Hi [[ session.user.profile.firstName ]]

IoT Security 101: Why a secure code signing process is critical for IoT

As the number of Internet of Things devices and applications continues to grow in 2020, so does the need for secure code signing and update delivery.

Connected devices are only as valuable as the operating systems and applications that they execute. The firmware, operating system and application update processes are highly sensitive and can be a prime target for attack. Hackers have used these methods and systems from Microsoft, ASUS, and others to spread malware that is completely ‘trusted’ and can avoid Next-Generation Antivirus (NGAV).

Until recently, there have been limited solutions available that can deliver a full secure end-to-end code signing and update delivery process for IoT use cases, forcing organizations to design and build their own home-grown solutions to fulfil their requirements.

Join this webinar to learn about:
• Current attack surfaces / risks being exploited within IoT
• Why code signing is exceedingly valuable for IoT
• Methods for Next-Gen Code Signing
• How secure update delivery can benefit your IoT use case
• Real world examples
Recorded Mar 11 2020 50 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Eddie Glenn, Venafi and James Penney, Device Authority
Presentation preview: IoT Security 101: Why a secure code signing process is critical for IoT

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • SSH: How Big Is Your Exposure? Dec 16 2020 4:00 pm UTC 39 mins
    Michael Thelander, Director of Product Marketing, Venafi
    SSH … There’s a Sleeping Dragon. Ubiquitous SSH keys provide secure, automated connections, but can be hard to control. Learn how to institute a proactive SSH key management program, uniting day-to-day users of SSH with the teams responsible for securing these critical assets. Mitigate real-life threats risks before they surface while preparing for your next auditor visit.
  • 2021 Trends: Machine Identity Management Dec 10 2020 4:00 pm UTC 45 mins
    Kevin Bocek, VP of Security Strategy & Threat Intelligence, Venafi
    In 2020, we saw years of change compressed into months of accelerated digital transformation. This wild pace drove TLS certificates outages that affected COVID response, new analyst guidance every CIO needs to follow and, major changes in attacker tactics with SSH and code signing. Not to mention the tectonic shift with cloud and Kubernetes. It’s time to catchup on the most important advances in Machine Identity Management that are reshaping CISO strategy for 2021.

    Join our live webcast on December 10th to learn:
    • Why digital transformation requires Machine Identity Management
    • How SSH, code signing and DevOps machine identities may be vulnerable
    • Where Machine Identity Management advances your security strategy

    Get the download and get a jump start on 2021. Register today!



    *All attendees will receive a free copy of our latest white paper, Venafi Study: Machine Identities Drive Rapid Expansion of Enterprise Attack Surface.
  • Using Vault with Kubernetes – Jetstack & Hashicorp: Real-World Customer Examples Dec 8 2020 6:00 pm UTC 30 mins
    Carl Bourne, Global Principal Architect, Venafi and Ranjit Viswakumar, Staff Solutions Engineer, HashiCorp
    Together, Venafi, Jetstack and HashiCorp give DevOps teams speed, security and confidence to stay safe in this multi-cloud, open source, DevOps generation -- and we can prove it.

    In this series of three 30-min sessions, we’ll share what we’ve learned in real customer deployments of our combined solutions.

    Given by our top engineers and security experts for your DevOps and InfoSec teams, you’ll learn how our joint customers are using our solutions to solve their toughest challenges. PowerPoint has been replaced with demos and expert discussion in these sessions!

    You can attend one, some, or all of these sessions. For those who cannot attend, the sessions will be available on demand immediately after the live day.

    For Part 3, here's what we'll be covering:

    Using Vault to Secure Kubernetes -- This session will show you how our customers automate and manage their X.509 certificates within Kubernetes. You’ll learn how to fully automate X.509 certificate requests as well as their renewal. We'll also dive into:

    • How to scale and eliminate certificate related issues within Kubernetes infrastructure
    • How to set & forget automation for X.509 certificates in K8s ingresses, workloads and service-meshes
    • How to benefit from policy as code that maintains InfoSec policies

    And here’s what you can expect from the other two sessions:

    - Part 1: Scaling Vault in Production – Venafi & HashiCorp: Real-World Customer Examples
    - Part 2: Securing Multiple Clouds with Terraform: Venafi & HashiCorp: Real-World Customer Examples

    Register today for Part 3 to conclude your learning from this series!
  • Securing Multiple Clouds with Terraform: Venafi & Hashicorp: Real-World Examples Dec 8 2020 5:00 pm UTC 30 mins
    Ranjit Viswakumar, Staff Solutions Engineer, HashiCorp and Paul Cleary, Ecosystem Architect, Venafi
    Together, Venafi, Jetstack and HashiCorp give DevOps teams speed, security and confidence to stay safe in this multi-cloud, open source, DevOps generation -- and we can prove it.

