Eliminating Obsolete TLS Configurations for Improved Data Protection
Early this year, the National Security Agency (NSA - the national-level intelligence agency of the United States Department of Defense) emphasized the elimination of obsolete TLS protocol configurations by federal agencies. It further urged all network owners and operators to follow suit.
The TLS protocol encrypts and authenticates communication between servers and clients, and TLS versions are periodically updated to outrun attacks on the communication channels - the current latest version being TLS 1.3. Attacks happen when an organization fails to implement the latest TLS version quickly enough. Sometimes, even organizations that have implemented the latest TLS version face attacks due to weak cipher suites, outdated key exchange mechanisms, and poor TLS certificate management.
In this webinar, Alon Nachmany, Director of Customer Success at AppViewX and a cybersecurity expert, explains how organizations can upgrade to the latest TLS version and ensure their certificates and keys are in good condition, with minimal service disruption.
CTA: Register Now
A few key points of discussion will be:
• Discovering obsolete TLS configuration and expiring certificates
• Achieving compliance and cryptographic agility with fast upgrades
• Automating key and certificate lifecycle management
RecordedJul 6 202133 mins
Your place is confirmed, we'll send you email reminders
ACME (Automated Certificate Management Environment) has become a standardized protocol, and is being rapidly adopted by Certificate Authorities around the world for its ease of use and the numerous benefits it provides. In this webinar, you'll learn exactly how the protocol works, how it automates certificate installation and renewals, and its core benefits.
AppViewX CERT+ features full ACME support, and builds on top of the protocol to provide additional value by further accelerating the deployment cycle. How can you leverage our platform to get the most out of your ACME implementation? We'll tell you how.
The ACME Protocol: What, Why, and How
Key Benefits of implementing ACME
AppViewX's take on ACME Implementations and Setup
x.509 certificates have become a mainstay of digital security for businesses around the globe. The key to making a network outage-proof and fully secure is a well-rounded certificate management program, but does the perfect implementation exist? No, but here's the next best thing. In this webinar, we'll go over the recommended best practices, updated for the year 2019. In a linear, step-by-step fashion, we'll tell you exactly what you need to do (and what not to), to create a highly secure certificate infrastructure.
Components of the certificate lifecycle.
Obstacles to implementing a secure certificate management system.
The latest best practices for certificate management.
How AppViewX CERT+ can help you adhere to them.
Webinar talks about the top 5 issues you'll run into while conducting routine PKI Health Checks, and how to get around them without too much trouble.
1) How to track and prevent issues such as certificate expiry
2) Maintaining a secure trust environment while apps/IoT are added to your business operations
3) Why a robust PKI and certificate lifecycle management platform is critical to business growth and security
In the digital world, network operations teams must make a significant skills shift to take advantage of advances in network automation and analytics. Enterprises must embrace NetOps 2.0* to adapt to future technology and process demands, such as increased agility, DevOps, the Internet of Things (IoT), cloud and software-defined infrastructure.
Watch the webinar recording to to learn how to take the right steps toward NetOps 2.0. Having served in various network engineering roles, AppViewX's Senior Solution Architect, Glenn Gray will share the insights he’s garnered throughout his 20 years of experience.
Key topics include:
- NetOps’ effects on enterprise network teams
- Getting started with NetOps automation
- The journey towards NetOps 2.0
NetOps automation help organizations create and maintain a network that is highly available and extremely agile in both the deployment and configuration stages. The very first step on this road to success is to address the current workloads. Is it possible to transform a network while also meeting SLA?
Watch the webinar recording to learn how to automate five top NetOps tasks using our low code automation platform. Having served in various network engineering roles, AppViewX's Senior Solution Architect, Glenn Gray will share the insights he’s garnered throughout his 20 years of experience.
Key topics include:
- The importance of NetOps automation
- How to automate application and network service requests
- The advantages of a low code automation platform
With microservices becoming the architecture of choice for application deployments, network services need to undergo a major overhaul to support the altered traffic flows and enforce strict governance.
This webinar will help you
Leverage microservices for faster application development and deployment
Democratize network operations in microservices for NetOps and DevSecOps while enforcing centralized management
Drive governance and policy-based orchestration across microservices deployments
Tammy Moskites, CEO of CyAlliance and Marene Allison, CISO of Johnson & Johnson
As a part of the FireCyChat series, Tammy Moskites, Executive Board Advisor at AppViewX and CEO of CyAlliance, will be hosting FireCyChat on Machine Identity, PKI, and Cybersecurity with Cybersecurity Leaders and Industry Influencers.
