Skip to main content
Resources Banner Image
venafi logo

Venafi Resources

phone image
Featured {[{ item.field_resource_type }]}

{[{ item.title }]}

Download PDF
Filter Resources
Topics
Industries
Content Types
Reset Filters
Code Signing in CI/CD Pipeline (CodeSign Protect) Case Study
Case Study

Healthcare Technology Firm Implements Secure Code Signing in CI/CD Pipeline (CodeSign Protect)

Case Study

As organizations generate more code, they need a means to secure it—and the environments in which…

Learn More   
Securing Code Signing in CI/CD Pipelines
Solution Brief

Securing Code Signing in CI/CD Pipelines

Solution Brief

It isn't enough to automate the signing of code in CI/CD pipelines. You must also secure code…

Learn More   
SolarWinds: Anatomy of a Supersonic Supply Chain Attack
White Paper

SolarWinds: Anatomy of a Supersonic Supply Chain Attack

White Paper

Learn More   
Can Your SSH Key Management Program Pass an Audit?
eBook

Can Your SSH Key Management Program Pass an Audit? Ask Yourself These Questions

eBook

SSH keys are difficult to secure. They never expire and are hard to track, let alone manage. But as…

Learn More   
TLS MIM For Dummies
eBook

TLS Machine Identity Management for Dummies

eBook

Learn More   
SSH Risk CIO Study
White Paper

CIO Study: CIOs Massively Underestimate SSH Risks - 300% Growth in SSH Malware

White Paper

Why is SSH key management so critical now? And why are CIOs—despite knowing the risks they pose—…

Learn More   
FinServ Customer SSH Key Clean Up Case Study
Case Study

FinServ Customer Cleans Up SSH Key Inventory, Passes Audit With Flying Colors

Case Study

SSH key sprawl not only leaves enterprises exposed to a plethora of security risks, it leads to…

Learn More   
Case Study: Tech Customer Secures DevOps Machine Identities-Helps Developers Work Faster
Case Study

Tech Customer Secures DevOps Machine Identities and Helps Developers Work Faster

Case Study

InfoSec and DevOps teams can seem to have conflicting priorities, making it hard to protect SSL/TLS…

Learn More   
Expansion of Enterprise Attack Surface_WhitePaper
White Paper

Machine Identities Drive Rapid Expansion of Enterprise Attack Surface

White Paper

Digital transformation strategies have led to an explosion of machines needing unique identities to…

Learn More   
Infographic: Certificate Lifespans
Infographic

Infographic: Certificate Lifespans: How Short Is Too Short?

Infographic

The number of certificates that organizations are using is skyrocketing. At the same time…

Learn More   
Tales of 3 Clouds_eBook
eBook

Tales of 3 Clouds: How Venafi Helps Organizations with Digital Transformation

eBook

Enterprises are migrating more of their IT infrastructures to the cloud to fulfill digital…

Learn More   
Are your company’s code signing processes secure?
Webinar

Are your company’s code signing processes secure?

Webinar

Learn More   
Cheetahs, Covid-19, and Crypto Agility
Webinar

Cheetahs, Covid-19, and Crypto Agility

Webinar

Learn More   
Fast IT Meets Strong Machine Identities
Webinar

Integrate, Authenticate and Accelerate: Fast IT Meets Strong Machine Identities

Webinar

Learn More   
stops outages
Webinar

Prevent “Certificate Sudden Death”: VIA Venafi Stops Certificate-Related Outages

Webinar

Learn More   
get-started-overlay close-overlay cross icon

How can we help you?

Thank you!

Venafi will reach out to you within 24 hours. If you need an immediate answer please use our chat to get a live person.

In the meantime, please explore more of our solutions

Explore Solutions

learn more

Email Us a Question

learn more

Chat With Us

learn more