Hi [[ session.user.profile.firstName ]]

Protection des identités machines

Il existe deux acteurs sur chaque réseau – les personnes et les machines - et les deux doivent être sécurisés. Les personnes (utilisateurs) utilisent des identifiants et des mots de passe pour se connecter et s’authentifier sur un réseau. Les machines quant à elles utilisent des clés et des certificats pour la communication et l'authentification machine à machine. Des milliards d’Euros sont dépensés chaque année pour sécuriser la gestion des identités et des accès, mais la quasi-totalité des dépenses est consacrée à la sécurisation des identifiants et des mots de passe, et pratiquement rien pour la protection des clés et des certificats.

Les identités machine non protégées sont des cibles faciles et lucratives pour les cybercriminels. Ils utilisent des clés et des certificats non protégés pour écouter des communications privées, rendre les sites de phishing plus efficaces, des codes malicieux valides, et masquer leurs activités néfastes dans le trafic crypté, notamment pour faciliter l’introduction de logiciels malveillants et l’extraction de données confidentielles.

Dans cette présentation, nous aborderons les différents types d'identités machine et leurs proliférations sur votre réseau. Vous verrez le rôle et le cycle de vie des identités machine, ainsi que le niveau insuffisant de leur protection. Nous examinerons ensuite les risques actuels et les nouveaux risques qui y sont liés. Nous conclurons avec les mesures que vous pouvez prendre immédiatement pour maîtriser ces risques.


Date: Mardi 9 Juin 2020
Heure : 10H00 – 11H00
Recorded Jun 9 2020 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Stephane Dorchin, Directeur Europe du Sud
Presentation preview: Protection des identités machines

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • What's New in the Venafi Platform 21.3 Release Oct 19 2021 3:00 pm UTC 60 mins
    Diane Garey, Product Marketing Manager, Venafi
    Protecting against next-gen attacks to machine identities requires solutions that are robust and hardened. In this webinar, we'll highlight several new capabilities in the Venafi Platform 21.3 release that will help you prevent misuse and compromise, including:

    - New ability in SSH Protect to issue SSH certificates
    - A new Master Auditor role that has universal read-only permission to the Venafi Platform
    - Updated private key defaults in TLS Protect to ensure strong encryption and security of private key material

    We'll also take a tour of Cool Solutions, Venafi's GitLab repository for source code that’s available to current customers and ecosystem partners. Learn how to find and start using solutions that will help you and your organization more effectively manage machine identities. Join the Q&A too.

    Venafi Presenters:
    Angela Morris, Sr. Product Manager
    Aaron Hixson, Sr. Product Manager
    Justin Hansen, Director of Customer Experience
    Kevin Jacque, Global Architect
    Diane Garey, PMM
  • Rise of Machines: Protecting your Machine Identities Oct 6 2021 6:00 am UTC 60 mins
    Kevin Bocek, Vice President, Security Strategy & Threat Intelligence, Venafi
    The number of machines of all types – from Kubernetes, to cloud, to IoT – is on the rise. Every machine requires an identity – SSL/TLS, SSH, and code signing keys and certificates – that control encryption, authentication, and code execution. Too often these powerful security controls are left unprotected. Compromise, misuse, and fraud of machine identities are already prime attack vectors for hackers targeting supply chain weaknesses. And errors create debilitating outages and millions in lost business. For all these reasons and more, Gartner has named Machine Identity Management a top trend for 2021.

