Tectia

Tectia

SSH Communications Security
+
+

Related Products

  • CLEAR
    1 Rating
    Visit Website
  • Predict360
    18 Ratings
    Visit Website
  • ThreatLocker
    502 Ratings
    Visit Website
  • Keeper Security
    1,752 Ratings
    Visit Website
  • Interfacing Integrated Management System (IMS)
    71 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • myACI
    471 Ratings
    Visit Website
  • Safetica
    409 Ratings
    Visit Website
  • Guardz
    109 Ratings
    Visit Website
  • Vantaca
    351 Ratings
    Visit Website

About

We are a cybersecurity company dedicated to safeguarding mission-critical data in transit, in use, and at rest for leading organizations around the world. Assess your SSH key estate and related SSH key risks with our self-service tool SSHerlock. SSHerlock is an SSH key and post-quantum resilience discovery and audit self-service tool and can be used free of charge. Passwordless authentication, operational technology (OT) security, defensive cybersecurity, and more. What are the top trends that will shape cybersecurity in the upcoming year? PrivX is perfect for securing, managing and tracking superuser and power user access in the hybrid cloud - by also eliminating risky privileged passwords from critical infrastructures. UKM Zero Trust manages and automates the lifecycle of millions of encryption keys for risk mitigation and audit success - also by making access keyless. Software-based NQX features matchless performance and security.

About

Validian’s technology secures data in use, in memory, in databases, at rest, in transit and against interception by untrusted operating systems. It works on all devices, operating systems and technology platforms — and everywhere in between. Our unique Application & Data Protection Software, ValidianProtect, is a powerful, flexible, scaleable and rapidly integrated cyber security middleware. Seamlessly securing data in use, in memory, in databases, at rest, in transit and against interception by untrusted operating systems is a major breakthrough in cyber security. Dynamically rotating symmetrical keys for encrypting and decrypting data in memory, in databases, in storage, in transit and against interception by untrusted operating systems make Validian Protect unique with new industry-shaping features in data protection. Our peer-to-peer security encrypts decentralized data in transit from point to point while securing transitions to secure data at rest and secure data in use.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies searching for a solution to manage and improve their security operations

Audience

Businesses searching for a solution to improve their security operations and processes

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

SSH Communications Security
Founded: 1995
Finland
www.ssh.com/products/tectia-ssh/

Company Information

Validian
www.validian.com

Alternatives

Alternatives

SekurMail

SekurMail

Sekur Private Data
PrivateCore vCage

PrivateCore vCage

PrivateCore

Categories

Categories

Integrations

Acceptto Zero Trust Identity (CIAM)
Entitle
HashiCorp Vault
IBM z/OS
NetThunder

Integrations

Acceptto Zero Trust Identity (CIAM)
Entitle
HashiCorp Vault
IBM z/OS
NetThunder
Claim Tectia and update features and information
Claim Tectia and update features and information
Claim Validian Protect and update features and information
Claim Validian Protect and update features and information