www.ssh.com Open in urlscan Pro
199.60.103.227  Public Scan

Submitted URL: https://c2-jv04.na1.hs-sales-engage.com/Ctc/48+23284/c2-jV04/Jl22-6qcW7lCdLW6lZ3mjW3T6PF_5Jh2ChW70nFSg2J7Ct9VZks8M5kSB34W742QZF5TV6_NW2b...
Effective URL: https://www.ssh.com/products/tectia-ssh/quantum-safe
Submission: On January 23 via api from ES — Scanned from ES

Form analysis 0 forms found in the DOM

Text Content

 * About us
 * Investors
 * Partners
 * Careers

Request demo

 * Solutions
   * SOLUTIONS
     * Zero Trust Suite
     * Quantum-Safe Cryptography (QSC)
     * Secure Business Communications
     * Security Risk Assessment, Quantification & Mitigation
   * By Topic
     * Just-in-Time Access
     * Secure vendor access
     * Credentials & Secrets Management
     * Hybrid & multi-cloud access management
     * Interactive tour: Privileged Access in the Cloud
     * M2M connections
     * IT Audits & Compliance
     * Secure file transfer
   * By Industry
     * Managed Service Providers (MSP)
     * Operational Technology (OT)
     * Federal Government Security
 * Products
   * SECURE ACCESS & SECRETS MANAGEMENT
     * PrivX™ Hybrid PAM
     * Universal SSH Key Manager®
   * SECURE FILE TRANSFER & ENCRYPTION
     * NQX™ quantum-ready encryption
     * Tectia™ SSH Client/Server
     * Tectia™ z/OS
   * SECURE BUSINESS COMMUNICATIONS
     * Deltagon Secure Email
     * Deltagon Secure Sign
     * All-in-one Deltagon Secure Communications Suite

Request demo

 * Solutions
   * SOLUTIONS
     * Zero Trust Suite
     * Secure Collaboration 2024
     * Strong ID-based access with Entra ID & PrivX
     * Quantum-Safe Cryptography (QSC)
     * Security Risk Assessment, Quantification & Mitigation
     * OpenSSH by SSH
     * Device trust & access and identity verification
     * Identity-based authentication & converged IAM and PAM
   * TOPICS
     * Just-in-Time Access
     * Secure vendor access
     * Credentials & Secrets Management
     * Hybrid & Multi-Cloud Access Management
     * Interactive tour: Privileged Access in the Cloud
     * M2M Connections Management
     * IT Audits & Compliance
     * Secure File Transfer
   * INDUSTRIES
     * Managed Service Providers (MSP)
     * Operational Technology (OT)
     * Federal Government Security
     * Healthcare Data Security
 * Products
   * SECURE BUSINESS COMMUNICATIONS
     * Secure Mail 2024
     * Secure Messaging 2024
     * Secure Sign
     * All-in-one Secure Collaboration
   * SECURE ACCESS & SECRETS MANAGEMENT
     * PrivX™ hybrid PAM
     * Universal SSH Key Manager®
   * SECURE FILE TRANSFER & ENCRYPTION
     * Tectia™ SSH Client/Server
     * Tectia™ SSH Server for IBM z/OS
     * NQX™ quantum-safe encryption
 * Services
   * SSH Risk Assessment™
   * Professional Services
   * Support
   * Contact us
 * Customer cases
   * PrivX Zero Trust PAM
   * Enterprise Key Management UKM
   * Tectia SFTP for servers & mainframes
   * SSH Secure Collaboration
 * Resources
   * SSH Academy
   * Content library
   * Blog
   * References
   * Press releases
   * Downloads
   * Manuals
   * Events & Webinars
   * Media
   * Legal
   * Report a vulnerability

