Best Software for 2025 is now live!
Save to My Lists
Claimed
Claimed

Top Rated SSH Universal Key Manager Alternatives

SSH Universal Key Manager Reviews & Product Details

SSH Universal Key Manager Overview

What is SSH Universal Key Manager?

SSH Universal Key Manager grants, automates and enables single sign-on remote access to the digital core of every Fortune 500 company.

SSH Universal Key Manager Details
Languages Supported
English
Show LessShow More
Product Description

SSH Universal Key Manager grants, automates and enables single sign-on remote access to the digital core of every Fortune 500 company.


Seller Details
Year Founded
1995
HQ Location
Helsinki, FI
Twitter
@SSH
3,390 Twitter followers
LinkedIn® Page
www.linkedin.com
521 employees on LinkedIn®
Ownership
HEL: SSH1V
Description

SSH Communications Security is a cybersecurity company specializing in secure access and data protection solutions. Founded in 1995, the company is known for its innovative technologies that enhance secure communications and data integrity across various platforms. Their offerings include SSH Tectia for secure file transfer and remote access, as well as solutions for managing encryption keys and compliance. With a focus on enterprise security, SSH Communications Security helps organizations safeguard critical information in both on-premises and cloud environments. For more information, visit their website at https://www.ssh.com.


Abhishek S.
AS
Overview Provided by:
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

SSH Universal Key Manager Media

Answer a few questions to help the SSH Universal Key Manager community
Have you used SSH Universal Key Manager before?
Yes
G2 reviews are authentic and verified.

There are not enough reviews of SSH Universal Key Manager for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Egnyte Logo
Egnyte
4.4
(1,012)
Egnyte delivers the only modern content platform that is purpose-built for businesses. Egnyte gives IT centralized control and protection over their files, and users fast access to their content, no matter how or where work happens.
2
Virtru Email Encryption Logo
Virtru Email Encryption
4.4
(327)
Virtru puts you in charge of how your digital information is shared. Combining control, convenience, and simplicity, Virtru makes it easy to keep your private communications private.
3
Salesforce Shield Logo
Salesforce Shield
4.5
(82)
Salesforce Security and Privacy offers a powerful set of tools for any customer who needs an extra level of control to meet internal or regulatory compliance requirements.
4
Akeyless Platform Logo
Akeyless Platform
4.6
(67)
Unified secrets management vault platform is built to secure DevOps secrets and access to production resources, made for hybrid cloud as well as legacy environments
5
Azure Key Vault Logo
Azure Key Vault
4.4
(57)
Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms and enables the use of Hardware Security Modules (HSM) for high value customer keys.
6
Keyfactor Command Logo
Keyfactor Command
4.5
(56)
Keyfactor Command, formerly Certified Security Solutions (CSS), is a leading provider of secure digital identity management solutions that enables organizations to confirm authenticity, and ensure the right things are interacting in the right ways in our connected world.
7
Doppler secrets management platform Logo
Doppler secrets management platform
4.8
(55)
Doppler’s developer-first secrets management platform empowers teams to seamlessly orchestrate, govern, and control secrets across any environment at scale.
8
SecureKey Logo
SecureKey
4.2
(49)
SecureKey is a leading identity and authentication provider that simplifies consumer access to online services and applications.
9
HashiCorp Vault Logo
HashiCorp Vault
4.3
(45)
HashiCorp Vault is a tool that secure user applications and infrastructure to limit the surface area and attack time in the event of a breach
10
OpenSSH Logo
OpenSSH
4.7
(40)
OpenSSH provides tools that allows you to encrypt all traffic to help manage eavesdropping, connection hijacking, and other attacks to your Internet while providing secure tunneling capabilities and more.
Show More