Leaders who need to revamp their PKI (or for that matter, teams looking to implement a structured PKI for the first time), have to identify a few key areas of focus – the building blocks of a powerful public key infrastructure, if you will. Some of them include:
- The cost of change
- Complexity and flexibility
- Business continuity
In this webinar, we’ll analyze the two methods of setting up a PKI: building one in-house, or purchasing a managed PKI or a PKI management tool – and discuss the benefits of each over the other in order to answer the big question: to build, or to buy?
If you’re an F5 user, chances are you’d be using their management platform, BIG-IQ. You could also be using Ansible on top of BIG-IQ to meet other F5 automation needs. You might be getting good value out of it - your network team has better visibility into application services, your application team can spin up services through templates, etc., etc.
But just how much of this “automation” translates into real business benefits?
In this webinar, Step Up Your F5 Automation Game, Murali Palanisamy, Chief Solutions Officer at AppViewX, explains how end-to-end, closed-loop, context-aware orchestration of F5 can save enterprises up to 5000 person-hours annually, keep TCO low when expanding device footprint, dramatically improve application performance and availability.
The key takeaways will be to:
•Make the F5 infrastructure self-healing, context-aware, and secure
•Automate the lifecycle of certificates, ADCs, and firewalls with multi-vendor integrations
•Build dashboards, enable RBAC-powered self-servicing for application teams
•Quicken troubleshooting with app-centric visibility, object-level backup and restore
Digital Transformation has become synonymous with cloud adoption. As enterprises migrate their existing applications to the cloud and build new cloud-native ones, how does the traditionally on-premise PKI evolve to meet multi-cloud and hybrid challenges?
In the panel discussion Simplifying PKI in Hybrid and Multi-Cloud Deployments, Murali Palanisamy, Chief Solutions Officer at AppViewX, and Derek Amelotte, PKI Solutions Engineer at AppViewX, share insights into how the PKI landscape needs to change with digital transformation and what organizations can do to achieve the delicate balance between security and crypto-agility.
Some key highlights from the discussion will be:
• How PKI requirements for cloud services are different from on-premise requirements
• How enterprises can use their on-premise PKI and extend it to multiple cloud services
• How to set up and manage a separate PKI for cloud-native applications
• How to use a PKI-as-a-Service to centrally manage and orchestrate multiple on-premise and
DevOps’ is based on a simple principle: Delivering software as quickly and efficiently as possible. The tools that help developers do this range from CI/CD pipeline management (Jenkins) to containerization (Kubernetes).
Now, each of these components incorporate the use of digital certificates in order to authenticate, secure, and validate their network interactions, and every certificate (and key) has to be carefully managed and rotated to ensure that it remains valid. However, manual management methods cannot do this efficiently, and outright fail at it when modern requirements such as short-lived certificates are considered. Every DevOps pipeline might require thousands of new certificates a day to work with each of their DevOps tools, and this is simply not possible without automation.
Consider the prevalence of cloud tech, serverless models, and the IoT – all of these models further complicate PKI deployment for DevOps teams, and the only viable fix is to integrate your PKI/PKI Management systems with your DevOps environments, and automate wherever possible. And in this webinar, we’ll tell you how.
•How does PKI impact DevOps?
•Why conventional certificate management doesn’t work.
•How DevOps tools leverage PKI
•Best practices for certificate management in DevOps pipelines
•Tools that can accomplish automation and integration of PKI and DevOps
As enterprises look to “DevOps-ify” IT operations, old-school workflow automation practices no longer cut it. The IT infrastructure is increasingly being broken down and restructured to be offered as services to provide greater manageability, business agility, and cost-savings. This trend has made event-driven, self-serviceable, end-to-end automation and orchestration platforms the need of the hour.
In the webinar Democratize and Self-Service F5 BIG-IP Automation with Service Catalog, Murali Palanisamy, the Chief Solutions Officer at AppViewX, explains how enterprise IT can build and use persona-based service catalogs to empower NetOps and DevSecOps teams to self-service the orchestration of F5 BIG-IP application services spanning diverse environments.
A few key takeaways from the webinar will be:
•What is, and why service orchestration and automation, and how to use it for F5 BIG-IP
•How to expose IT automation workflows built using Ansible and other tools to DevOps with Service Catalog
•How to customize the Service Catalog based on personas and integrate it with DevOps toolchains
As a Banking and Financial Services firm, you may have hundreds of applications that millions of users access each day. You would also be rolling out new applications and upgrades by the dozen every week. When you’re operating at this scale, the network infrastructure that underpins applications should be secure and always-on, and your network operations agile. Manually processing the hundred change requests you get each day through CLI can only slow you down.
