by millions worldwide. SSH Tectia enables secure file transfer, secure system administration, and secure application connectivity with centralized management throughout internal and external networks. SSH Tectia products provide transparent, strong encryption and authentication, and are available for all key enterprise platforms including Windows, Unix, Linux, and mainframes to easily integrate into heterogeneous network environments.
About SSH Communications Security
SSH Communications Security is a world-leading provider of enterprise security solutions and end-to-end communications security, and the original developer of the Secure Shell protocol. The company's SSH Tectia solution addresses the most critical needs of large enterprises, financial institutions, and government agencies. With SSH Tectia, organizations can cost-effectively secure their system administration, file transfers, and application connectivity against both internal and external security risks. As the original developer of the Secure Shell protocol and other key network security technologies, SSH has since 1995 developed end-to-end communications security solutions specifically for the enterprise. Currently more than 100 of Global Fortune 500 companies are using SSH security solutions. SSH shares are quoted on the Helsinki Exchanges Main List. For more information, please visit http://www.ssh.com.
SSH Corp. Americas Regional Asia Pacific Regional Contact: Contact: Contact: George Adams Byron Rashed Shiho Hashimoto SSH Corp. SSH Inc. SSH Corp. +1 781 247 2100 +1 949 643 0733 +358 20 500 7470 firstname.lastname@example.org email@example.com firstname.lastname@example.org Europe Regional Americas Agency Investor Relations Contact: Contact: Contact: Bo Sorensen Cheryl Seaberg Mika Peuranen SSH Corp. Walt & Company SSH Corp. +358 20 500 7404 +1 408 369 7200 x 2981 +358 20 500 7419 email@example.com firstname.lastname@example.org email@example.com
(C) 2008 SSH Communications Security Corp. All rights reserved. ssh(R) and Tectia(R) are registered trademarks of SSH Communications Security Corp in the United States and in certain other jurisdictions. The SSH and Tectia logos are trademarks of SSH Communications Security Corp and may be registered in certain jurisdictions. All other names and marks are the property of their respective owners.
SOURCE SSH Communications Security Corp.