    Attend this session to learn:

    · The top machine identity attacks targeting your organisation and software supply chain
    · How SSL/TLS, SSH, and code signing keys and certificates are left unprotected
    · How machine identities fail and cost millions in outages
    · Why most organisations are not prepared to use machine identities at speed
    · Three things your organisation can do today to stay #fastsecure with Machine Identity Management

    Presenter: Kevin Bocek, Vice President, Security Strategy & Threat Intelligence, Venafi
    Moderator: Paolo Miranda, CISSP, Volunteer Outreach Director, (ISC)² Singapore Chapter
  • Enabling the Secure Digital Cloud Native Enterprise Recorded: Sep 15 2021 31 mins
    Matt Bates, CTO, Jetstack
    In the five short years since Google made it open source and the cloud native ecosystem Kubernetes has reshaped modern application development and as a result, is thriving. Containers, declarative infrastructure and programmable networks, once the secret sauce of FAANG, are now becoming the norm. But how do enterprises tame this fast-moving technology? How can we empower developers with consistent, reliable, highly automated platforms and guardrails so they can move fast and be efficient while ensuring enterprise security? Join us to learn about the key tenets of Kubernetes and cloud native that are enabling enterprises to build modern platforms fit for the future and provide examples of solutions that help enterprises leverage automation with built-in security controls.
  • Unbeatable Automated SSH Security Recorded: Sep 9 2021 26 mins
    Brian Carpenter, Director of Business Development, CyberArk, Atanas Chuchev, Technical Product Manager, SSH Protect, Venafi
    Improve governance and reduce risk with easy, robust SSH key management. The integration of Venafi SSH Protect and CyberArk PAM gives system administrators higher levels of automation, provides InfoSec teams with better visibility and results in fast, successful audits for GRC teams. Watch this webinar to learn how the combined power of Venafi and CyberArk can completely change the way you secure the entire lifecycle of SSH keys.
  • Eliminate Outages Forever Recorded: Aug 23 2021 15 mins
    Joseph Patrick, Professional Services Engagement Manager, Venafi
    Based on the experiences of hundreds of organizations, Venafi has developed a proven approach to completely eliminate outages caused by expired, misconfigured or unknown TLS certificates, and this approach can work for your organization (no, really!). View this webinar to uncover the steps you should take today to reduce the pain of certificate outages and understand what you need to do to eliminate them completely in your organization. We’ll also discuss the most common challenges organizations face and how to overcome them.
  • Rise of Machines: Protecting your Machine Identities Recorded: Aug 17 2021 61 mins
    Kevin Bocek, VP, Security Strategy & Threat Intelligence, Venafi; Brandon Dunlap, Moderator
    The number of machines of all types – from Kubernetes, to cloud, to IoT – is on the rise. Every machine requires an identity – SSL/TLS, SSH, and code signing keys and certificates – that control encryption, authentication, and code execution. Too often these powerful security controls are left unprotected. Compromise, misuse, and fraud of machine identities are already prime attack vectors for hackers targeting supply chain weaknesses. And errors create debilitating outages and millions in lost business. For all these reasons and more, Gartner has named Machine Identity Management a top trend for 2021. Join Venafi and (ISC)2 on August 17, 2021 at 1:00 p.m. BST for an examination of how machine identities are the new perimeter.

    Attend this session to learn:

    · The top machine identity attacks targeting your organisation and software supply chain

