Collateral
Gartner: Responding to New SSL Cybersecurity Threats

Gartner: Responding to New SSL Threats Report

Global enterprises have a gaping hole in their security strategy for defending against rampant cyber attacks on the trust established by cryptographic keys and digital certificates. Cyber criminals understand that the easy targets are those organizations that have little visibility into their threat surface and cannot respond quickly. As an industry we need to gain control over trust, we need to plug the gap related to key & certificate-based exploits. Unprotected keys and certificates create security vulnerabilities and the attackers are taking full advantage as a result.

Read Now (pdf)

 
Ponemon 2014 SSH Security Vulnerability Report

Ponemon 2014 SSH Security Vulnerability Report

Among the fundamental security controls enterprises rely on to protect data and ensure trust is secure shell (SSH). Yet, according to this new research by the Ponemon Institute, system and application administrators—not IT security—are responsible for securing and protecting SSH keys, which exposes critical security vulnerabilities.

Read Now (pdf)

 
Trust Protection Platform Datasheet

Trust Protection Platform Datasheet

Venafi Trust Protection Platform secures and protects any key, any certificate, anywhere. Trust Protection Platform provides shared and extensible services to secure multiple types of keys and certificates on mobile devices, desktops, and application servers across enterprise networks and out to the cloud.

Read Now (pdf)

 
Trust Authority Datasheet

TrustAuthority Datasheet

TrustAuthority™ part of Venafi Trust Protection Platform, performs network- and agent-based scanning to identify all keys and certificates, signed by multiple CAs, across the enterprise network and out to the cloud. TrustAuthority provides complete visibility across multiple types of encryption assets including SSL keys and certificates, SSH keys, mobile and user certificates, and symmetric keys.

Read Now (pdf)

 
Trust Force Datasheet

TrustForce Datasheet

TrustForce™ part of the Venafi Trust Protection Platform, automates responses to such incidents as well as remediates SSL certificate vulnerabilities before they cause problems. TrustForce secures and protects the entire key and certificate lifecycle, automatically remediating anomalies by replacing the vulnerable key or certificate.

Read Now (pdf)

 
Securing Mobile Certificates Whitepaper

Securing Mobile Certificates Whitepaper

The shift toward Bring Your Own Device (BYOD) has led to the rapid deployment of hundreds of thousands of mobile certificates, increasing the risk of unauthorized access to critical networks, applications, and data. Although a remote wipe of a device mitigates data loss, it does not remove potentially orphaned or compromised mobile certificates. Download this whitepaper and learn how to gain visibility and control over mobile access in your organization.

Read Now (pdf)

 
Broken Trust Whitepaper

Broken Trust Whitepaper

This white paper explores the motivations of attackers, the practices they employ to execute their attacks, and what you can do to keep these criminals out.

Read Now (pdf)

 
16 Years of Escalating War on Trust

16 Years of Escalating War on Trust

The 16 Years of Escalating War on Trust whitepaper takes a historical overview of the how cyber attacks have evolved, and examines how cybercriminal efforts have become increasingly complex and frequent. During this period, sensitive and valuable data has grown exponentially, as has the complex IT infrastructure within enterprises that is meant to protect it. Data and supporting IT systems have become ripe targets for attack – and the cyber security attacks have become increasingly nefarious.

Read Now (pdf)

 
Forrester Research: Attacks on Trust

Forrester Research: Attacks on Trust

Cybercriminals want access to your network. You need to not only recognize the risk of trust-based attacks but also learn how to thwart them. This study outlines practices that you can implement to keep these criminals out.

Read Now (pdf)

 
Is Your APT Strategy Leaving the Door Open?

Is Your APT Strategy Leaving the Door Open?

Today, every business and government is a target for data theft. Research shows 100% of all advanced attacks are a result of credential compromises, including cryptographic keys and digital certificates, and organizations are racing to add new layers of security to help detect and respond. Close the door on key and certificate threats and attacks. Read this Venafi white paper to learn more about how your organization can reduce its attack surface and respond to attacks faster, reducing risk and financial loss.

Read Now (pdf)

 1 2 >