Skip navigation

Going Beyond SSH Keys to Secure Critical Infrastructure

In this webinar, you will learn:

  • Why SSH keys aren’t enough to secure access to critical infrastructure
  • Why you should secure access at the application and network levels
  • How to improve SSH security without a VPN

The SSH protocol is a ubiquitous tool in security and network administration, used daily for secure access to critical applications and resources. Using measures like multi-factor and public key authentication can improve the security of SSH connections, but how do you streamline access while still enforcing the granular policy controls you set for all of your resources?

Join Josh Green from Duo Security for an educational webinar on September 6th, and learn how your organization can improve engineer experience, employ tiered security for any application, and reduce attack surface by taking SSH into the age of zero-trust networking with Duo.

Presenter Info

Josh Green

Josh Green is the Solutions Engineer for Duo Security’s London office, providing pre-sales engineering support for organizations of all sizes. He works closely with everyone from CIOs, CISOs, IT Security, IT management and staff on product education, planning and deployment of Duo Security products. Josh has been working in the cybersecurity space for the past 7 years dealing with Identity Management, Vulnerability Management, and Authentication. He speaks 4 languages, and in his spare time, enjoys learning new ones.