Wal-Mart deploys new data security system

Wal-Mart Stores has deployed a data security and encryption system to secure data going over its global network.

Wal-Mart Stores has deployed a data security and encryption system to secure data going over its global network.

Wal-Mart went to SSH Communications Security to supply its SSH Tectia solution to enable secure remote access and deliver secure end-to-end data file transfer throughout the retailer's international network.

The SSH Tectia client/server solution secures sensitive company data in transit, delivering strong encryption, support for heterogeneous computing platforms and multiple authentication technologies, along with enhanced SFTP (Secure File Transfer Protocol) capabilities.

Wal-Mart has also selected SSH Tectia Manager, a communications security management platform to manage the enterprise-wide SSH Tectia security solution.

"With the size and complexity of our environment, it was important to find a solution that could be used on all platforms," said Kerry Kilker, Wal-Mart vice president of information security.

"The centralised management of SSH Tectia Manager will enable us to quickly deploy, easily maintain and simplify configuration management in our environment.

That is where we expect to see the most return on investment with this technology," said Kilker.

Comment on this article: computer.weekly@rbi.co.uk

Read more on IT risk management

Has perimeter security become obsolete? Tatu Ylönen, founder of Helsinki, Finland-based SSH Communications Security Corp., developed the Secure Shell protocol in 1995. Today, millions worldwide use it for secure remote logins and data transfers over the Internet.

At next week's RSA Security conference, he'll give a presentation on how the growing use of integrated, complex applications has made cyberspace more dangerous, blunting the effectiveness of perimeter security. (The session is Feb. 14, 3:25 p.m., in SJCC Room J2 at the San Jose McEnery Convention Center.)

In this Q&A, Ylönen explains how attacks against integrated applications could cause widespread damage, and how the program he created is being used to counter the threat today.

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.