Tectia

Tectia

SSH Communications Security
+
+

Related Products

  • Cerberus FTP Server
    159 Ratings
    Visit Website
  • 3Q
    14 Ratings
    Visit Website
  • MyQ
    182 Ratings
    Visit Website
  • Frontegg
    383 Ratings
    Visit Website
  • Everstage
    3,550 Ratings
    Visit Website
  • ManageEngine ADManager Plus
    632 Ratings
    Visit Website
  • 1Password
    16,573 Ratings
    Visit Website
  • My Member Software
    24 Ratings
    Visit Website
  • gPanel
    68 Ratings
    Visit Website
  • SiteKiosk
    25 Ratings
    Visit Website

About

Bastillion is a web-based SSH console that centrally manages administrative access to systems. Web-based administration is combined with the management and distribution of users' public SSH keys. Key management and administration are based on profiles assigned to defined users. Administrators can log in using two-factor authentication with Authy or Google Authenticator. From there they can manage their public SSH keys or connect to their systems through a web shell. Commands can be shared across shells to make patching easier and eliminate redundant command execution. Bastillion layers TLS/SSL on top of SSH and acts as a bastion host for administration. Protocols are stacked (TLS/SSL + SSH) so infrastructure cannot be exposed through tunneling/port forwarding. Also, SSH key management is enabled by default to prevent unmanaged public keys and enforce best practices. Bastillion is available for free use under the Prosperity Public License.

About

We are a cybersecurity company dedicated to safeguarding mission-critical data in transit, in use, and at rest for leading organizations around the world. Assess your SSH key estate and related SSH key risks with our self-service tool SSHerlock. SSHerlock is an SSH key and post-quantum resilience discovery and audit self-service tool and can be used free of charge. Passwordless authentication, operational technology (OT) security, defensive cybersecurity, and more. What are the top trends that will shape cybersecurity in the upcoming year? PrivX is perfect for securing, managing and tracking superuser and power user access in the hybrid cloud - by also eliminating risky privileged passwords from critical infrastructures. UKM Zero Trust manages and automates the lifecycle of millions of encryption keys for risk mitigation and audit success - also by making access keyless. Software-based NQX features matchless performance and security.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Anyone in search of a web-based console solution to manage administrative access to systems

Audience

Companies searching for a solution to manage and improve their security operations

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

$0.015 per hour
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Bastillion
United States
github.com/bastillion-io/Bastillion

Company Information

SSH Communications Security
Founded: 1995
Finland
www.ssh.com/products/tectia-ssh/

Alternatives

Alternatives

Xshell

Xshell

NetSarang
ZOC

ZOC

EmTec

Categories

Categories

Integrations

AWS Marketplace
Acceptto Zero Trust Identity (CIAM)
Amazon Web Services (AWS)
Authy
Entitle
Google Authenticator
HashiCorp Vault
IBM z/OS
NetThunder

Integrations

AWS Marketplace
Acceptto Zero Trust Identity (CIAM)
Amazon Web Services (AWS)
Authy
Entitle
Google Authenticator
HashiCorp Vault
IBM z/OS
NetThunder
Claim Bastillion and update features and information
Claim Bastillion and update features and information
Claim Tectia and update features and information
Claim Tectia and update features and information