    · How SSL/TLS, SSH, and code signing keys and certificates are left unprotected

    · How machine identities fail and cost millions in outages

    · Why most organisations are not prepared to use machine identities at speed

    · Three things your organisation can do today to stay #fastsecure with Machine Identity Management
  • Kuba-What? Conversational Approaches for Working with DevOps Teams Recorded: Aug 10 2021 21 mins
    Sitaram Iyer, Global Principal Architect, Venafi
    Do you feel lost when talking to your DevOps and AppDev teams? Or do they leave you out of the security conversation altogether because they view you as the stodgy, old-school InfoSec guy? In this webinar, we’ll explain how DevOps and open source technologies like Kubernetes, Ansible and HashiCorp Terraform relate to machine identities. Then we’ll show you novel ways of providing machine identity management-as-a-service to DevOps and AppDev teams without giving up control of the definition, implementation and measurement of security and policy controls.
  • InfoSec Empowering Developers Through the Five Ideals Recorded: Aug 6 2021 45 mins
    Gene Kim, Author, Researcher, Speaker, Director, DevOps Enthusiast
    How do machine identities fit into the changing world of DevOps? Watch this webinar with Gene Kim, best-selling author of The Phoenix Project and The Unicorn Project, to learn why the business value of DevOps is bigger than you think, why successful DevOps projects are more secure and the five key principles that make developers happy and successful.
  • Becoming a Machine Identity Threats Pro Recorded: Aug 6 2021 22 mins
    Yana Blachman, Threat Intelligence Researcher, Venafi
    Everyone knows that machine identity threats are on the rise and that machine identities are frequently part of adversaries’ arsenals in today’s attacks. But just knowing this doesn’t help you learn about the specifics of how APT41 or FIN7 use machine identities. If you had information about machine identity attacks, would your team know how to leverage this knowledge in your security operation? Watch this webinar to get a deep dive into Venafi’s new Machine Identity Threat Model and learn how you can put that information into action to keep your organization safer. Built on the MITRE ATT&CK framework, the Machine Identity Threat Model documents and maps attackers’ tactics, techniques and procedures (TTPs). Find out how to use this fantastic public machine identity threat resource to build a threat-informed defense based on actionable intelligence.
  • What's New with Venafi TLS Protect – 21.1 and 21.2 Releases Recorded: Jul 14 2021 58 mins
    Aaron Hixson, Sr Prod. Mgr., Hristo Todorov, Prod. Mgr, Jason Brothers, Core Architect, Diane Garey, Prod. Mkt. Mgr, Venafi
    In this webinar, we’ll highlight new capabilities in the Venafi Platform and TLS Protect 21.1 and 21.2 releases, starting with new Adaptable Credentials for the Venafi Platform that let you easily use Venafi with any enterprise solution to store and manage all the passwords/secrets you maintain for the many systems and devices that need privileged access.

    We’ll also cover other new capabilities, including:

    Amazon Private CA and Google CA Service integrations

    Inline placement of keys and certificates during discovery

    ACME v2 support

    Finally, we’ll spend time looking at some changes in the Venafi Platform UI. In the 21.2 release, instead of navigating between Aperture and Web Admin consoles to access capabilities, you’ll navigate between TLS Protect and the other products in the platform. We’ll highlight what’s different, so you’ll have a seamless experience when you upgrade to 21.2.

    As usual, we’ll leave time at the end for Questions & Answers. Register now!
  • Build to Survive Recorded: Jul 8 2021 39 mins
    Kevin Bocek, VP, Security Strategy & Threat Intelligence, Venafi
    A new era of automation, innovation, and speed has dawned. You now have the power to make developers and operations teams more successful than ever. Find out how the machines and machine types developers are using are forming an ecosystem that you can shape and use to protect your organization.
  • 5 Cloud Catastrophes Recorded: Mar 18 2021 48 mins
    Michael Thelander, Director of Product Marketing, Venafi and Dave Brancato, Sr. Tech Mkt.Engineer, Venafi
    “Cloud migration” is no longer a question of IF or even WHEN. It’s a question of HOW FAST? Flexera’s annual State of the Cloud report shows us an ever-increasing migration velocity:
    • More than 50 percent of enterprise workloads are already in public clouds
    • 93 percent of enterprises have a multi-cloud strategy
    • Organizations use on average of 2.2 public and 2.2 private clouds
    Whether the reason is cost savings, flexibility, disaster response or to support a now fully perimeter-less world, we are all racing to the cloud. But what does this mean for the machine identities – especially TLS certificates and encryption keys – that are securing our digital transformation? What risks do we need to watch? How do we avoid some of the bad or unintended decisions that can cripple us?
    This webinar will help security architects, cloud architects and PKI teams secure and protect machine identities in even the fastest-moving environments. Join us to understand new risks and how to mitigate them and discover a “machine identities in the cloud” blueprint that helps you plan for a future that’s already here.
  • Secured Code Signing at the Speed of DevOps Recorded: Mar 11 2021 23 mins
    Eddie Glenn, Sr. Product Marketing Manager, Venafi, Cojan van Ballegooijen, Senior Solutions Architect, CloudBees
    Join CloudBees and Venafi as we explain how to integrate and automate a secure code signing process into your DevOps pipelines using Jenkins and Venafi CodeSign Protect. Even though your teams may code sign your applications today, are you doing enough to protect your code signing certificates and private keys? In many cases, development teams may store code signing credentials on unsecured build servers or allow access by anyone on the development team.

