Protecting SSH Keys in Multi-Cloud Operations



  • Ryan Sanders, Product Marketing Manager at Keyfactor
  • Mark Thompson, SVP of Product Management at Keyfactor


You can’t survive without them, but without the right controls, SSH keys can quickly change from passwordless bliss to security black hole. People come and go, workloads are spun up and torn down, and before you know it, you have a mess of unmanaged and untracked SSH keys across your network. If even a single private key is compromised, you’re left vulnerable to attack.

In this webinar, we will address the emerging risks of SSH key sprawl, best practices to take back control of your SSH landscape, and how the Keyfactor SSH Key Manager can help.

Originally presented at the 2020 Keyfactor Critical Trust Virtual Summit.

Recommended Content


6 Steps to Take Back Control of your SSH Keys

SSH keys are a powerful tool to enable secure remote access, but in the wrong hands, attackers use them to infiltrate trusted connections without detection. Learn how to reduce SSH key sprawl and take back control of your inventory.


PKI & Certificate Lifecycle Automation with Keyfactor Command 

Join this on-demand demo with Jack Palivoda, Sr. Solutions Engineer at Keyfactor, to see how the product works and some of the core challenges in managing thousands of keys and certificates at scale.