Hi [[ session.user.profile.firstName ]]

Venafi - Machine Identity Protection

  • Date
  • Rating
  • Views
  • Rise of the Machines - 2018 Threatscape
    Rise of the Machines - 2018 Threatscape Kevin Bocek, VP, Security Strategy and Threat Intelligence, Venafi Recorded: Nov 15 2017 64 mins
    The number of machines of all types – from containers, to cloud, to IoT – is on the rise. The identities of these machines – SSL/TLS, SSH, and code signing keys and certificates – control encryption, authentication, and code execution; powerful security controls too often left unprotected. Compromise, misuse, and fraud of machine identities are already prime attack vectors for hackers

    As attackers look for ways to evade network monitoring, behavioral analytics and tighter privileged account security controls, they are finding hijacking machine identities to be incredibly effective and lucrative. The stage is set for a dramatic escalation of these attacks in 2018. Are you prepared?

    Attend this session to learn:

    • The top four machine identity attacks targeting your organization in 2018
    • How SSL/TLS, SSH, and code signing keys and certificates are left unprotected
    • Why most organizations are not prepared to defend against them.
    • Three things your organization can do today to protect machine identities and prevent attacks
  • OH SSH IT! Where Are My SSH Keys?
    OH SSH IT! Where Are My SSH Keys? Paul Turner, CTO, Server Products Recorded: Oct 11 2017 40 mins
    Unused or unmonitored SSH keys grant alarming levels of privileged access. If you are not hyper-vigilant, SSH keys can become vulnerable, and even walk out the door with prior employees—whether maliciously or innocently. When that happens, cyber criminals or malicious insiders can misuse your SSH keys to gain privileged access to your critical systems and data.

    Join fellow information security and system admins, managers, directors, architects, and consultants on this webinar to learn:

    • The biggest risks facing your SSH inventory
    • Strategies for preventing the misuse of SSH keys
    • Five actions that will immediately improve SSH security
  • Strengthening Machine Identity Protection to Automate SSL/TLS Certificates
    Strengthening Machine Identity Protection to Automate SSL/TLS Certificates Brian Durkin, Senior Systems Engineer, Venafi Recorded: Oct 6 2017 45 mins
    Strengthening Machine Identity Protection to Automate SSL/TLS Certificate Lifecycle - A Combined Venafi and CyberArk Application Identity Manager Solution.

Embed in website or blog