最新版 Tectia Client/Server 6.6 更新於 2023/3/8
最新版 Tectia SSH Server for IBM z/OS 6.7.0
一個以Secure Shell為基礎的安全強化軟體
世界各地許多企業與政府機構都使用Tectia SSH Client and Server來保障其IT流程,包括其臨時和自動化文件傳輸以及遠程系統管理的安全性。他們之所以選擇了Tectia是因其具有可靠性和可管理性。全球的專家學者皆認可其安全保障的技術,且給予成熟及商業化的保證。全球超過3000家廠商包括前十大財團的其中七家,皆相信SSH Communications Security能保護的網絡犯罪分子和內部成員威脅他們的資訊資產,同時確保關鍵業務流程保持正常運行。
快速、簡單的配置
Tectia SSH Client and Server是專為方便、快速在多樣化的分佈式系統環境中進行配置。由於不少企業因為混合遺留系統和應用程式的複雜及難以改變而傷腦筋。Tectia SSH Client and Server提供使用者在這些環境中,加入一個必要的安全層,使用戶不需要高風險,高成本更改應用程序和程序。
降低風險,增加收益
資訊的遺失是現代企業面臨的嚴重問題。Tectia SSH Client and Server能讓企業快速的解決處理並降低資訊丟失的風險,以保障其收益及穩定性。
資訊保障平台
Tectia SSH Client 和 Tectia SSH Server是的SSH通訊安全的訊息保障平台的核心:一個組合式的解決方案,能使企業能配置、集中管理和控制的安全保護基礎設施。然而Secure Shell是一個安全協議 - 不是一個安全解決方案。不當使用Secure Shell只會提高日常管理開銷,且可能導致風險和法規問題,而開發者亦明白這點,並從過去經驗與知識中學習並改善。
企業級的SSH平台
完全支援:我們所有的產品獲得了世界上最有經驗的技術支持和研發團隊完全支持。
平台入口:除了一個簡單的單點解決方案,SSH提供了一個組合式的平台,可以輕鬆地擴展以滿足您當前和未來的安全需求。
不同的平台支援:Tectia SSH Client and Tectia SSH Server支援Unix, Linux, Windows, IBM z/OS 和 Linux z/OS等系統,一個適用於多種平台的軟體。
Tectia SSH Server& Tectia SSH Client:
Tectia SSH使企業能夠以更高性價比,確保系統管理、檔傳輸和應用連接的安全,有效抵禦各種內部和外部安全風險。Tectia SSH基於SSH技術,在集中管理情況下提供安全的系統管理、安全的檔傳輸、安全的程式之間的連接,Tectia SSH提供強有力的加密和驗證系統,並且適用於各種不同的平台和環境下。
新版內容介紹
Tectia Client/Server/ConnectSecure 6.4.12
Tectia Server: Trusted Mode OCSP responder configuration so that the certificate revocation status check can be delegated to a different PKI, for example internal replication service in order to avoid downloading large CRLs. Implements RFC5019 and RFC6960.
Tectia Server: Audit messages related to certificate validation indicate, whether OCSP or CRLs were used during the validation process.
Windows: Added support for using environment variable DISPLAY to overwrite default X11 display setting.
Tectia SSH Server for IBM z/OS 6.5.0
- The product now targets a minimum z/OS version of 1.13.
- Provide an ISPF interface for installation, configuration and management
- Added Elliptic Curve support for Diffie-Hellman key exchange, key
signature generation and verification to the server using ICSF where
available. - Added ECC hardware support via ICSF for clients and broker.
- of the product.
- Added AES-CTR cipher hardware support via ICSF for server.
- Added AES-CTR cipher hardware support via ICSF to clients and broker.
- The sshd2 server now properly respects the tag attributes of its
- configuration files.
- Lines in the server configuration file may be continued via a final
- backslash.
- Removed diffie-hellman-group1-sha1 key exchange from defaults.
- Single des-cbc cipher removed.
- Removed RC2 cipher support.
Secure File Transfer
- Strong data encryption
- Strong file integrity checking
- Secure drag-and-drop file transfers with graphical user interface
- SFTP and SCP command-line tools for both interactive and unattended use
- Multi-gigabyte file-size support
- Anonymous secure file transfers with the SFTP protocol
- Data stream compression for low-speed connections
With Tectia SSH Server for IBM z/OS:
- Support for MVS and USS file systems
- SFTP Extensions for SITE commands
- MVS dataset direct streaming
- Automatic EBCDIC-ASCII character conversion
Ease of Use
- Graphical user interfaces for end users and system administrators
- Users can create connection profiles for easy session setup
- Nested tunnels for end-to-end communications security in remote access
- Centralized, transparent Secure Shell management with Tectia SSH Manager
Secure Application Connectivity
- Automatic tunneling of connections
- TCP/IP port forwarding
- Secure forwarding of X11 sessions
- Transparent TCP tunneling – no modifications required to the secured application
- Easy configuration with comprehensive Filter Rules
- Automated connection setup – destination hostname captured from the data stream
- Configurable fallback to plaintext option (1)
- Support for connections to any standard Secure Shell server, including OpenSSH
Security
- Multi-tier security architecture
- Compliance with the IETF Secure Shell standards
- Strong authentication of users and servers
- Strong encryption of data-in-transit
- Authentication agent functionality
- Configurable re-keying policies
- Multi-channel support – multiple secure sessions are multiplexed to a single TCP/IP connection
User and Server Authentication
- User authentication with passwords, public keys or two-factor user authentication with tokens or Tectia MobileID
- Public-key authentication for user and server
- Support for OpenSSH keys
- Keyboard-interactive interface for integration with third-party authentication methods
- Support for GSSAPI/Kerberos
Supported Platforms
Operating System | Client | Server |
HP-UX (PA-RISC) | 11i v3 | 11i v3 |
HP-UX (IA-64) | 11i v3 | 11i v3 |
IBM AIX (POWER) | 7.1, 7.2, 7.3 | 7.1, 7.2, 7.3 |
Oracle Solaris (SPARC) | 10, 11 | 10, 11 |
Oracle Solaris (x86-64) | 10, 11 | 10, 11 |
Red Hat Enterprise Linux (x86-64) | 6.10, 7, 8, 9 | 6.10, 7, 8, 9 |
SUSE LINUX Enterprise Desktop (x86-64) | 12, 15 | 12, 15 |
SUSE LINUX Enterprise Server (x86-64) | 12, 15 | 12, 15 |
Microsoft Windows (x64) | 7, 8, 8.1, 10, 11, Server 2008 R2, Server 2012, Server 2012 R2, Server 2016, Server 2019, Server 2022 | 7, 8, 8.1, 10, 11, Server 2008 R2, Server 2012, Server 2012 R2, Server 2016, Server 2019, Server 2022 |
Hardware and Space Requirements
The Tectia products can be run on any standard hardware capable of running the supported operating system versions. The machine should have a TCP/IP connection.
Client | ConnectSecure | Server | |
RAM | any | any | 1 Gba |
Disk space | 100 MB | 100 MB | 100 MB |
a For hundreds of simultaneous tunnels
Universal SSH Key Manager
Universal SSH Key Manager is the first and only enterprise class solution to eliminate internal and external security risks, reduce operational costs and meet or exceed compliance mandates.
PrivX
PrivX On-Demand Access Manager Makes Privileged Access Easier and More Secure Without Sacrificing Business Velocity
Tectia SSH Server for z/OS
Tectia SSH Server for IBM z/OS is the most trusted remote access and secure FTP server software in the industry. It's easy to set up and combines enterprise-grade reliability with high performance and a light toll on cryptographic processing.