Tech Mahindra and SSH to deploy cutting edge cybersecurity solutions to secure access control for enterprises
Tech Mahindra Limited has announced a strategic partnership with SSH.com - one of the most trusted brands in cyber security, to deploy cutting edge cybersecurity solutions to secure access control for enterprises.
Through this partnership, Tech Mahindra will bolster its identity & access management portfolio by adding two extensive enterprise solutions - universal SSH key manager (UKM) and privileged access management solution (PrivX®). These cutting-edge solutions aim to protect enterprise businesses from unforeseen security breaches arising due to bypass of older solutions in the privileged access management (PAM) space.
Based on this joint unique offering, Tech Mahindra is implementing a cyber security solution for one of the largest European semiconductor chip makers by supplementing and providing an additional layer of security on top of its existing password vaulting system. With UKM, the customer can be assured of security and compliance in a critical part of its operation.
Commenting on the development, Rajiv Singh, Global Head of Cybersecurity, Tech Mahindra, said, “We are pleased to be partnering with SSH.COM to accomplish our shared vision of assisting our customers with future ready solutions to secure their digital assets and providing them with 24x7 global managed services. The industry-leading solutions by SSH (UKM and PrivX) are a natural fit to Tech Mahindra’s cybersecurity offerings that answer today’s security issues especially across large enterprises for their privileged access management needs.”
Meanwhile, Sami Ahvenniemi, chief customer officer, SSH.COM, said, “We are excited to work with Tech Mahindra to bring UKM and PrivX to an even wider audience. Tech Mahindra’s strong footprint across 90+ countries, coupled with its subject matter expertise in cybersecurity, will provide SSH with a sustainable competitive advantage, thus improving our ability to scale rapidly, help customers prevent cyber-attacks and achieve compliance.”
The SSH protocol, also known as Secure Shell, refers to a cryptographic network protocol is a method for secure remote login from one computer to another. The global gold standard for secure remote system administration, the SSH protocol is being widely used by data centres and large enterprises to mitigate security risks that could hamper growth as part of their digital transformation journey.
- Most Viewed
- Most Rated
- Most Shared
- Related Articles
- BSNL reduces broadband tariff for post-paid customers
- Idea Cellular launches toll-free number for MNP
- TRAI to begin the process of telemarketer registration from January 15, 2011
- TRAI annual report for 2009-10
- InsuringIndia.com launches mobile application for health and term insurance comparisons
- Sri Lanka's Mobitel and ZTE Corporation conduct a successful 4G (LTE) trial in South Asia
- TCBIL to deploy and manage 14,000 ATMs for PSU banks
- Nokia Siemens Networks and Telkomsel win Innovation Award at the Global Telecoms Business (GTB)
- Emerson to design six data centers for Datacraft In India
- Pacnet extends international service footprint in India