    In this series of three 30-min sessions, we’ll share what we’ve learned in real customer deployments of our combined solutions.

    Given by our top engineers and security experts for your DevOps and InfoSec teams, you’ll learn how our joint customers are using our solutions to solve their toughest challenges. PowerPoint has been replaced with demos and expert discussion in these sessions!

    You can attend one, some, or all of these sessions. For those who cannot attend, the sessions will be available on demand immediately after the live day.

    Here’s what we’ll be covering for Part 2:

    Operating across multiple clouds with Terraform - In this session you will learn how our customers use Terraform with Venafi to fully automate machine identities within Terraform configurations with zero coding. We'll also look at:

    • How to consistently Inject keys and X.509 certificates into multi-cloud infrastructure
    • How to build reusable IaaC templates that make it easy to provisioning of X.509 keys and certificates
    • How to fully automate cloud native infrastructure

    And here’s what you can expect from the other two sessions:

    - Part 1: Scaling Vault in Production – Venafi & HashiCorp: Real-World Customer Examples
    - Part 3: Using Vault with Kubernetes – Jetstack & HashiCorp: Real-World Customer Examples

    Register today for Part 2 to learn how you can benefit from our findings!
  • Scaling Vault in Production – Venafi & Hashicorp: Real-World Customer Examples Dec 8 2020 4:00 pm UTC 30 mins
    Paul Cleary, Ecosystem Architect, Venafi and Ranjit Viswakumar, Staff Solutions Engineer, HashiCorp
    Together, Venafi, Jetstack and HashiCorp give DevOps teams speed, security and confidence to stay safe in this multi-cloud, open source, DevOps generation -- and we can prove it.

    In this series of three 30-min sessions, we’ll share what we’ve learned in real customer deployments of our combined solutions.

    Given by our top engineers and security experts for your DevOps and InfoSec teams, you’ll learn how our joint customers are using our solutions to solve their toughest challenges. PowerPoint has been replaced with demos and expert discussion in these sessions!

    You can attend one, some, or all of these sessions. For those who cannot attend, the sessions will be available on demand immediately after the live day.

    Here’s what we’ll be covering for Part 1:

    Scaling Vault in Production – In this session, you’ll see and hear how our customers are protecting their machine identities with Venafi in a highly replicated, multi-Vault environment. We'll focus on:

    • Three design patterns used by organizations in production
    • Understand the differences between each, and how they might apply to your infrastructure
    • Learn from a real-world example and reference architecture (large financial customer)

    And here’s what you can expect for the next two sessions:

    - Part 2: Securing Multiple Clouds with Terraform: Venafi & HashiCorp: Real-World Examples
    - Part 3: Using Vault with Kubernetes – Jetstack & HashiCorp: Real-World Customer Examples

    Register today for Part 1 to learn how you can benefit from our findings!
  • Are your company’s code signing processes secure? Dec 2 2020 10:00 am UTC 60 mins
    Eddie Glenn, Sr. Product Marketing Manager & Tony Hadfield, Solution Architect, Venafi
    Could your organisation be at risk for code signing compromise?

    Recently, there’s been a lot of media coverage focused on the cyber attacks that exploit unprotected code signing credentials. Although code signing technology does a good job of ensuring code is trustworthy for end users to install and run, many companies don’t secure the processes that surround code signing. This lack of oversight can leave your company, and your customers, at risk.

    How much do you really know about your organizations’ code signing practices and policies?

    Many InfoSec professionals aren’t sure which practices and policies are actually being used, so there’s no way to measure or mitigate all of the risks connected with code signing.

    Or, maybe you and your organization understands code signing risks all too well but your processes are so cumbersome that your development teams either miss their release dates or bypass key parts of the processes to get their work done.

    No matter which kind of organization you work for, this webinar can help you:

    • Understand the specific risks associated with insecure code signing processes and how they affect your security posture and leave your customers at risk.

    • Know why scaling secure code signing processes can be challenging and understand what you need to deliver processes that are flexible and secure enough to meet the unique needs of your organisation.

    • Learn 5 best practices so you can deliver frictionless code signing processes your development teams will be happy to adopt.