In this webinar, Glenn Gray, Sr. Solutions Architect at AppViewX, will be discussing the benefits of network automation for Banking and Financial Services Companies, taking the example of one of our customers, a leading bank in the US, that automates 400,000 service requests a year and saves millions.
Some key takeaways will be:
•How to make networks agile for Digital Transformation
•What are the network processes that you should ideally automate
•What to look for when investing in a network automation tool
Murali Palanisamy, Chief Solutions Officer, AppViewX and Alon Nachmany, Director of Customer Success, AppViewX
Welcome to our Virtual Panel series where we discuss all things cybersecurity and PKI, and how businesses can benefit from them. These interactive sessions are chaired by leaders in cybersecurity and business, and allow attendees to interact and engage with them in every 45-minute session. Make sure you drop by!
In this first session, we’re tackling a hot topic: what will cybersecurity look like once the pandemic passes? Among the several paradigm-shifting changes to lifestyles, none stand out more than remote work. Touted as the ‘new normal’ for employees worldwide, remote workforces are also a cause of concern for security leaders and CISOs, who are slowly becoming aware of the threats this may pose to their security strategy,
Cybersecurity policy and PKI need to evolve and become fully agile. The only way to do that is automation, and that is the key to setting up post-COVID security strategy.
Key Takeaways -
• The impact of COVID-19 on cybersecurity
• Emerging Trends
• The relevance of PKI in making security remote-ready
• How can certificate lifecycle automation help?
• Case Study
Murali Palanisamy, CSO, AppViewX and Tan Yu Win, VP Project Management, SecureMetric
Over the past decade, PKI has come to be recognized as the gold standard for protecting information and networks using encryption. The phenomenon of digital transformation has influenced PKI as well, and every digital system (and a few physical ones) use PKI as their first layer of protection against cyber threats. Their ubiquity and sheer volume has given rise to several new requirements: availability, scalability, and crypto-agility. In other words, they need to be as robust as they are lightweight, and easy to upgrade and maintain. Legacy PKI does not offer users some or all of these features.
Today’s high-growth enterprises require a PKI that can be scaled rapidly, and does not require significant setup to do so. There is also a pressing need to automate certificate processes and diligently manage them – a PKI is only as robust as the efficiency of its management.
In this webinar with AppViewX, PrimeKey, and SecureMetric, we’re discussing how an organization can achieve just that. We’ll go over how you can set up (or migrate to) a high-assurance, multi-user, scalable PKI – PrimeKey – using AppViewX’s certificate lifecycle automation suite. We’ll also go over how the deployment and/or migration processes can be shrunken from months to days, and how certificate and key lifecycles can be managed from end-to-end from a single interface, and automated, too.
Use Cases Discussed:
1.Seamless PKI Migration and Management
2.PKI-backed remote work enablement and security posture enhancement
•How to set up a high-assurance, scalable on-prem PKI
•How to migrate from any legacy PKI to PrimeKey EJBCA
•Discovery, monitoring, and management of certificates and keys
•Automation of key and certificate processes
Learn how you can make your applications and network breach-proof with the Security Orchestration, Automation and Response solution from AppViewX. With real-time monitoring and data collection, event-driven remediation, and a plethora of integrations, you'll never have to face an outage or an attack ever again.
Murali Palanisamy, Chief Solutions Officer & Jeff Hagen, Lead PKI Security Engineer
AppViewX's PKI Panel is a series of virtual panel discussions where we talk to leaders in the cyber-security, network management, and PKI space about emerging trends, best practices, industry standards, and more, in an interactive session.
In this pilot episode, we're joined by Jeff Hagen (Lead PKI Security Engineer) from Xcel Energy, USA, who will be discussing the firm's PKI stance, and their decision to introduce full-cycle certificate and key management to their existing infrastructure in order to bolster PKI operations. He'll discuss their journey in depth with Murali (CSO, AppViewX), and will also share some useful tips on how you ought to proceed if you're considering taking your PKI to the next level.
-Xcel Energy’s journey towards full-cycle certificate and key management
- How AppViewX assisted Xcel’s PKI automation strategy
- How to make certificate processes agile and cost-efficient
- How certificate lifecycle automation can help ANY organization
Sean Ryan Senior Analyst Serving Security & Risk Professionals, Forrester
Digital identities (machines and human/machine hybrids like assisted bots) are growing rapidly across organizations to enable fast and efficient execution of routine tasks. These digital workers come in many different flavors (e.g., APIs and container-based workloads, assisted and unassisted bots, a variety of IoT devices and robots). Securing and governing the identities and associated secrets of these digital identities at scale requires automation, agility and orchestration. Governing these identities requires centralized rules and oversight, while allowing for decentralized approaches to managing the many different flavors of digital workers.