The second episode will feature Marene Allison, CISO of Johnson & Johnson in conversation with Tammy Moskite, CEO of CyAlliance. In this FireCyChat, Marene will share her unconventional and inspiring journey experience from being the first woman to graduate from West Point to becoming the CISO of Johnson & Johnson – and everything in between.
PKI is never set-and-forget. It is a dynamic entity, with a constant need for certificate renewal, key replacements, policy changes, and algorithm upgrades. And since PKI tasks often involve long manual steps, each change might take hours to execute. Multiply that by the numbers of certificates on file, and that equates to days or even months spent on tasks that could have been easily automated.
In this webinar, we’ll walk you through the solution to that problem – crypto-agility. How can crypto-tasks be quickly resolved? How can an administrator obtain full control over certificates and keys? How can you secure your network with robust PKI, while practicing crypto-agility?
- Principles of crypto-agility
- How to automate certificate and key lifecycles
- How to implement crypto-agility in your organization
With over 70% of data breaches caused by misconfigurations today, this webinar walks you through the critical steps required to avoid expensive human errors while managing your digital certificates.
During this webinar you’ll see:
• The impact of human error on each stage of your certificate lifecycle management.
• The critical capabilities you need to ensure in a certificate lifecycle automation tool.
• A demo of AppViewX CERT+ that displays how the solution can help you discover, monitor, manage, generate and provision certificates automatically, regardless of where they reside.
Erwin Hulst, IT Specialist Certificate Management and Yoram Peek, Devops Engineer, Rabobank
Join Erwin Hulst, IT Specialist Certificate Management, and Yoram Peek, DevOps Engineer from Rabobank, the 2nd largest bank in the Netherlands, as they walk us through their challenges and how CMDB automation helped them simplify their certificate enrollment process.
Anoosh Saboori, Product Manager, Cloud Security Platform, Google
The digital world is experiencing unprecedented growth and interconnectivity due to a perfect storm of conditions over the past few years. Achieving almost a flywheel effect, the advent of many technological innovations - the rise of cloud computing, the emergence of 5G, the proliferation of Internet-of-things (IoT) smart devices - has created immense market opportunities for digital products that interconnect our lives and workplaces. At the center of this explosion of connected devices and software-defined-everything is the ability for these interconnected devices to verify their identity with each other. The industry is quickly converging into using digital certificates to express identity. Join us to see how you should get ready for this new world and plan your infrastructure to be able to accommodate the new scale and security requirements for identity platforms, specifically, using digital certificate and certificate authorities.
A truly intuitive network is one that can operate with minimal human intervention from start to finish. Learn how you can orchestrate your network infrastructure and operations in a multi-vendor ecosystem with AppViewX.
This webinar will focus on the importance of managing an inventory post-discovery – essentially knowing who has access to your critical certificates, and how secure they are. It will also communicate the value of a certificate management tool like CERT+ that allows users to delegate granular access while also safeguarding private keys.
During this webinar we’ll go over:
• The critical capabilities that can ensure the security of your digital certificates
• Real-world problems that our customers faced before switching to our solution
• A demo of AppViewX CERT+ that displays how the solution can help protect and manage your certificate inventory efficiently
Mike Boyle, Technology Partner Manager, GlobalSign
Today, everything is connected – apps, devices, and servers – and everything is relying on public key infrastructure (PKI). Digital certificates are the most prevailing, secure and cost effective way of protecting identities and devices.
As the number of people within organizations and connected devices increases, deploying individual certificates for each application with multiple certificates per device can become a challenge for IT Teams. They have to stay on top of:
• Issuance, renewals and revocation to ensure business continuity
• IT operational costs
• Preventing downtime of business services
With IT departments handling a significant volume of digital certificates, they need management and monitoring tools to improve their operational efficiency and effectiveness.
As one of the world’s original experts and trusted authorities in PKI management and CA services, GlobalSign’s solutions enable enterprises to prevent and resolve PKI challenges. With our own proprietary solutions and through collaboration with best in class technology vendors such as AppviewX, we provide managed services and on-premise solutions for Certificate Lifecycle Management and Provisioning (CLMP), including Certificate Discovery. GlobalSign’s technology partnership with AppviewX delivers specialist services that are readily integrated with GlobalSign’s scalable public and private CA services. This includes managed public, private and dedicated CA hierarchies for your internal and external PKI trust, DevOps and IoT requirements.