    Register today and find out how Venafi Next-Gen Code Signing can help you move your code signing processes to the next level without slowing down your development teams.
  • Cheetahs, Covid-19, and Crypto Agility Recorded: Nov 23 2020 47 mins
    Michael Thelander, Director of Product Marketing, Venafi
    Cheetahs have hovered on the brink of extinction for centuries. Covid-19 has recently decimated populations and economies alike. Intriguingly, both of these situations give us insight into the critical importance of “crypto agility” in modern network architectures.

    Crypto agility is the ability to quickly replace encryption certificates and keys in response to security events, such as certificate authority (CA) compromises, vulnerable algorithms, or cryptographic library bugs, without impacting the applications and services these systems support.

    Today, organisations rely heavily on TLS and it’s underlying cryptographic protocols to protect data, inside and outside their networks. Digital transformation is instantaneously multiplying the number of these connections. To ensure the security of encryption is maintained, businesses must know where their encryption certificates and keys are located and be able to quickly and securely replace them. Yet, most don’t even have a central inventory of these critical security assets.

    This session starts with an overview of the threats and risks that make crypto agility a requirement for all organisations, with real-world examples of exploits. The session will then provide a vendor-neutral actionable plan for achieving crypto-agility, with specific criteria that can be used to evaluate the cryptographic maturity of an organisation.

    Join this webinar to learn:

    1. Understand the threats facing machine identities of all types, but particularly TLS Certificates, and how “cryptographic agility” is foundational in creating a defense strategy
    2. See examples of where cryptographic or CA-related failures have led to machine identity compromise and then to breaches
    3. Learn the three fundamental foundations of crypto agility -- visibility, intelligence, and automation – and how these can be delivered and sustained through free tools, online services, and enterprise platforms

    Register Today!
  • Protecting Federal Agencies' Non-Person Entities with F5 BIG-IQ and Venafi Recorded: Nov 20 2020 42 mins
    Paul Cleary, Ecosystem Architect, Venafi, Kyle Oliver, Product Manager, F5 Networks
    Connected machines and other non-person entities (NPEs) on enterprise networks are becoming more complex and growing in number. Inefficient manual approaches of securing all these NPEs with digital machine identities - keys and certificates - can lead to failures, outages, and breaches—introducing more risk and a higher chance of costly disruptions that stem from administrative bottlenecks and human error.

    In this webinar, we will look at how federal agencies can eliminate site and service outages that result from expired or misconfigured certificates while streamlining their F5 operations with F5 BIG-IQ Centralized Management and Venafi. Our speakers will cover:

    - How the VIA Venafi No Outage Guarantee is a fundamentally different approach that can completely prevent certificate-related outages
    - How integrating the Venafi Platform into BIG-IQ enables you to simplify, streamline, and improve life cycle management of certificates and keys across BIG-IP devices
    - How F5 BIG-IQ simplifies oversight of complex BIG-IP environments by injecting automation into discovery, tracking, management, and monitoring of physical and virtual BIG-IP devices

    If you have the Venafi Platform and an F5 BIG-IP estate today, or if you’re considering investing in these solutions, this webinar will help you understand how to optimize your investment and make it easier to manage NPEs agency-wide.
  • Integrate, Authenticate and Accelerate: Fast IT Meets Strong Machine Identities Recorded: Nov 11 2020 48 mins
    Michael Thelander, Director of Product Marketing & Sandra Chrust, Sr. Product Marketing Mgr, Venafi
    Information security teams have long known that a robust process for creating and managing machine identities – especially X.509-based SSL/TLS certificates that enable machine-to-machine authentication and encryption – is fundamental to delivering secure applications. But they also know these methods tend to fall apart in a DevOps-driven world.

    DevOps teams can’t wait hours for an appropriate certificate to be delivered by the PKI team, not when new builds are being created every few seconds. They also can’t be expected to maintain and update the tens of thousands of certificate-enabled identities they create every day as containers, applications, and templates.

    What they can do is improvise. This often results in the creation of weak or misconfigured keys, improper or non-compliant certificates, and the short-circuiting of InfoSec policies. There is another way.

    In this talk, experts in machine identity and PKI (public key infrastructure) will show:
    1. How machine identities can be delivered as a fast “certificate-as-a-service” solution
    2. How they can be configured according to sound InfoSec policies
    3. How they can be integrated with existing DevOps tools such as Kubernetes, Ansible, and HashiCorp Vault

    Importantly, this can all be done within existing continuous integration and continuous delivery (CI/CD) toolchains, giving developers programmatic, automated TLS certificate issuance and provisioning. And it allows them to go faster: they no longer need to “hotwire” certificate management processes for each application or service.

