Venafi, the leading provider of Next-Generation Trust Protection, today unveiled powerful new cybersecurity defenses to help enterprises fight the rise in attacks using Secure Shell (SSH). New research released by the Ponemon Institute shows that 3 out of 4 Global 2000 organizations have no security system for SSH, leaving the door open for rogue, root-level access and data compromises.
Venafi TrustAuthority SSH identifies and protects all SSH cryptographic keys across networks, virtualized data centers, and in the cloud. TrustAuthority establishes a known good state, continuously monitors, and detects anomalous activity. Venafi TrustForce SSH provides automated security to remediate vulnerabilities and anomalies identified by TrustAuthority. With TrustForce, SSH keys are automatically generated and replaced, and authorized key lists are synchronized across thousands of distributed systems. According to new research, nearly half of all enterprises never rotate or change SSH keys. This makes their networks, servers, and cloud systems owned by the malicious actors in perpetuity when SSH keys are stolen, as demonstrated with the recent The Mask operation and other cyberattacks.
Tweet this: @Venafi defending enterprises from rise in attacks using #SSH keys for rogue root access #Security #TheMask
“Cybercriminals are known to steal SSH keys or manipulate which keys are trusted to gain access to source code and other valuable intellectual property,” explained Forrester Consulting. “Advanced threat detection provides an important layer of protection but is not a substitute for securing keys and certificates that can provide an attacker trusted status that evades detection” (July 2013 commissioned study entitled "Attacks on Trust: The Cybercriminal's New Weapon," conducted by Forrester Consulting on behalf of Venafi).
These new innovations expand Venafi’s industry leadership in securing and protecting any key, any certificate, anywhere. With this announcement, Venafi is also introducing the Venafi Trust Protection Platform™, the next generation security platform that replaces Venafi Director. Built on the Trust Protection Platform, TrustAuthority and TrustForce are the only security systems to protect SSL keys and certificates, SSH keys, and mobile device and application certificates. TrustAuthority and TrustForce are the first, new products built on the Trust Protection Platform and replace Venafi’s previous products: Server Certificate Manager, SSH Key Manager, and Mobile Certificate Manager.
Tweet this: @Venafi rolls out Trust Protection Platform w/ #TrustAuthority & #TrustForce to secure #SSL, #SSH & mobile keys/certs
As part of the platform, TrustAuthority and TrustForce work together to protect keys and certificates, detect anomalies, and respond and remediate quickly:
Tweet this: @Venafi identifies all #SSH keys, detects anomalies, & responds automatically to remediate w/ key replacement
Cryptographic keys and certificates establish online trust for payments and transactions, data storage and access, mobile devices and applications, and even sensitive systems such as air traffic control and smart-grid technologies. However, criminals have learned to take advantage of the dependence and blind trust that organizations have placed in keys and certificates. Since Stuxnet was detected, misuse of keys and certificates has grown astronomically, at a rate of 1,600 percent year-over-year according to Intel Security Labs: McAfee 2013 Threats Report.
Venafi research identified that Edward Snowden breached the NSA by using unprotected SSH keys and certificates. Reported first in USA Today, Venafi’s research on Snowden’s use of keys and certificates has been further corroborated by NSA memos as reported by MSNBC and BBC. Not surprisingly, Ponemon Institute found that 100% of all enterprises surveyed had been attacked over the last two years using rogue keys and certificates, which included SSH keys.
“The safety, security, and privacy of ecommerce, the cloud, and mobile devices and users all depend on securing the trust established by cryptographic keys and digital certificates. Today’s cybercriminals always look for the weakest link in security defenses, and have discovered the blind dependence, lack of threat awareness, and inability to respond to attacks on trust in every business and government worldwide,” said Jeff Hudson, CEO, Venafi. “Venafi is the only cybersecurity defense standing between businesses and governments and cybercriminals attacking SSH keys, SSL keys and certificates, and mobile device and app certificates. Organizations must fight back. Venafi TrustAuthority and Venafi TrustForce are the only defenses to secure and protect keys and certificates with a single platform.”