    Recent cybercriminal events, such as those at SolarWinds, Asus, Avast, and Garmin demonstrate that hackers are after code signing credentials to use to make their malware look like legitimate software. We’ll discuss best practices for securing your code signing process without slowing down your build pipelines and will also demonstrate how Venafi CodeSign Protect can be easily integrated into Jenkins.
  • Protecting your IoT software delivery against malware insertion Recorded: Feb 23 2021 28 mins
    Eddie Glenn, Venafi
    In December 2020, it was reported that a software supply chain cyber-attack occurred against SolarWinds which caused infections in numerous businesses and government agencies. While complex in nature, this involved vulnerabilities in the build cycle at SolarWinds.

    For an IoT manufacturer, securing your software supply chain and your build process is as critical as is securely delivering updates to your IoT devices. In this session, we’ll cover:

    • A review of how SUNBURST was introduced into the software supply chain
    • Steps that can be taken by software developers to minimize this from happening to you
    • How digitally signing source code and other intermediate artifacts during your software build process can minimize these risks
    • The benefits of securing a code signing process for your company
  • Digital Identities: Protected or Imperiled? Recorded: Feb 22 2021 40 mins
    Diane Garey, Prod. Mkt. Mgr, Venafi
    The digital identities used by machines – particularly the TLS certificates in use throughout your organization – are meant to authenticate machine-to-machine communications and then protect them through consistent, trusted encryption. When they fail, customers experience outages and security controls, like traffic inspection devices, stop protecting you.
    But do you know enough about those certificates to know the protection is real? 95% of Global 5000 organizations lack visibility and intelligence about their certificates: How many are in use, and what types are they?
    Which CAs issued them and who owns them internally? Without this visibility and intelligence, it’s impossible to then automate the certificate lifecycle tasks that prevent outages, stop breaches, and lose revenue.

    In this session, we’ll look at:
    • Why machine identity protection is needed – and it’s for much more than encryption alone
    • The most common – and the most overlooked – reasons why getting visibility into certificates is so difficult
    • How to assess the machine identity landscape in your own organization: are you protected or imperiled?
  • Round Table: Lessons Learned from SolarWinds & SUNBURST Recorded: Feb 17 2021 48 mins
    Ken Westin, Dir. Technical Mkt, ReliaQuest, Yana Blachman, Threat Int. Analyst & Tony Hadfield, Dir. Soln. Architects, Venafi
    Every company is now a “software” company, so the attack on SolarWinds not only marks a new generation of software supply chain attacks but demonstrates an industry-wide vulnerability. This attack was different in the level of sophistication, stealth and patience from earlier similar attacks. As a result, over 18,000 SolarWinds customers were infected with SUNBURST malware, including multiple US federal agencies. Shortly after, Mimecast was found to have been breached by the same attack.Digitally signing software (code signing) is the critical component in building and delivering software that can be trusted by end users. Yes, SolarWinds was signing their software.

    But what went so wrong?

