Tectia

Tectia

SSH Communications Security
+
+

Related Products

  • Proton Pass
    31,996 Ratings
    Visit Website
  • 1Password
    16,511 Ratings
    Visit Website
  • ManageEngine ADSelfService Plus
    119 Ratings
    Visit Website
  • Uniqkey
    181 Ratings
    Visit Website
  • Auth0
    1,003 Ratings
    Visit Website
  • NINJIO
    415 Ratings
    Visit Website
  • Thinfinity Workspace
    14 Ratings
    Visit Website
  • Criminal IP ASM
    18 Ratings
    Visit Website
  • Keeper Security
    1,751 Ratings
    Visit Website
  • Frontegg
    378 Ratings
    Visit Website

About

Mainframe systems are the foundation of trusted digital experiences for most of the world’s largest companies and organizations. However, passwords protecting critical users, data, and applications are a relatively simple point of attack for hackers to exploit because the passwords rely on user education and compliance for both implementation and control. By using a variety of methods, such as social engineering and phishing, criminals have exploited employees, partners, and general users to hack into even the most secure platforms. IBM Z MFA raises the level of assurance of your mission-critical systems with expanded authentication capabilities and options for a comprehensive, user-centered strategy that helps mitigate the risk of compromised passwords and system hacks. Our designers are also IBM Z MFA users. Across every new version, we incorporate their growing knowledge and expertise in real-world mainframe security scenarios.

About

We are a cybersecurity company dedicated to safeguarding mission-critical data in transit, in use, and at rest for leading organizations around the world. Assess your SSH key estate and related SSH key risks with our self-service tool SSHerlock. SSHerlock is an SSH key and post-quantum resilience discovery and audit self-service tool and can be used free of charge. Passwordless authentication, operational technology (OT) security, defensive cybersecurity, and more. What are the top trends that will shape cybersecurity in the upcoming year? PrivX is perfect for securing, managing and tracking superuser and power user access in the hybrid cloud - by also eliminating risky privileged passwords from critical infrastructures. UKM Zero Trust manages and automates the lifecycle of millions of encryption keys for risk mitigation and audit success - also by making access keyless. Software-based NQX features matchless performance and security.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Enterprises in need of a tool to enhance login security with extended mainframe authentication

Audience

Companies searching for a solution to manage and improve their security operations

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

IBM
Founded: 1911
United States
www.ibm.com/products/ibm-multifactor-authentication-for-zos

Company Information

SSH Communications Security
Founded: 1995
Finland
www.ssh.com/products/tectia-ssh/

Alternatives

Alternatives

Rocket z/Assure VAP

Rocket z/Assure VAP

Rocket Software

Categories

Categories

Integrations

IBM z/OS
Acceptto Zero Trust Identity (CIAM)
Entitle
HashiCorp Vault
IBM Z
IBM z/VM
NetThunder

Integrations

IBM z/OS
Acceptto Zero Trust Identity (CIAM)
Entitle
HashiCorp Vault
IBM Z
IBM z/VM
NetThunder
Claim IBM Z Multi-Factor Authentication and update features and information
Claim IBM Z Multi-Factor Authentication and update features and information
Claim Tectia and update features and information
Claim Tectia and update features and information