    We’ll also show how large Global 5000 organizations have implemented:
    • A single source of “truth and control” for machine identities that manages X.509 certificates across both cloud providers and on-premise infrastructure
    • A “machine identity platform” that reduces security risks and prevents costly delays to the high-speed DevOps processes
    • A system that defends against increasingly dangerous cybersecurity threats
  • The Three Words Shaking Up IAM: Machine Identity Management Recorded: Nov 5 2020 37 mins
    Michael Thelander, Director of Product Marketing, Venafi
    It’s not often that the oldest category in cybersecurity – identity and access management, or IAM – sees seismic changes. Then the Gartner Hype Cycle for Identity and Access Management, 2020 added a profile for Machine Identity Management. This new category “reflects an increased need to manage the cryptographic keys, X.509 certificates and other credentials that are used to establish trust in the identities of machines, such as IoT devices, virtual machines, containers and RPA bots,” according to the report.

    In this live webcast we will:

    • dig into what analysts mean by “machines” (which may surprise you), how it defines their “identities,” and what it means to proactively and efficiently “manage” them
    • show how the category is supported by the tectonic blocks of Visibility, Intelligence and Automation, and how these blocks help you design and implement a Machine Identity Management program
    • demonstrate how all digital transformation efforts rely, ultimately, on machines, whether those are virtual and serverless systems, containers and applications, or IoT and end user devices.

    All attendees will also receive access to a complimentary copy of the Gartner report, the Hype Cycle for Identity and Access Management Technologies, 2020 (Authored by Ant Allan; Published on 16 July 2020).

    Register today!
  • Prevent “Certificate Sudden Death”: VIA Venafi Stops Certificate-Related Outages Recorded: Oct 27 2020 45 mins
    Michael Thelander, Director of Product Marketing, Venafi
    Certificate-related outages, whether from expired or misconfigured or unknown TLS certificates, are the bane of digital transformation. Perfectly functioning applications and services can be rendered inoperable. Worse still the security controls you rely on, from traffic inspection devices to web application firewalls, can’t protect you when a certificate-related outage shuts them down.

    Venafi has helped over 360 global customers eliminate certificate-related site and service outages. The resulting approach, based on a deep understanding of people, processes and technology needed to achieve this outcome, is VIA Venafi, the Venafi Way. VIA Venafi gives our customers the Visibility, Intelligence and Automation they need to stop outages. It also provides the world’s only guarantee against certificate-related outages: the VIA Venafi No Outage Guarantee.

    In this session you will:
    • Learn about some of the most troublesome certificate-related outages that have led to site failures and breaches in recent years
    • Gain an understanding of what’s needed to ensure against outages
    • Understand Venafi’s eight-step process to stopping certificate-related outages
    • Learn about our VIA Venafi No Outage Guarantee
    • See how a platform that delivers Visibility, Intelligence and Automation can achieve this outcome in a way that is not only affordable and manageable....but achieves it in a way guarantees results

    Register today!
  • Security Outages in HealthCare: Dissecting COVID-19 Reporting Failure Recorded: Oct 13 2020 32 mins
    Dave Brancato, Sr. Tech Mkt.Engineer, Venafi
    System and Security Outages in HealthCare: Dissecting COVID-19 Reporting Failure and Safeguarding Your Critical Systems

    System outages occur at the most inopportune times regardless of technology used, industry, geography, or technical staffing. Organizations spend billions protecting human identities but often overlook the need to protect an exponentially higher number of machine identities that are at even greater risk, and as a result find themselves dealing with system or security outages. Revenue-generating business units scream “the system is down” or “something is wrong” and leave technical staff scrambling to perform root cause analysis. Once found the staff is tasked with finding a hurry-up fix in short order, resulting in cascading effects to the suffering organization …. and the certainty that this kind of failure will happen again.

    Join our webinar to learn:
    · Key Learnings from the California COVID-19 Reporting outage
    · Deep dive on the effect of machine identity outages on Healthcare systems
    · Technical Safeguards, Policies and Automation you can put in place to prevent machine identity outages

    Register for this timely webinar today!
  • The Cost of Machine Identity Risk Recorded: Oct 7 2020 60 mins
    Dr. Eric Dallal, Sr. Scientist–Cyber, AIR, Kevin Bocek, VP of Threat Intelligence, Venafi
    The cyber risk landscape is changing rapidly, and many organizations haven’t extended basic identity and access management security controls to machine-to-machine communications, leaving gaps in their cybersecurity defenses.

