Hi [[ session.user.profile.firstName ]]

Venafi - Machine Identity Protection

  • Date
  • Rating
  • Views
  • Machine Identity Protection LIVE
    Machine Identity Protection LIVE
    Jeff Hudson, CEO, Venafi Recorded: Dec 13 2018 54 mins
    As the number of machines on our networks continues to explode how can we make sure that connections and communications between them remain secure? A new era of machine identity protection begins on December 13 at 9 pmPT/12 pm ET.

    Join top industry analysts and executives for an hour of innovative and groundbreaking insights about bold new ways to extend your machine identity protection. Hear directly from industry leaders who are excited about this new development, including:

    •Rich Baich, CISO, Wells Fargo
    •Andras Cser, Vice President and Principal Analyst, Forrester Research
    •Armon Dadgar, Co-founder and CTO, HashiCorp
    •Jeff Hudson, CEO, Venafi
    •John Morgan, GM, Security Business Unit, F5 Networks
    •Jake Reynolds, General Partner, TCV
    •Dan Timpson, CTO, DigiCert

    Venafi’s goal is to provide organizations the freedom to operate with confidence through secure communication and connections, with a high level of trust in their machine identities on their network. Please join this innovative and ground breaking discussion about Machine Identity Protection. Register now!
  • Government Investigations of a Breach: When Machine Identity Protection Fails
    Government Investigations of a Breach: When Machine Identity Protection Fails
    Kevin Bocek, VP, Security Strategy & Threat Intelligence, Venafi Recorded: Dec 12 2018 47 mins
    What was the biggest breach in 2017? How did it happen? Regulators in the U.S. and U.K. have released a detailed analysis, highlighting how a failure in Machine Identity Protection enabled this complex, lengthy, hidden attack.

    A single untracked, unmanaged digital certificate was left to expire and became the foundation of this attack. Certificates authenticate machine identities for trusted machine-to-machine connections and, when compromised, create a gaping hole in an otherwise well-layered defense.

    Join this webinar and learn how cybercriminals:

    • Use an expired certificate to hide in encrypted traffic
    • Exploit additional vulnerabilities and pivot deeper into the network
    • Continue their attack for months and pilfer millions of files

    Today, well over half of attacks hide in encrypted traffic—and analysts warn that this will only increase. Learn how to defend against these types of attacks and architect effective machine identity protection for your organization. Register now!
  • Machine Identities, The Next Step for IAM
    Machine Identities, The Next Step for IAM
    Michael Thelander, Director of Product Marketing @ Venafi Recorded: Nov 14 2018 47 mins
    People rely on user names and passwords to identify themselves to machines so they can get access to networks and data.

    Machines also need to identify themselves to each other, but they don’t use user names and passwords. Instead, they use machine identities.

    We all know that the number of machines on networks is growing exponentially because the digital transformation that is happening is completely dependent on machines, not people.

    We spend over eight billion dollars protecting human identities (IAM), but almost nothing protecting machine identities.

    Bad guys know this. They now devote more time and resources to stealing machine identities.
  • What Works in Certificate and Key Management: Enabling Secure Digital Business
    What Works in Certificate and Key Management: Enabling Secure Digital Business
    John Pescatore and Troels Oerting Recorded: Oct 3 2018 49 mins
    Encryption through SSL/TLS and VPNs can help raise the bar for attackers looking to capture or compromise your sensitive information. However, doing encryption badly can lead to a false sense of security. Plus, SSL/TLS certificate management errors can disrupt your business, triggering outages when certificates expire or are revoked. Effective key and certificate management is critical to enabling secure business and maintaining high service levels.

    During this SANS WhatWorks webcast, Troels Oerting, former Chief Security Officer at Barclays Bank, shares details of why he selected Venafi and how he deployed the solution to enable discovery and management of encryption keys and certificates.

