Introducing the 9.0 Official Releases of SecureCRT, SecureFX, and VanDyke ClientPack

The Official releases of SecureCRT 9.0, SecureFX 9.0, and VanDyke ClientPack 9.0 are now available for download.

New in SecureCRT 9.0 (Official)

  • Consolidate network connections within SecureCRT 9.0 for Windows by connecting RDP sessions in tabs or tiles.
  • Python 3 support adds to the extensive scripting options available in SecureCRT, allowing automation of administrative tasks. External modules can be called from Python 3 scripts, making scripting even more powerful.
  • On Windows, save time with the integrated scratchpad tab and script editor tab. Just open a scratchpad tab and start writing notes. Edit local Python or ActiveX scripts without leaving SecureCRT.
  • Customize SecureCRT to work for you.  Set the status bar to show only the items you choose, in the order you want to see them. Pre-load agent keys to save time. Use the Command Manager to save and organize commands in folders.

Visit the SecureCRT 9.0 (Official) page for a list of new features.
Download SecureCRT 9.0 (Official).

The RDP implementation seems rock-solid. Way better than what Windows has. I’ll be using this function from now on.  — Geoffrey Aigeltinger, Verification specialist with a global communications technology company

SecureCRT 9.0 Supports RDP

Consolidate network connections within SecureCRT by connecting RDP sessions in tabs or tiles.

New in SecureFX 9.0 (Official)

  • Amazon S3 support allows you to easily transfer files to and from your secure Amazon cloud storage.
  • Enhanced file transfer options streamline your workflow.  Automatically remove files from the transfer queue and enable time stamping by the destination server.
  • Save time with the ability to pre-load agent keys.  Find sessions even faster using wildcards in the Session Manager filter box.

Visit the SecureFX 9.0 (Official) page for a list of new features.
Download SecureFX 9.0 (Official).

New in VanDyke Clientpack 9.0 (Official)

  • ClientPack now supports the rsa-sha2-256 and rsa-sha2-512 public-key algorithms (RFC 8332).
  • Platform support now includes Ubuntu 20.04 LTS and Red Hat Enterprise Linux 8.

Visit the VanDyke ClientPack (Official) page for a list of new features.
Download VanDyke ClientPack 9.0 (Official).

You can download any of the 9.0 Official releases from the download page.

We want to hear your feedback. Send questions, requests, and bug reports to

How to Telework Securely Using SSH2 Tunneling, SecureCRT, and VShell

The COVID-19 virus has created a need for people to be able to telework securely. While many larger organizations already have a VPN set up, many smaller- and medium-sized organizations do not. Port forwarding (or tunneling) over an SSH2 connection is a way to secure TCP/IP traffic and is simpler to set up than a VPN.

Types of data that can be securely tunneled include:

  • RDP
  • Email
  • VNC
  • Web applications (HTTP)
  • Clients that use remote databases (e.g, Salesforce, SVN and Git, bug tracking tools)

Here are a couple of ways VanDyke Software employees who work from home use SSH2 port forwarding:

  • Securely access a work computer by tunneling RDP traffic using SecureCRT and a VShell server that is behind a firewall
  • Run local email, SVN, and bug tracker clients, which can securely access remote databases by tunneling IMAP/SMTP and other TCP traffic using SecureCRT and a VShell server that is behind a firewall

To help you learn more, we created an online white paper, Tunneling with Secure Shell

This white paper:

  • Examines threats addressed by tunneling over the public Internet or a company intranet
  • Explains how SSH port forwarding, authentication, and access control features work
  • Illustrates common applications like email, file sharing, and screen sharing as they are tunneled over residential broadband and WiFi networks
  • Considers security implications and where tunneling is best used

If you have questions, contact us at

Survey Finds More Than Three-Fourths (78%) of Respondents Are Still Using Unencrypted Protocols to Transfer At Least Some of Their Files

Today we released a summary of findings from a VanDyke Software-commissioned survey conducted in September 2019 by Amplitude Research.

The findings reflect that less than safe security protocols abound for file transfer in the workplace. In total, 450 professionals who use or are involved in decisions about data protection and file transfer solutions at their organization completed the survey. The margin of error was +/- 4.6%

Throughout 2019, it was not uncommon for news reports to document data breaches and cyber hacking of small, medium and large enterprises alike. Perhaps the scariest data breach thus far in 2019 was the one suffered by Capital One, reported this past summer, which affected about 100 million people. According to the IBM-sponsored study by the Ponemon Institute released this year, which queried 507 organizations across 16 geographies and 17 industries, the average cost of a single data breach was $3.92 million, and in the United States the average was $8.19 million per breach. Meanwhile, file transfers continue to be a critical, high-volume part of corporate operations.

The VanDyke Software-commissioned survey conducted by Amplitude Research in September 2019 queried professionals from small, medium and large organizations working in a variety of industries and found that nearly half (48%) of companies are transferring files at least multiple times per day and sometimes “continuously.” File servers today are likely to be running Windows and hosted in the cloud, and the transfers themselves are often unencrypted and not protected with two-factor authentication.

The following are a sample of some of the key findings from the survey:

  • More than three-fourths (78%) of companies are hosting their file transfer servers mostly or completely on Windows, compared to 36% for Linux / UNIX, and 25% for macOS.
  • Two-thirds (67%) of companies are hosting some or all of their file transfer servers in the cloud.
  • HTTPS was the secure protocol used most often (60%) when connecting to their file transfer server, while slightly more than one-third used FTPS (35%) and SSH2/SFTP (34%). More than half (58%) use non-secure HTTP at least sometimes when connecting to their file transfer server, and more than one-third (38%) use non-secure FTP. The most common type of authentication when connecting to a file transfer server was using a password (55%), followed by two-factor authentication (44%), single sign on (SSO) (32%), and public key (22%).
  • A correlation exists between compliance requirements and authentication. For those companies that do not have to comply with any standards or regulations, just 27% use two-factor authentication. If, however, a company does have compliance requirements, 47% use two-factor authentication.

Danielle Argiro, Product Director at VanDyke Software noted, “Considering the impact that a data breach can have on an organization, it is concerning that fewer than half of the respondents to this survey use two-factor authentication to connect to their file transfer server.”

To read the full press release, please visit the Press Release section on the VanDyke Software website.

About Amplitude Research, Inc.
Amplitude Research is a full-service online survey company and market research firm headquartered in Boca Raton, Florida that serves a wide variety of industries and markets throughout the United States and globally. Amplitude specializes in all kinds of consumer, b2b and IT market research studies, b2b customer satisfaction studies, and job satisfaction / employee engagement surveys. Amplitude’s services include study design, survey administration, sampling, data analysis, custom report writing, and a full range of additional reporting and survey administration services. For more information about Amplitude Research, visit the company’s website at