ssh communications security espoon.pdf · what is secure shell? • technology invented by ssh...

19
Copyright 2014 SSH Communications Security Copyright 2014 SSH Communications Security Espoon-Kauniaisten Osakesäästäjät SS C c s Sec J k C

Upload: others

Post on 20-May-2020

9 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: SSH Communications Security Espoon.pdf · What is Secure Shell? • Technology invented by SSH Communication Security in 1995 • Enables corporate to manage access to its information

Copyright 2014 SSH Communications Security Copyright 2014 SSH Communications Security

Espoon-Kauniaisten Osakesäästäjät

May 14, 2014

SSH Communications Security

Jyrki Lalla

CFO

Page 2: SSH Communications Security Espoon.pdf · What is Secure Shell? • Technology invented by SSH Communication Security in 1995 • Enables corporate to manage access to its information

Copyright 2014 SSH Communications Security

Contents

• The Business SSH is in

• Highlights from Q1 / Financial performance

• Going forward

Page 3: SSH Communications Security Espoon.pdf · What is Secure Shell? • Technology invented by SSH Communication Security in 1995 • Enables corporate to manage access to its information

Copyright 2014 SSH Communications Security

Boston, USA

Germany

Helsinki, Finland (HQ)

Hong Kong

UK

= SSH Office = SSH Competence Center

The business SSH is in

• Cybersecurity applications for server access and encryption

in large IT-environments (private and public)

• Key management

• Access management

• Data in transit encryption

• Our customers include more than

half of the biggest financial institution

in USA

• 90% of sales outside Finland

• Patent licensing

Page 4: SSH Communications Security Espoon.pdf · What is Secure Shell? • Technology invented by SSH Communication Security in 1995 • Enables corporate to manage access to its information

Copyright 2014 SSH Communications Security

What is Secure Shell?

• Technology invented by SSH Communication Security in 1995

• Enables corporate to manage access to its information securely :

– Secure remote login (replace Telnet)

– Secure file transfer (replace or secure FTP)

– Secure remote command execution (replace rsh)

– Secure backup and copy

– Secure tunneling of existing unsecured

TCP applications

– Enables authentication for scheduled and automated file

transfers and other tasks where user interaction is not possible

• Is an IETF standard. Open source and commercial implementations are

available for most systems.

Page 5: SSH Communications Security Espoon.pdf · What is Secure Shell? • Technology invented by SSH Communication Security in 1995 • Enables corporate to manage access to its information

Copyright 2014 SSH Communications Security

Where is Secure Shell used?

• SSH protocol is widely used

– by system administrators

– in automated machine-to- machine processes

• SSH protocol is used on

– every Unix/Linux computer

– most cloud computing environments

– more than half of the world’s web sites

– most xDSL modems, routers, telecom exchanges and other network equipment.

• SSH protocol has been in use since 1995 and it is used widely today

– millions of SSH keys are used daily

• SSH protocol is still secure

• But the way corporations are handling keys are not next opportunity

Source: Forrester The Rise Of IT Automation And The New Security Imperatives, Feb 2014

Page 6: SSH Communications Security Espoon.pdf · What is Secure Shell? • Technology invented by SSH Communication Security in 1995 • Enables corporate to manage access to its information

Copyright 2014 SSH Communications Security

Encrypted Data in transit / Key management

20%

of Identities

80%

of Identities

Interactive Access (End User interaction) Protocols Used: TLS/SSL, SSH Market Players: Oracle, Centrify, Likewise, EMC, IBM,...

Automated Access (Machine to Machine) Protocols Used: SSH, SFTP, RSYNC Different segments: - Specialized applications (like IBM websphere, Oracle,..) - Homemade applications - Unix environment

Universal SSH Key Manager™: “manage & govern” •Access management for machine-to-machine communication. •Currently no one else can deliver. •Other players : Venafi

Page 7: SSH Communications Security Espoon.pdf · What is Secure Shell? • Technology invented by SSH Communication Security in 1995 • Enables corporate to manage access to its information

Copyright 2014 SSH Communications Security

The Privileged Access Management a market of c 300M$*

Shared Privileged Accounts

Know who accessed what

account and when

Privileged User Controls

Limit the activities of high privilege

users

Audit and Visibility

Know what privileged uses are

doing

CyberArk CA Dell Quest Xceedium SSH Comm. Sec.

BeyondTrust CA Centrify CyberArk Dell Quest SSH Comm. Sec.

