Auditing Machine Identity Protection

Logo
Presented by

Kevin Bocek, Vice President, Security Strategy & Threat Intelligence, Venafi

About this talk

Just as we need to secure human identities, we also need to effectively manage and secure machine identities—whether those machines are servers, applications, appliances, IoT devices or other systems. Transport Layer Security (TLS) certificates and associated private keys serve as the primary method of establishing machine identities. However, organizations are not investing in machine identity protection, even though unmanaged and unsecured keys and certificates risk outages and breaches. This session shares a 5-stage approach to TLS security, including what is achieved and can be audited at each stage. This session will enable auditors to assess the overall maturity of an organization’s machine identity protection.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (111)
Subscribers (9916)
There are two actors on a network: people and machines. People rely on usernames and passwords to identify themselves and gain access to machines, applications and devices. Machines use digital keys and certificates to authenticate for secure machine-to-machine communication. While organizations spend billions of dollars each year on identity and access management and protecting usernames and passwords, very little is spent on protecting machine identities, which is essential to securing critical systems and data. The Venafi Platform delivers the machine identity intelligence and automation necessary to automatically safeguard the flow of information to trusted machines and prevent communication with untrusted ones—all at machine speed and scale. Venafi protects the largest, most sensitive networks in the world, and our more than 280 customers include 4 of the Top 5 US Banks, 4 of the Top 5 UK Banks, 5 of the Top 5 US Health Insurers and 4 of the Top 5 US Retailers. Venafi solutions help organizations: - Prevent breaches - Eliminate outages - Orchestrate PKI - Protect SSH access - Pass compliance audits - Automate DevOps Visit www.venafi.com