    In this webinar, Eric Dallal, Senior Scientist–Cyber at AIR, and Kevin Bocek, Vice President of Threat Intelligence at Venafi, examine empirical evidence about the ways in which a weak machine identity protection plan can cost your organization.

    Join us to learn:
    - Why the security risks connected to machine identities are rising so quickly
    - Which companies are most at risk for machine identity protection losses
    - The three actions every organization can take now to protect their most sensitive data
    - Key conclusions
    - How we can quantify the cost of inaction

    Why is a strong machine identity protection program critical in today’s threat landscape? Register to learn more.
  • Five Cloud Catastrophes (and How to Avoid Them) Recorded: Sep 29 2020 61 mins
    Michael Thelander, Director of Product Marketing and Dave Brancato, Sr. Tech. Mkt. Engineer, Venafi
    “Cloud migration” is no longer a question of IF or even WHEN. It’s a question of HOW FAST? Flexera’s annual State of the Cloud report shows us an ever-increasing migration velocity:

    • More than 50 percent of enterprise workloads are already in public clouds
    • 93 percent of enterprises have a multi-cloud strategy
    • Organizations use on average of 2.2 public and 2.2 private clouds

    Whether the reason is cost savings, flexibility, disaster response or to support a now fully perimeter-less world, we are all racing to the cloud. But what does this mean for the machine identities – especially TLS certificates and encryption keys – that are securing our digital transformation? What risks do we need to watch? How do we avoid some of the bad or unintended decisions that can cripple us?

    This webinar will help security architects, cloud architects and PKI teams secure and protect machine identities in even the fastest-moving environments. Join us to understand new risks and how to mitigate them and discover a “machine identities in the cloud” blueprint that helps you plan for a future that’s already here.
  • The Formula for Secure, Identity-Based Access Recorded: Aug 31 2020 30 mins
    Paul Cleay, Ecosystem Architect, Venafi, Kaylee Carlson, Product Mkt Mgr, JAMF, Kelsey Nelson, Sr. Prod. Mkt Mgr, Okta
    Employees and their devices are more mobile than ever. With the evolution of remote work, security requirements are increasingly difficult to meet. It’s essential that organizations have the tools in place to ensure only the right people, devices and apps are accessing secure networks and sensitive corporate data.

    In this webinar, The Formula for Secure, Identity-Based Access, presenters from Okta, Venafi and Jamf discuss how implementing a modern, “zero trust” approach to identity-based access satisfies security requirements without compromising the end-user experience.

    You'll learn:

    - What it takes to leverage a "never trust, always verify” security model
    - How to provide passwordless access to business-critical apps
    - Best practices for integrating with cloud-identity providers
    - How to add an extra layer of armor by securing physical devices

    Have questions about our webinar? Reach out to us at info@venafi.com or give us a call today.
  • Beware the dark side,use trusted machines & HSMs to support critical business Recorded: Aug 18 2020 47 mins
    Paul Cleary,Senior Solutions Engineer-Venafi and Juan Asenjo,Director of Products,Solutions and Partner Marketing-nCipher
    As organizations deploy more automated systems to run critical business, the demand for device and application (machine) identities is rapidly increasing. Protecting machine identities is critical to ensure integrity of operations and the security of data processed by machines.

    This webcast will examine the growing challenges faced by organizations when managing increasing volumes of machine identities. Our speakers will discuss how to implement automated orchestration of keys and certificates, describe best practices, and explain why a root of trust is vital for security and regulatory compliance.

    Join the webcast and learn:
    • What are the main challenges managing machine identities
    • How to enable trust in machines supporting critical business
    • Why a root of trust is required for high assurance security

    This webinar is for you if you are responsible for:
    • Managing digital transformation and cloud migration
    • Overseeing security best practices in your organization
    • Auditing and ensuring your organizational compliance
  • Five Cloud Catastrophes (and How to Avoid Them) Recorded: Jul 28 2020 61 mins
    Michael Thelander, Director of Product Marketing and Dave Brancato, Sr. Tech. Mkt. Engineer, Venafi
    “Cloud migration” is no longer a question of IF or even WHEN. It’s a question of HOW FAST? Flexera’s annual State of the Cloud report shows us an ever-increasing migration velocity:

    • More than 50 percent of enterprise workloads are already in public clouds
    • 93 percent of enterprises have a multi-cloud strategy
    • Organizations use on average of 2.2 public and 2.2 private clouds

    Whether the reason is cost savings, flexibility, disaster response or to support a now fully perimeter-less world, we are all racing to the cloud. But what does this mean for the machine identities – especially TLS certificates and encryption keys – that are securing our digital transformation? What risks do we need to watch? How do we avoid some of the bad or unintended decisions that can cripple us?