The new cybersecurity defenses for SSH in TrustAuthority and TrustForce, will be available to customers later in Q1 of this year. For more information please visit http://www.venafi.com/products
Existing Venafi Director customers are eligible for the Trust Protection Platform that replaces Venafi Director. For more information, Venafi customers should contact their Venafi account executive directly.
To get the latest news and information about Venafi:
Visit our blog at http://www.venafi.com/blog
Follow us on Twitter: @Venafi
Follow us on LinkedIn: http://www.linkedin.com/company/venafi
Follow us on Google+: https://www.google.com/+VenafiCo
Follow us on Facebook: https://www.facebook.com/Venafi
Lorem ipsum dolor sit amet, consectetur elit.
Thank you for subscription
Scroll to the bottom to accept
VENAFI CLOUD SERVICE
*** IMPORTANT ***
PLEASE READ CAREFULLY BEFORE CONTINUING WITH REGISTRATION AND/OR ACTIVATION OF THE VENAFI CLOUD SERVICE (“SERVICE”).
This is a legal agreement between the end user (“You”) and Venafi, Inc. ("Venafi" or “our”). BY ACCEPTING THIS AGREEMENT, EITHER BY CLICKING A BOX INDICATING YOUR ACCEPTANCE AND/OR ACTIVATING AND USING THE VENAFI CLOUD SERVICE FOR WHICH YOU HAVE REGISTERED, YOU AGREE TO THE TERMS OF THIS AGREEMENT. IF YOU ARE ENTERING INTO THIS AGREEMENT ON BEHALF OF A COMPANY OR OTHER LEGAL ENTITY, YOU REPRESENT THAT YOU HAVE THE AUTHORITY TO BIND SUCH ENTITY AND ITS AFFILIATES TO THESE TERMS AND CONDITIONS, IN WHICH CASE THE TERMS "YOU" OR "YOUR" SHALL REFER TO SUCH ENTITY AND ITS AFFILIATES. IF YOU DO NOT HAVE SUCH AUTHORITY, OR IF YOU DO NOT AGREE WITH THESE TERMS AND CONDITIONS, YOU MUST NOT ACCEPT THIS AGREEMENT AND MAY NOT USE THE SERVICE.
You shall not access the Service if You are Our competitor or if you are acting as a representative or agent of a competitor, except with Our prior written consent. In addition, You shall not access the Service for purposes of monitoring its availability, performance or functionality, or for any other benchmarking or competitive purposes, and you shall not perform security vulnerability assessments or penetration tests without the express written consent of Venafi.
This Agreement was last updated on April 12, 2017. It is effective between You and Venafi as of the date of Your accepting this Agreement.
The Venafi Cloud Service includes two separate services that are operated by Venafi as software as a service, each of which is separately licensed pursuant to the terms and conditions of this Agreement and each of which is considered a Service under this Agreement: the Venafi Cloud Risk Assessment Service or the Venafi Cloud for DevOps Service. Your right to use either Service is dependent on the Service for which You have registered with Venafi to use.
This License is effective until terminated as set forth herein or the License Term expires and is not otherwise renewed by the parties. Venafi may terminate this Agreement and/or the License at any time with or without written notice to You if You fail to comply with any term or condition of this Agreement or if Venafi ceases to make the Service available to end users. You may terminate this Agreement at any time on written notice to Venafi. Upon any termination or expiration of this Agreement or the License, You agree to cease all use of the Service if the License is not otherwise renewed or reinstated. Upon termination, Venafi may also enforce any rights provided by law. The provisions of this Agreement that protect the proprietary rights of Venafi will continue in force after termination.
This Agreement shall be governed by, and any arbitration hereunder shall apply, the laws of the State of Utah, excluding (a) its conflicts of laws principles; (b) the United Nations Convention on Contracts for the International Sale of Goods; (c) the 1974 Convention on the Limitation Period in the International Sale of Goods; and (d) the Protocol amending the 1974 Convention, done at Vienna April 11, 1980.
In the meantime, please explore more of our solutions
In the meantime, please explore more of our solutions
This site uses cookies to offer you a better experience. If you do not want us to use cookies, please update your browser settings accordingly. Find out more on how we use cookies.