Securing NPE Identities in Cloud and Hybrid Environments

Logo
Presented by

Tony Scott, CEO, Tony Scott Group, Hari Nair, Sr. Director, Product Mgmt, Venafi

About this talk

In a digitally transforming world, reliance on cloud migration strategies has embedded itself in the foundation of securing and optimizing our nation’s defense and intelligence systems. Additionally, the maturity and security of cloud migration programs and cloud dependencies across the DoD are being heavily deliberated. This makes getting ahead of the identity management crisis more imperative than ever. In this webcast, attendees heard from industry experts on how mission critical demands for securing Non Person Entities (NPEs) are accelerated rather than reduced as more hybrid cloud infrastructures are deployed across the services. They will also share some practical steps you can begin to take now in order to secure the identities of your own NPEs. This webinar covered: - The NPE identity management crisis - How transitioning to cloud deployments impact your NPE challenges - What NPE management functionality is offered natively within popular cloud providers Best practices for identity management of NPE to ensure visibility, intelligence, and automation NPE identity management requirements – differences between traditional and cloud/hybrid infrastructures

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (111)
Subscribers (9905)
There are two actors on a network: people and machines. People rely on usernames and passwords to identify themselves and gain access to machines, applications and devices. Machines use digital keys and certificates to authenticate for secure machine-to-machine communication. While organizations spend billions of dollars each year on identity and access management and protecting usernames and passwords, very little is spent on protecting machine identities, which is essential to securing critical systems and data. The Venafi Platform delivers the machine identity intelligence and automation necessary to automatically safeguard the flow of information to trusted machines and prevent communication with untrusted ones—all at machine speed and scale. Venafi protects the largest, most sensitive networks in the world, and our more than 280 customers include 4 of the Top 5 US Banks, 4 of the Top 5 UK Banks, 5 of the Top 5 US Health Insurers and 4 of the Top 5 US Retailers. Venafi solutions help organizations: - Prevent breaches - Eliminate outages - Orchestrate PKI - Protect SSH access - Pass compliance audits - Automate DevOps Visit www.venafi.com