We’re pleased to announce a new partnership and intergration with Gemalto, which allows organizations to automate encryption key life cycles and certificate issuance to better protect machine identities.
With Venafi and Gemalto, organizations can reduce the risk of data breaches, meet compliance requirements and simplify machine identity protection.
Scaling the use of HTTPS demands trade-offs between security and efficiency. For example, enabling Encryption Everywhere strategies requires organization to deploy more Secure Sockets Layer/Transport Layer Security (SSL/TLS) keys and certificates.
The integrated solution of the Venafi Trust Protection Platform and Gemalto’s SafeNet Luna Hardware Security Modules strengthens machine identity protection programs by eliminating time-consuming and error-prone manual tasks, which increase the risk of exposing private keys and threaten application availability.
“Our integration with Gemalto works immediately with all leading certificate authorities in the Venafi Technology Network, ensuring improved machine identity protection. It is easy to deploy, reduces errors and dramatically cuts the time and resources required to use SSL and TLS keys and certificates with HSMs,”said Kevin Bocek, chief security strategist for Venafi.
Key benefits of Venafi and Gemalto’s integration include:
Reducecosts and meet service-level agreements: Security operations teams no longer need to spend time performing key and certificate operations for applications. By saving businesses time, they keep resources and budgets in check.
Centralize control, visibility and validation: Security and risk management teams now have one central location for setting, enforcing and validating policy for HSM security. As a result, they can better meet compliance requirements and simplify audits.
Reduce complexity and simplify security operations: Key pairs are securely generated in the HSM where they can be accessed by applications, and the private keys never leave the hardened, tamper-resistant HSM appliance. All operations are automated; administrators are not required to perform manual tasks on physical or virtual servers.
Reduced risk and strengthened security: Security and operations teams can expand the use of encryption with keys and certificates generated and stored in a FIPS 140-2 Level 3 certified HSM at the application level. This dramatically reduces the risk of compromise and improves overall security.