    Watch the webinar to learn the following:
    •How to avoid business disruption from expired certificates
    •The benefits of securing SSL/TLS certificates to protect sensitive information
    •Metrics used to demonstrate the value of improved key and certificate management

    Get behind-the-scenes insights from this true security leader – register for the webinar today!
  • SSH Keys: Security Asset or Liability?
    SSH Keys: Security Asset or Liability?
    Mike Dodson, VP WW Customer Security Strategy & Solutions, Venafi Recorded: Jun 14 2018 64 mins
    Weak practices around protecting SSH keys expose businesses to costly risk, impacting the most sensitive systems and data. Then incomplete auditing practices allow that risk to go unaddressed.

    SSH keys are often used for routine administrative tasks by system administrators, and privileged access management (PAM) systems ensure proper oversight. However, SSH keys are also used for secure machine-to-machine automation of critical business functions. PAM solutions don’t help secure these machine identities, and most audit programs overlook this important risk.

    This session discusses the common mistakes that almost all enterprises make around security, policy and auditing practices when managing SSH keys, including current survey results.
  • Adding Machine Identities to Your Auditing Capabilities
    Adding Machine Identities to Your Auditing Capabilities
    Steve Armstrong, Venafi Recorded: Jun 14 2018 32 mins
    Conducting an audit of machine identity risk highlights the effectiveness of a Machine Identity Protection program as well as where to best focus risk mitigation. But what exactly should be audited to assess this risk? This session discusses a new Audit Work Program for Machine Identity Protection that assess risk and focuses remediation.

    The session will start with a discussion of risk influencers as well as the factors of machine identity risk that should be reviewed as part of the audit. The session then introduces the Audit Work Program and outlines a 30-60-90 day next steps plan for implementation.
  • Auditing Machine Identity Protection
    Auditing Machine Identity Protection
    Kevin Bocek, Vice President, Security Strategy & Threat Intelligence, Venafi Recorded: Jun 14 2018 64 mins
    Just as we need to secure human identities, we also need to effectively manage and secure machine identities—whether those machines are servers, applications, appliances, IoT devices or other systems. Transport Layer Security (TLS) certificates and associated private keys serve as the primary method of establishing machine identities. However, organizations are not investing in machine identity protection, even though unmanaged and unsecured keys and certificates risk outages and breaches.

    This session shares a 5-stage approach to TLS security, including what is achieved and can be audited at each stage. This session will enable auditors to assess the overall maturity of an organization’s machine identity protection.
  • Building a Certificate as a Service Platform
    Building a Certificate as a Service Platform
    Carl Bourne, Global Solutions Architect, Venafi Recorded: Jun 14 2018 43 mins
    Today, agile software and IT services enable the modern enterprise to create new products, service customers, refine new processes and develop new business models. With this innovation, DevOps speed must coexist with security, but slow procurement processes lead many developers to simply ignore or sidestep corporate certificate requirements.

    This presentation shows how to achieve a balance between speed and security through building a Certificate-as-a-Service platform that automates the procurement and deployment of cryptographic keys and digital certificates as part of the build process—fully integrated with next-gen software development platforms and existing enterprise certificate authorities.
  • Venafied Private PKI
    Venafied Private PKI
    Clint Wilson, DigiCert Product Manager Recorded: Jun 13 2018 48 mins
    Public Key Infrastructure is paradoxically often most valuable when narrowly trusted or private. A Private PKI allows for robust and pervasive cryptographic security, privacy, and encryption of all communication within your organization. Utilizing the Private PKI offerings of DigiCert allows you to seamlessly utilize this private trust environment without setting up your own infrastructure. Integrating your DigiCert Private PKI with Venafi’s tools and services allows for complete automation of all facets of your private certificates’ lifecycle management.
  • Delivering Intelligent L4-L7 Application Networking & Security
    Delivering Intelligent L4-L7 Application Networking & Security
    Ashwin Manekar, Senior Product Manager, Avi Networks Recorded: Jun 13 2018 40 mins
    New software-defined load balancers are significantly improving the way application services are delivered and secured. In this webinar from Avi Networks, you will learn:

    - How to centrally manage the traffic flow to the applications and simplify policy management?

    - How to provide real-time visibility into DDoS attacks, SSL versions and ciphers used in transactions?

    - How to get the health score on application performance and automatically scale-out across data centers and clouds?

Embed in website or blog