TrustForce™

Automated Vulnerability Remediation. Scale Quickly and Securely.

Analyst Coverage

“Cybercriminals are known to steal SSH keys or manipulate which keys are trusted to gain access to source code and other valuable intellectual property” Read More

“Advanced threat detection provides an important layer of protection but is not a substitute for securing keys and certificates that can provide an attacker trusted status that evades detection.” Read More

"Basically, the enterprise is a sitting duck."

"PKi is under attack...Advanced and persistent adversaries go for keys" Read More

"When there are many hundreds of certificates from a variety of certificate authorities, the only ecumenical [universal], nonproprietary provider of a certificate management solution is Venafi. Other CA management systems are biased toward the particular CA by, for example, only supporting renewals from that specific CA." Read More

"No CISO could consider having tens of thousands of unknown network ports open and have no way to control them. But that’s the alarming reality today with regards the trust established by keys and certificates..." Read More

"Organizations with roughly 200 or more documented X.509 certificates in use are high-risk candidates for unplanned expiry and having certificates that have been purchased but not deployed." Read More

"Technology critical to cloud computing is in clear and present danger...attacks on Secure Shell (SSH) keys present the most alarming threat arising from failure to control trust." Read More

“Certificates can no longer be blindly trusted” Read More

“Just because something is digitally signed doesn't mean it can be trusted.”

“Enterprise awareness of attacks on keys and certificates is in its infancy; most don’t understand how to detect or respond to an attack.” Read More

Overview

The ability to quickly respond to incidents that impact keys and certificates is essential to regain the trust your company, customers, and partners depend on. But when an incident does occur, most do what Gartner calls, “’lazy’ certificate remediation:” they issue new certificates but do not generate new keys. Or they do not remediate at all—leaving the organization open to continued outages, incidents, and exploitation. With many organizations using legacy, error-prone, manual, or homegrown scripted solutions, it’s not surprising that they are unable to provide complete or timely incident response.

This lack of automation also impacts scalability and incident prevention. Without complete automation of issuance and renewal, key and certificate processes hinder dynamic scaling by key- and certificate-dependent virtual and cloud applications.

In addition, Gartner found that over 80% of organizations with NGFW, IPS, or UTM appliances do not decrypt SSL traffic. The result—security controls blindly trust keys and certificates, allowing bad guys to use them to hide in encrypted traffic, spoof websites, deploy malware, and steal data.

Venafi as the Immune System for the Internet™, uses Venafi TrustForce™ to automate the entire key and certificate lifecycle, determining which keys and certificates are self and trusted, protecting those that should be trusted, and fixing or blocking those that are not by blacklisting or automatically replacing vulnerable keys or certificates. In addition, organizations can eliminate blind spots from encrypted threats by automating the delivery of trusted keys for SSL/TLS decryption and threat protection. With automated integration across hundreds of applications, devices, services, and Certificate Authorities (CAs), TrustForce ensures protection and remediation processes occur seamlessly.

TrustForce also enables organizations to securely scale their cryptographic resources to meet elastic demands for services. Its automated key and certificate operations and intelligent application-specific integration let enterprises scale to hundreds of thousands of encryption keys and certificates.

  • Recover faster from security incidents
  • Automate vulnerability remediation
  • Scale cryptographic resources to meet service demands
  • Eliminate downtime and improve operational efficiency

 

> What it does