    This webinar will help security architects, cloud architects and PKI teams secure and protect machine identities in even the fastest-moving environments. Join us to understand new risks and how to mitigate them and discover a “machine identities in the cloud” blueprint that helps you plan for a future that’s already here.
  • IoT Security Made Easy: How to implement secure code signing and update delivery Recorded: Jul 15 2020 29 mins
    Eddie Glenn, Venafi and Nirmal Misra, Device Authority
    As the number of IoT devices & apps continues to grow, so does the need for secure code signing & update delivery.

    Connected devices are only as valuable as the operating systems and applications that they execute. The firmware, operating system and application update processes are highly sensitive and can be a prime target for attack. Hackers have used these methods and systems to spread malware that is completely ‘trusted’ and can avoid Next-Generation Antivirus (NGAV).

    Until recently, there have been limited solutions available that can deliver a full secure end-to-end code signing and update delivery process for IoT use cases, forcing organizations to design and build their own home-grown solutions to fulfil their requirements.

    Join this webinar to:
    • Learn why code signing is important, in particular for IoT
    • Understand how CodeSign Protect helps organisations today
    • Explore a demo of a practical implementation of code-signing and secure update delivery for IoT
  • Protecting Advanced Cloud and Multicloud Environments with Venafi Recorded: Jul 7 2020 40 mins
    Dave Brancato, Sr. Tech Mkt.Engineer & Sitaram Iyer, Global Principal Architect, Venafi
    High-pace business demands and the resulting need for application modernization is changing how we think about security in multi cloud computing environments. Learn how to leverage Venafi cross functionally with native tooling to secure machine identities in AWS, Azure and GCP.
  • Automating Machine Identities with DevOps Workflows Recorded: Jun 23 2020 45 mins
    Jean-Yves Provost, Director, Solutions Architect & Carl Bourne, Sr. Solutions Architect, Venafi
    The changing market landscape is requiring developers to adopt to modern application development patterns lending to greater automation requirements specifically in a native way. Development teams tend to adopt tools and services that fit them very well in their quest for complete automation for their continuous delivery model. Empowering developers to use the tools and services that they are comfortable using is almost mandatory in today’s application development world. How can security teams gain observability in the highly distributed system where the definition of perimeter is not easy to define? Gain an understanding of what Machine Identity Protection means to an organization where there is an ever growing ecosystem of application development and deployment stacks. Whether the organization uses cloud provider managed environment for containerized applications, or use various tools for managing Infrastructure as code, a standard API driven way of managing the lifecycle of TLS/SSL certificates, SSH keys, code signing certificates is needed within the continuous integration and delivery model. This session will uncover how security teams can provide the required set of services that development teams can consume in a self-service fashion.
Intelligent Protection for Machine Identities
There are two actors on a network: people and machines. People rely on usernames and passwords to identify themselves and gain access to machines, applications and devices. Machines use digital keys and certificates to authenticate for secure machine-to-machine communication. While organizations spend billions of dollars each year on identity and access management and protecting usernames and passwords, very little is spent on protecting machine identities, which is essential to securing critical systems and data. The Venafi Platform delivers the machine identity intelligence and automation necessary to automatically safeguard the flow of information to trusted machines and prevent communication with untrusted ones—all at machine speed and scale. Venafi protects the largest, most sensitive networks in the world, and our more than 280 customers include 4 of the Top 5 US Banks, 4 of the Top 5 UK Banks, 5 of the Top 5 US Health Insurers and 4 of the Top 5 US Retailers. Venafi solutions help organizations:
- Prevent breaches
- Eliminate outages
- Orchestrate PKI
- Protect SSH access
- Pass compliance audits
- Automate DevOps

Visit www.venafi.com

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: IoT Security 101: Why a secure code signing process is critical for IoT
  • Live at: Mar 11 2020 4:00 pm
  • Presented by: Eddie Glenn, Venafi and James Penney, Device Authority
  • From:
Your email has been sent.
or close