There are typically three core benefits of using a Certificate Management Services. GlobalSign can help you understand how you can:
• Know what PKI certificates you have through centralized management & reporting
• Delegate administration and save time and money
• Easily adopt services without extensive change management and burdensome deployment
Vishal Gupta, Director of Product Management, Fortanix
By 2022, More than 50% of enterprise data will have moved to the public cloud. As we move more sensitive data to the cloud, it’s critical that we choose the best available data security services including encryption, key management, HSM, secrets management, and tokenization to protect that data from breaches and to comply with expanding data privacy and residency regulations.
In this webinar, we will cover the confusing set of options and best practices for using cloud-native data security services and when third-party multi-cloud data security services are required to achieve compliance or maintain consistent data security policies, secure key storage, and accelerate DevOps.
What Will You Learn:
1. Key Management Options (BYOK , BYOKMS , BYOE).
2. Hardware Security Modules (HSM) options and compliance standards.
3. Tokenization in cloud applications.
4. Secrets Management to support application developers.
In this session, we will have Kiran Punjabi from Fastenal sharing real-world PKI and certificate management challenges, and how they overcame them by implementing a next-gen certificate lifecycle management system. Fastenal has been committed to driving excellence through their tools, practices and policies, eliminating the chances of mismanaged certificates. The session will also cover Fastenal's journey thus far and their vision for the future as they transform their PKI.
Ivan Skowronski, Lead of Cybersecurity Architecture Team, Telecom Argentina
5G is well on its way to becoming ubiquitous, and it brings along opportunities and challenges in equal measure. The significantly increased throughput means it can support more applications per unit area, making way for the unprecedented proliferation of IoT. This opens up new revenue streams for communication service providers (CSPs) in the form of industrial, automotive, and consumer IoT, which is a godsend considering that the smartphone market is reaching stagnation. However, this proliferation comes with security risks - as devices increase, so do vulnerabilities. Effective use of 5G for IoT also requires widespread adoption of edge computing to minimize latency, which further increases the surface area for attacks. Securely harnessing the full potential of 5G for IoT requires elemental changes in the way IoT devices are designed - such as imprinting certificates for authentication during manufacturing. Operational security needs identity management during the device lifecycle and compliance to regulatory standards. In this session, we'll cover how the telecom industry can benefit from 5G by ensuring a strong PKI for IoT and mobile endpoints. Some takeaways will be:
• What changes would IoT undergo with the advent of 5G
• Tech requirements of 5G
• How to make IoT devices secure by design
• IoT identity issuance, monitoring, and management through certificates
• 5G and IoT regulations and compliance
Webinar talks about
- Automate networks with low-code platform
- Design simple and complex automation workflows
- Automate across multi-vendor and hybrid infrastructure
- Benefits of network automation
David Madden, Senior Director - Business Development, Thales
The COVID-19 pandemic has closed offices and displaced workers to their homes, causing a transition we have not anticipated nor seen before. This is similar to digital transformation, where companies are moving to the cloud & changing their businesses to survive or be left behind in a new digital world. With these changes we have seen an overwhelming increase in the number of cyber-attacks over the past year. Fortune magazine online has just proclaimed, “A Digital Pandemic Tops off Coronavirus Woes.”
As we continue to adapt to a new normal in our lives and businesses, it is clear that we need to protect both our employees & also our digital assets & networks. Any compromise to corporate data would be catastrophic. The same is true for employees, who must learn to protect themselves & their families while they try to work in the pandemic era.
Modern organizations must evolve to a cloud friendly world, while maintaining security as more data traverses networks out of their control. We can use this change as a learning opportunity, and I will make a few comparisons to the COVID-19 global pandemic as a way towards helping prevent a real digital pandemic.
Redefining Cybersecurity and Context-Driven Network Orchestration
Certificate Lifecycle Management and Network Orchestration
AppViewX is the low-code automation platform that assists global enterprises with PKI certificate management and network infrastructure automation. By focussing on maximizing network security while minimizing the manual effort expended by IT teams, AppViewX has helped over 100 organizations realize lower outages, high visibility into PKI and network environments, and complete control over certificates, keys, and device configurations.
Effectively, we're making the last mile of network automation universally accessible via a flexible platform that will fit into existing architecture, and work with it to deliver rapid results in line with compliance goals. Our webinars are designed to educate viewers about industry trends, product capabilities, and customer implementations.
Browse through our library below, or learn more about us at appviewx.com