    Our panel of experts will explore what happened, the approach the attackers took, and how you need to change your thinking (and your tactics) to avoid the same fate. Register today!
  • Hybrid (Without the Heroics) Managing Machine Identities Across Hybrid Cloud Recorded: Feb 7 2021 43 mins
    Michael Thelander, Director of Product Marketing and Dave Brancato, Director Tech. Mkt. Engineer, Venafi
    Join our webinar with actionable insights to address:
    • The unique challenges of managing identities across hybrid cloud environments
    • The three fundamental capabilities needed for enterprise-wide management of machine identities
    • How organizations are addressing machine identities with new cloud-first use cases

    Register now!
  • Fireside Chat with Venafi CEO Jeff Hudson: Machine Identity Management Recorded: Dec 21 2020 43 mins
    Jeff Hudson, CEO of Venafi & Frank Marsala, VP of Gartner
    Venafi was one of the vendors highlighted earlier in 2020 in Gartner's 2020 Hype Cycle for Identity and Access Management for “machine identity management."

    Machine identity management aims to establish and manage trust in the identity of a machine (mobile devices and IoT devices and workloads, such as applications and containers) interacting with other entities, such as devices, applications, cloud services or gateways. Specifically, machine identity management handles the life cycle of credentials used by machines. The credentials span secrets, cryptographic keys, X.509 certificates and SSH keys.

    Machines, such as devices and workloads (that is, applications and containers), are being leveraged at an increased rate, due to the growing trends related to digital business and digital transformation.

    Join us for a fireside chat with Venafi CEO Jeff Hudson as he shares key insights on the future of machine identity management.
  • 2021 Trends: Machine Identity Management Recorded: Dec 17 2020 50 mins
    Kevin Bocek, VP of Security Strategy & Threat Intelligence, Venafi
    In 2020, we saw years of change compressed into months of accelerated digital transformation. This wild pace drove TLS certificates outages that affected COVID response, new analyst guidance every CIO needs to follow and, major changes in attacker tactics with SSH and code signing. Not to mention the tectonic shift with cloud and Kubernetes. It’s time to catchup on the most important advances in Machine Identity Management that are reshaping CISO strategy for 2021.

    Join our live webcast on December 17th to learn:
    • Why digital transformation requires Machine Identity Management
    • How SSH, code signing and DevOps machine identities may be vulnerable
    • Where Machine Identity Management advances your security strategy

    Get the download and get a jump start on 2021. Register today!

    *All attendees will receive a free copy of our latest white paper, Venafi Study: Machine Identities Drive Rapid Expansion of Enterprise Attack Surface.
  • SSH: How Big Is Your Exposure? Recorded: Dec 16 2020 39 mins
    Michael Thelander, Director of Product Marketing, Venafi
    SSH … There’s a Sleeping Dragon. Ubiquitous SSH keys provide secure, automated connections, but can be hard to control. Learn how to institute a proactive SSH key management program, uniting day-to-day users of SSH with the teams responsible for securing these critical assets. Mitigate real-life threats risks before they surface while preparing for your next auditor visit.
Intelligent Protection for Machine Identities
There are two actors on a network: people and machines. People rely on usernames and passwords to identify themselves and gain access to machines, applications and devices. Machines use digital keys and certificates to authenticate for secure machine-to-machine communication. While organizations spend billions of dollars each year on identity and access management and protecting usernames and passwords, very little is spent on protecting machine identities, which is essential to securing critical systems and data. The Venafi Platform delivers the machine identity intelligence and automation necessary to automatically safeguard the flow of information to trusted machines and prevent communication with untrusted ones—all at machine speed and scale. Venafi protects the largest, most sensitive networks in the world, and our more than 280 customers include 4 of the Top 5 US Banks, 4 of the Top 5 UK Banks, 5 of the Top 5 US Health Insurers and 4 of the Top 5 US Retailers. Venafi solutions help organizations:
- Prevent breaches
- Eliminate outages
- Orchestrate PKI
- Protect SSH access
- Pass compliance audits
- Automate DevOps

Visit www.venafi.com

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Protection des identités machines
  • Live at: Jun 9 2020 8:00 am
  • Presented by: Stephane Dorchin, Directeur Europe du Sud
  • From:
Your email has been sent.
or close