SSH as the next back door. Are you giving hackers root access?

SSH as the next back door. Are you giving hackers root access?

SSH is a broadly leveraged to secure communication technology used for admin, root-level access into mission critical systems (firewalls, routers, switches, Unix, Linux, etc.) as well as for automated machine-to-machine operations in corporations and governments alike. Most organizations don't track or manage the SSH keys used to encrypt communications and authenticate systems and users, exposing them to vulnerabilities. Without concise information about the account and system access made possible by these keys, organizations are at risk of unauthorized access to sensitive data and systems. This session will address common and best practices for managing SSH encryption and authentication keys in enterprise environments.

Presented by