Alon Nachmany, Director of Customer Success, AppViewX
Early this year, the National Security Agency (NSA - the national-level intelligence agency of the United States Department of Defense) emphasized the elimination of obsolete TLS protocol configurations by federal agencies. It further urged all network owners and operators to follow suit.
The TLS protocol encrypts and authenticates communication between servers and clients, and TLS versions are periodically updated to outrun attacks on the communication channels - the current latest version being TLS 1.3. Attacks happen when an organization fails to implement the latest TLS version quickly enough. Sometimes, even organizations that have implemented the latest TLS version face attacks due to weak cipher suites, outdated key exchange mechanisms, and poor TLS certificate management.
In this webinar, Alon Nachmany, Director of Customer Success at AppViewX and a cybersecurity expert, explains how organizations can upgrade to the latest TLS version and ensure their certificates and keys are in good condition, with minimal service disruption.
CTA: Register Now
A few key points of discussion will be:
• Discovering obsolete TLS configuration and expiring certificates
• Achieving compliance and cryptographic agility with fast upgrades
• Automating key and certificate lifecycle management
Infrastructure complexity is the root cause of several operational issues, such as prolonged service delivery times, troubleshooting delays, security loopholes, etc. In this webinar, you'll learn how to overcome this complexity by making IT infrastructure invisible, and achieve the desired results without sweating over the process.
The 'Big Four' providers of internet browsers (Mozilla, Google, Microsoft, and Apple) have finally decided to deprecate TLS 1.0 and 1.1 owing to their obsolescence and vulnerability to security exploits, starting early 2020. What's more, the PCI has already stopped support for TLS 1.0, and strongly recommends the usage of TLS 1.2 and upwards. If your business and its applications still rely on TLS 1.0 and 1.1, this means you have to upgrade to the latest version, ASAP. Why? Because not doing so will leave you open to a plethora of security vulnerabilities.
Of course, a large scale TLS upgrade comes with challenges, risks, and processes of its own, and in this webinar, we'll walk you through them. At the end of this session, you'll know everything you need to know if you're considering an upgrade, and a lot more.
-The challenges of migrating to TLS 1.2 or 1.3
-Migration recommendations and best practices
-How your PKI needs to adapt to a new TLS version
-How AppViewX accelerates the process of replacing your TLS 1.0-dependent certificates
ACME (Automated Certificate Management Environment) has become a standardized protocol, and is being rapidly adopted by Certificate Authorities around the world for its ease of use and the numerous benefits it provides. In this webinar, you'll learn exactly how the protocol works, how it automates certificate installation and renewals, and its core benefits.
AppViewX CERT+ features full ACME support, and builds on top of the protocol to provide additional value by further accelerating the deployment cycle. How can you leverage our platform to get the most out of your ACME implementation? We'll tell you how.
The ACME Protocol: What, Why, and How
Key Benefits of implementing ACME
AppViewX's take on ACME Implementations and Setup
Alon Nachmany, Director of Customer Success, AppViewX
COVID-19 has generated an enormous spike in demand for storage and compute, forcing hospitals to expand their existing network or move a chunk of their patient data to their cloud.
While cloud adoption in itself is a good thing, the explosion of devices and workloads across distributed systems, the need for remote access, and the pressures of ensuring speed and availability might have led to security taking a backseat. Even if a healthcare provider has all the required security measures in place, attacks are getting increasingly sophisticated (as seen recently), and still leaves them vulnerable.
In this webinar, Alon Nachmany, Director of Customer Success at AppViewX and a former CISO, shares his insights on how healthcare providers can enhance cybersecurity, enforce compliance in the face of uncertainty, and recover relatively unscathed in the event of an attack.
Some key highlights will be:
• Detecting and sealing vulnerabilities with proactive monitoring and auto-remediation
• Securing endpoints across distributed systems with key and certificate lifecycle automation
• Streamlining and expediting data/device backup and restore for compliance
Redefining Cybersecurity and Context-Driven Network Orchestration
Certificate Lifecycle Management and Network Orchestration
AppViewX is the low-code automation platform that assists global enterprises with PKI certificate management and network infrastructure automation. By focussing on maximizing network security while minimizing the manual effort expended by IT teams, AppViewX has helped over 100 organizations realize lower outages, high visibility into PKI and network environments, and complete control over certificates, keys, and device configurations.
Effectively, we're making the last mile of network automation universally accessible via a flexible platform that will fit into existing architecture, and work with it to deliver rapid results in line with compliance goals. Our webinars are designed to educate viewers about industry trends, product capabilities, and customer implementations.
Browse through our library below, or learn more about us at appviewx.com