SSH Comm. Sec. BalaBit ObserveIT Xceedium CyberArk

CryptoAuditor™: “content awareness” •Provides capabilities to monitor, control and audit encrypted communication and prevent data loss.

•Other players: Cyber-Ark, BeyondTrust, xCeedium, Balabit.

* Gartner estimation

Page 8: SSH Communications Security Espoon.pdf · What is Secure Shell? • Technology invented by SSH Communication Security in 1995 • Enables corporate to manage access to its information

Copyright 2014 SSH Communications Security

Contents

• The Business SSH is in

• Highlights from Q1 / Financial performance

• Going forward

Page 9: SSH Communications Security Espoon.pdf · What is Secure Shell? • Technology invented by SSH Communication Security in 1995 • Enables corporate to manage access to its information

Copyright 2014 SSH Communications Security

Highlights in Q1

• Sales flat, profitability declined, cash position remained strong

• Sales 2,9M (Q1 2013: 2,9M); -1% YoY

• EBIT -0,9M; -31,1% of net sales (0,1M; 1,9%)

• Cash flow from operations +0,4M (+1,3M), cash position remained strong

• Cybersecurity

• Interests and needs increasing, but deals progressing slowly

• Governmental segment: ”a snowden snowball effect”

• SSH Security and Access management

• Use of SSH protocol ubiquitous and continues to spread (unix, linux, cloud services)

• Management of encryption and server access (key management) remains a real customer problem to be solved.

• Pressure from compliance requirements building up

Page 10: SSH Communications Security Espoon.pdf · What is Secure Shell? • Technology invented by SSH Communication Security in 1995 • Enables corporate to manage access to its information

Copyright 2014 SSH Communications Security

Challenging Q1

• Q1 sales declined by -1%

• Deferred revenue remains

strong

• Weak licence sales a

disappointment

• Sales cycle longer than

anticipated

• Pressure from compliance

requirements building up

• Customer problems more

complicated than anticipated

• Investments in future growth continued

Q1´13 Q2’13 Q3’13 Q4’13 Q1’14

Sales M€ 2,9 3,3 3,0 4,1 2,9

OPEX M€ 2,5 3,0 2,8 3,1 3,2

EBIT M€ 0,1 -0,1 -0,4 0,6 -0,9

% EBIT % 1,9 -1,3 -9,1 14,0 -31,1

Personnel eop 80 86 94 99 101

M€

sales / region

Page 11: SSH Communications Security Espoon.pdf · What is Secure Shell? • Technology invented by SSH Communication Security in 1995 • Enables corporate to manage access to its information

Copyright 2014 SSH Communications Security

Balance sheet allows investing in growth

• Positive cash flow from operations

• Strong cash position remained

2011 2012 2013 Q1´14

B/S M€ 6,4 12,5 13,5 12,2

Cash and cash equivalents M€ 2,4 6,6 6,0 5,8

Cashflow from operations M€ -0,8 1,3 0,4 0,4

ROE % -110 31 2 -14

Equity ratio % 36 70 77 76

Gearing % -230 -105 -80 -89

Profit/loss per share EUR -0,07 0,04 -0,00 -0,03

Equity per share EUR 0,03 0,20 0,24 0,21

Page 12: SSH Communications Security Espoon.pdf · What is Secure Shell? • Technology invented by SSH Communication Security in 1995 • Enables corporate to manage access to its information

Copyright 2014 SSH Communications Security

Contents

• The Business SSH is in

• Highlights from Q1 / Financial performance

• Going forward

Page 13: SSH Communications Security Espoon.pdf · What is Secure Shell? • Technology invented by SSH Communication Security in 1995 • Enables corporate to manage access to its information

Copyright 2014 SSH Communications Security

Patent licensing

• Interim Q2 results/July 24, 2013: CEO´s review:

“The company is also working towards capitalizing on its patent portfolio, which appears to include several essential patents on technologies used in leading smartphones, tablets, state-of-the-art telephony and video conferencing systems, game consoles, and operating systems. The total sales of products using technologies patented by the company may exceed USD 100bn annually. The patent portfolio may generate significant revenue in the future either in the form of revenue from sale of the patents or royalties.”