 * Solutions
   * SOLUTIONS
     * Zero Trust Suite
     * Secure Collaboration 2024
     * Strong ID-based access with Entra ID & PrivX
     * Quantum-Safe Cryptography (QSC)
     * Security Risk Assessment, Quantification & Mitigation
     * OpenSSH by SSH
     * Device trust & access and identity verification
     * Identity-based authentication & converged IAM and PAM
   * TOPICS
     * Just-in-Time Access
     * Secure vendor access
     * Credentials & Secrets Management
     * Hybrid & Multi-Cloud Access Management
     * Interactive tour: Privileged Access in the Cloud
     * M2M Connections Management
     * IT Audits & Compliance
     * Secure File Transfer
   * INDUSTRIES
     * Managed Service Providers (MSP)
     * Operational Technology (OT)
     * Federal Government Security
     * Healthcare Data Security
 * Products
   * SECURE BUSINESS COMMUNICATIONS
     * Secure Mail 2024
     * Secure Messaging 2024
     * Secure Sign
     * All-in-one Secure Collaboration
   * SECURE ACCESS & SECRETS MANAGEMENT
     * PrivX™ hybrid PAM
     * Universal SSH Key Manager®
   * SECURE FILE TRANSFER & ENCRYPTION
     * Tectia™ SSH Client/Server
     * Tectia™ SSH Server for IBM z/OS
     * NQX™ quantum-safe encryption
 * Services
   * SSH Risk Assessment™
   * Professional Services
   * Support
   * Contact us
 * Customer cases
   * PrivX Zero Trust PAM
   * Enterprise Key Management UKM
   * Tectia SFTP for servers & mainframes
   * SSH Secure Collaboration
 * Resources
   * SSH Academy
   * Content library
   * Blog
   * References
   * Press releases
   * Downloads
   * Manuals
   * Events & Webinars
   * Media
   * Legal
   * Report a vulnerability

 * About us
 * Investors
 * Partners
 * Careers

Request demo


TECTIA® SSH CLIENT/SERVER QUANTUM-SAFE EDITION


Benefits Tectia Zero Trust FAQ References Try Tectia


GET QUANTUM-SAFE WITH TECTIA


ENCRYPT YOUR FILE TRANSFER
AND REMOTE ACCESS WITH
POST-QUANTUM TECHNOLOGY

All you need in the era of quantum computers to protect your data-in-transit.
Tectia SSH Client/Server with post-quantum algorithms.

Request pricing Get free trial




QUANTUM SECURITY WITH A CLEAR PATH TO FUTURE-PROOF YOUR BUSINESS

Tectia SSH Client/Server Quantum-Safe Edition is a quantum-safe solution to
secure your data-in-transit against quantum decryption attacks.

Tectia Quantum-Safe Edition offers complete platform support for Windows, Linux,
Unix as well as MacOS.




GUIDE TO QUANTUM-SAFE CRYPTOGRAPHY (QSC) FOR ENTERPRISES

Start your journey toward quantum safety with an overview guide to Quantum-Safe
Cryptography (QSC).

Quantum security Guide







WHY GET QUANTUM-SAFE NOW?

 1. The Quantum Threat. The power of quantum computers is increasing and will
    eventually reach a point where classical cryptography is in danger.
 2. Changes do not happen overnight. A full infrastructure upgrade to
    Quantum-Safe can take years. NIST strongly recommends to start preparing
    your information security systems now.
 3. Long-term secrets in danger. Transmissions are vulnerable to a recording
    attack - they can be stored and decoded later. Any long-term secret in such
    a transmission can be exposed.
    


WHO ELSE IS GETTING QUANTUM-SAFE?

 * The US Congress issued the Quantum Computing Cybersecurity Preparedness Act
   on prioritizing the migration toward post-quantum cryptography.
 * NIST's competition for the best Quantum safe algorithms has been running
   since 2016, the primary candidates are implemented by Tectia Quantum Safe.
 * Large financial organizations already started the migration to quantum-safe.
   Our customers are already using Tectia Quantum Safe.




QUANTUM COMPUTERS WILL EXPOSE YOUR SECRETS
CAPTURED DURING A RECORDING ATTACK

1. CYBERCRIME AND THE CAPABILITIES OF CYBERCRIMINALS ARE INCREASING

The financial capabilities of cybercriminals and hostile state actors are
estimated to increase rapidly in the following years - from 1 to 10 trillion by
2025.

2. QUANTUM COMPUTERS ALREADY EXIST

Small quantum computers are available in the cloud, which anyone can access for
a reasonably low cost. Even though the current processing power is not enough,
your traffic can be snooped and cracked in a few years. With more sophisticated
quantum computing technology, any encrypted data is potentially vulnerable.

3. SECRETS NOW ARE NOT NECESSARILY SECRETS IN THE FUTURE

All current data encryption is based on classical cryptography, which is
vulnerable to quantum attacks and bears the risk of exploitation by quantum
computers. With the rapid growth of quantum computing resources, they will soon
become a threat to traditional cryptography.


POST-QUANTUM ALGORITHMS CAN PROTECT YOUR SECRETS
AGAINST RECORDING ATTACKS - NOW AND IN THE FUTURE

YOU CAN PROTECT YOUR ORGANIZATION WITH POST-QUANTUM ALGORITHMS

Post-quantum encryption algorithms are a special class of algorithms. Quantum
computers have no specific advantage against them - not now, or in the
foreseeable future.

