Skip to main content
banner image
venafi logo

How Machine Identity Protection Helps Keep Service Owners Safe and Satisfied

How Machine Identity Protection Helps Keep Service Owners Safe and Satisfied

PKI, Public Key Infrastructure, automated security
June 6, 2019 | John Muirhead-Gould

Your organization’s security is only as successful as your people. Granted, while administrators are responsible for the infrastructure and possibly even the policies that govern machine identities, they rarely create that policy, request the infrastructure, or install the software.

Lately, my team has been doing a lot of talking about service ownership and how it relates to Public Key Infrastructure (PKI) and machine identities. This is a topic that very strongly resonates with me. Having been a Service Owner twice and having worked closely with other Service Owners, I tend to look at things a bit differently than do my peers who are more experienced on the vendor side. What I’ve experienced firsthand is often 90 degrees different than some of the product-focused thinking that actively happens within many security vendors.

 

What are the top machine identity challenges large organizations face? See analyst findings.

Let me put it this way. When Venafi CEO Jeff Hudson says that the perimeter is done, he may be thinking about it from more facets than many folks realize. It’s easy to think “perimeter” and associate “firewall” to it. But in today’s mega corporations, you have these “companies inside the company” that are in essence unique technology shops with their own internal customers. The roles and responsibilities of a Service Owner, depending on how it is described in terms of people and interactions, is almost analogous to a CEO type of role for a startup. The customers are the internal Business Units, and their requirements vary widely.

In a large financial organization, for example, the asset management group, the consumer banking group, and the capital markets group may all be different ‘customers’ to an internally provided technology service. Some of these different major groups are enthusiastic about machine identity protection, and others may say, “I need these 20 things before we can even think about machine identity protection.”

Service owners are thinking about things like: How is the service definition evolving—what’s a SKU and what’s a feature underneath of a SKU? What’s the roadmap? How much does it cost to produce the service and what are the economics that go with it? How is communication happening to the users and what’s the feedback loop? Yes, Net Promoter Score (NPS) may matter there too.

When we assure these Business Units that using a platform for machine identity protection lets them get more done, they get onboard more quickly. Some Business Units need more convincing. But ultimately, having Visibility into the inventory of machine identities, Intelligence to know which ones comply with security policy, and Automation is a win-win-win. Human error is reduced, security is increased, and the efficiency gains translate to money that can be re-invested in your core business.

How complete is your Machine Identity Protection?

Related posts

 

Self-Signed Certificates: Cyber Criminals Can Quickly Turn a Strength into a Vulnerability. Explore now.

Subscribe to our Weekly Blog Updates!

Join thousands of other security professionals

Get top blogs delivered to your inbox every week

See Popular Tags

You might also like

Woman with her head in her hands

The Pain of Certificate-Related Outages Is Very Real [And Completely Avoidable]

generic_blog_banner_image

Edward Snowden Weighs in on Corporate Security and Encryption

About the author

John Muirhead-Gould
John Muirhead-Gould
Read Posts by Author
get-started-overlay close-overlay cross icon
get-started-overlay close-overlay cross icon
Venafi Risk assessment Form Image

Sign up for Venafi Cloud


Venafi Cloud manages and protects certificates



* Please fill in this field Please enter valid email address
* Please fill in this field Password must be
At least 8 characters long
At least one digit
At last one lowercase letter
At least one uppercase letter
At least one special character
(@%+^!#$?:,(){}[]~`-_)
* Please fill in this field
* Please fill in this field
* Please fill in this field
*

End User License Agreement needs to be viewed and accepted



Already have an account? Login Here

×
get-started-overlay close-overlay cross icon

How can we help you?

Thank you!

Venafi will reach out to you within 24 hours. If you need an immediate answer please use our chat to get a live person.

In the meantime, please explore more of our solutions

Explore Solutions

learn more

Email Us a Question

learn more

Chat With Us

learn more
Chat