Page 14: SSH Communications Security Espoon.pdf · What is Secure Shell? • Technology invented by SSH Communication Security in 1995 • Enables corporate to manage access to its information

Copyright 2014 SSH Communications Security

Strategy: Key Actions

Customer buying Universal SSH Key Manager™

Working with press and analysts to create understanding

of the security risk

Page 15: SSH Communications Security Espoon.pdf · What is Secure Shell? • Technology invented by SSH Communication Security in 1995 • Enables corporate to manage access to its information

Copyright 2014 SSH Communications Security

Compliance Requires Action

Multiple Mandates for Secure Shell Controls

PCI-DSS MAS

COBIT ISO27002

SOX HIPAA

NIST FFIEC

Secure Shell Has Impact Across All Domains

Page 16: SSH Communications Security Espoon.pdf · What is Secure Shell? • Technology invented by SSH Communication Security in 1995 • Enables corporate to manage access to its information

Copyright 2014 SSH Communications Security

During 2013 SSH mentioned

almost 10 000 times in media 2014 Press coverage

• USA & Global

• April 14, eWeek, Cisco, Juniper Work to Protect Networking Gear vs. Heartbleed

• April 10, Network World, Who's to blame for 'catastrophic' Heartbleed Bug?

• April 10, Latin Post, 'Heartbleed' Bug Has Everyone Worried, Here's Why

• April 9, Re/code, How Companies Are Reacting to the Heartbleed Security Bug

• April 9, eWeek, Heartbleed SSL Encryption Vulnerability Requires Quick Attention

• April 9, Dark Reading, More Than A Half-Million Servers Exposed To Heartbleed Flaw

• March 7, TMC's M2M Evolution, Big Data, Big Privacy Concerns: Identity Management in a Big Data World

• March 6, Bank Systems & Technology, A Growing Security Risk in IT Automation

• March 5, TechTarget, Survey: Centralized SSH security can help avoid high-profile breaches

• March 3, VIDEO, Huffington Post, SSH Zooms in on Security at RSA

• February 25, CIO Insight, Enterprises Failing to Secure M2M Transactions

• February 24, Channel Nomics, In Internet of Things, M2M Security Gets Short Shrift

• February 24, eWeek, Poor Security Key Management Poses Cyber-Threat to Internet of Thing

• February 20, NetworkWorld, What will be hot at RSA? NSA/tech industry battle; cyberwarfare issues dominate

• February 12, Computerworld, Slick, sick nation-state espionage malware The Mask: Mother of future cyber weapons?

• February 11, CSO, 'The Mask' malware sets standards hackers are sure to follow

• January 2014, TechTarget, SSH security risks: Assessment and remediation planning

• Japan

• February 21, Nikkin, Massive amount of ID and password is a problem

• January 31, IT Pro, SSH key management and encryption monitoring becomes more important

• United Kingdom

• April 11, SC Magazine, 9 expert opinions on the 'Heartbleed Bug'

• March, Components in Electronics, The Weakest Link – How to Best Secure M2M Connections and Protect Encrypted Networks

• March 11, The Guardian, Top Tips to Stop Cyber Criminals from Targeting Your Small Business

• February 27, Ovum, SSH Communications Security Plans TLS/SSL Support in CryptoAuditor

• February, ABI Research, Security in Next-generation Enterprise Networks

• February 25, Pro Security Zone, Rising tide of M2M demanding higher focus on encryption

• February 24, Tech Week Europe, The Internet Of Things Is A Security Disaster

• January 28, Security Park, The Key to Your Organization’s Well-Being Best Practices for Secure Shell Key Management

• Germany

• April 10, Die Welt, Diese Passwörter sollten Sie jetzt ändern

Page 17: SSH Communications Security Espoon.pdf · What is Secure Shell? • Technology invented by SSH Communication Security in 1995 • Enables corporate to manage access to its information

Copyright 2014 SSH Communications Security

Going forward

• Focus on encryption and server access control has

put SSH in an excellent position to solve pressing

data security problems in the enterprise

• Capitalize on 1-2 years lead in SSH Key management

• SSH utilize actively its patent portfolio

• SSH looks opportunities in governmental segment

as a neutral and trustworthy cybersecurity supplier

• SSH continues to invest in market creation,

technology leadership, quality, and customer

success stories for new products.

Page 18: SSH Communications Security Espoon.pdf · What is Secure Shell? • Technology invented by SSH Communication Security in 1995 • Enables corporate to manage access to its information

Copyright 2014 SSH Communications Security

Going forward

In 2014, SSH Communications Security estimates

its revenue to grow significantly and profitability to

improve from 2013. During the first half of the year

the sales growth can be smaller with possibilities

to losses due to timing of sizeable deals.

Page 19: SSH Communications Security Espoon.pdf · What is Secure Shell? • Technology invented by SSH Communication Security in 1995 • Enables corporate to manage access to its information

Copyright 2014 SSH Communications Security Copyright 2014 SSH Communications Security

Thank You!