Learn more about the quantum threat





TECTIA QUANTUM-SAFE EDITION MAKES YOUR BUSINESS QUANTUM-SAFE


BE COMPLIANT WITH NIST/BSI RECOMMENDATIONS

Tectia Quantum-Safe Edition supports the following post-quantum encryption
algorithms:

 * Crystals/Kyber – primary NIST (US) standardization candidate
 * FrodoKem – recommended by BSI (Germany)
 * NTRU – retained for OpenSSH compatibility
 * FireSaber – retained for backwards compatibility


ENJOY FULL PLATFORM SUPPORT AND TOP PERFORMANCE

Tectia Quantum-Safe Edition supports all major platforms, similarly to the
original Tectia, but with a few additions. Supported platforms include Microsoft
Windows, Linux, HP-UX, AIX, Solaris, and newly also MacOS.


ENSURE FULL COMPATIBILITY WITH OTHER SSH

Tectia Quantum-Safe Edition supports classical encryption algorithms, providing
full compatibility with earlier Tectia technology and competing SSH
implementations, like OpenSSH.

Tectia Quantum-Safe Edition is also compatible with Tectia Server for IBM z/OS
Edition, our secure mainframe file transfer solution.


SECURE YOUR BUSINESS WITH A HYBRID ALGORITHM APPROACH

Quantum computers will not have a specific advantage against quantum-safe
algorithms.

To make Tectia extra secure, we have used the hybrid algorithm approach - a
combination of classical and quantum-ready algorithms to protect your
organization against traditional as well as quantum attacks.


BE QUANTUM-SAFE AND FIPS COMPLIANT

Tectia Quantum-Safe Edition can be run in FIPS mode so that it is
both quantum-safe and FIPS compliant at the same time.


SECURE ANY CONNECTION WITH TUNNELING

With the tunneling feature of Tectia Quantum-Safe Edition, any TCP/IP connection
can be made quantum-safe.

We also offer NQX, a high-performance, quantum-ready VPN solution. Tectia
Quantum-Safe Edition can be combined with NQX, as a tunnel-in-a-tunnel solution.
Tectia Quantum-Safe Edition end-to-end encryption going through an NQX tunnel.




COMPARE TECTIA QUANTUM-SAFE EDITION AND OPENSSH

Learn more about the specifications of Tectia Client/Server Quantum-Safe Edition
and compare them to open-source software OpenSSH. 

View the comparison sheet




LEARN MORE ABOUT THE NEED FOR POST-QUANTUM CRYPTOGRAPHY

We have a 25-year-long track record as innovators in encryption and are a
leading player in mitigating the threat of quantum computing with post-quantum
cryptography (PQC) and quantum-safe cryptography (QSC). 

Read about why financial institutions should take the quantum threat seriously.

Quantum whitepaper

 

 




CONTACT US FOR PRICING

Talk to our friendly experts now about pricing, renewals, and contracts.

Request pricing

We at SSH secure communications between systems, automated applications, and
people. We strive to build future-proof and safe communications for businesses
and organizations to grow safely in the digital world.

 * Solutions
   * Zero Trust Suite
   * Quantum-Safe Cryptography (QSC)
   * Secure Collaboration 2024
   * Security Risk Mitigation
   * OT security
   * MSP Security
   * Just-in-Time Access
   * Secure vendor access
   * Hybrid cloud security
   * Credentials & Secrets Management
   * IT Audits & Compliance
 * Products
   * PrivX™ Hybrid PAM
   * UKM Zero Trust™
   * Tectia SSH Client/Server™
   * Tectia™ z/OS
   * SSH Secure Collaboration 2024
   * Secure Mail 2024
   * Secure Sign
   * NQX™ Quantum-Safe
 * Services
   * SSH Risk Assessment™
   * Professional Services
   * Support
 * Resources
   * References
   * Downloads
   * Manuals
   * Events & Webinars
   * Blog
 * Company
   * About us
   * Contact
   * Investors
   * Partners
   * Press

STAY ON TOP OF THE LATEST IN CYBERSECURITY

Be the first to know about SSH’s new solutions, product updates, new features,
and other SSH news!

Thanks for submitting the form.

© Copyright SSH • 2023 • Legal






PRIVACY PREFERENCE CENTER

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information
Allow All


MANAGE CONSENT PREFERENCES

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.
These cookies do not store any personally identifiable information.

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site. All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.


BACK BUTTON PERFORMANCE COOKIES



Vendor Search Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Confirm My Choices


By clicking “Accept All Cookies”, you agree to the storing of cookies on your
device to enhance site navigation, analyze site usage, and assist in our
marketing efforts.

Cookies Settings Accept All Cookies