Skip to main content
Resources Banner Image
venafi logo

Venafi Resources

phone image
Featured {[{ item.field_resource_type }]}

{[{ item.title }]}

Download PDF
Filter Resources
Topics
Industries
Content Types
Reset Filters
Buyer's Guide for Machine Identity Management
Buyer's Guide

Buyer’s Guide for Machine Identity Management

Buyer's Guide

Read our buyers guide to get a checklist that helps you evaluate which solutions provide the most…

Learn More   
Jetstack Helps Alpha FX Supercharge Their Payments Business
Case Study

Jetstack Helps Alpha FX Supercharge Their Payments Business

Case Study

The payments space has grown 10-fold in just the last three years—and players in this space must…

Learn More   
Survey: Tech professionals expect more SolarWinds-style software supply chain attackss
White Paper

Survey: Tech professionals expect more SolarWinds-style software supply chain attacks in 2021 and beyond: Can organizations change the way they secure software build environments fast enough?

White Paper

The SUNBURST attack on SolarWinds shone a klieg light on how threat actors can "shift left" and…

Learn More   
Crypto-Agility Case Study
Case Study

Large Bank Uses Venafi to Achieve Crypto-Agility; Absorbs New Acquisition Without Hiccups

Case Study

Companies acquire other companies for many business reasons—but merging IT infrastructures is…

Learn More   
Solution Brief icon
Multimedia

Rewatch our Global Machine Identity Management Summit

Multimedia

Learn More   
SSH For Dummies
eBook

SSH Machine Identity Management for Dummies

eBook

Why is it more important than ever to secure SSH machine identities across your organization?…

Learn More   
VaaS Secure DevOps
Data Sheet

Venafi as a Service™: Secure DevOps

Data Sheet

Venafi as a Service is a cloud-native platform that provides developers with a fast and easy API-…

Learn More   
VaaS Stop Outages
Data Sheet

Venafi as a Service™: Stop Outages

Data Sheet

Venafi as a Service is a cloud-native platform that automates the discovery and continuous…

Learn More   
Insurance Mini Case Study
Case Study

Insurance Company Eliminates F5-Based Outages; Automates TLS Certificate Lifecycle Across Their Enterprise

Case Study

Certificate-related outages do more than cause organizations headaches—they can make the difference…

Learn More   
Code Signing in CI/CD Pipeline (CodeSign Protect) Case Study
Case Study

Healthcare Technology Firm Implements Secure Code Signing in CI/CD Pipeline (CodeSign Protect)

Case Study

As organizations generate more code, they need a means to secure it—and the environments in which…

Learn More   
Securing Code Signing in CI/CD Pipelines
Solution Brief

Securing Code Signing in CI/CD Pipelines

Solution Brief

It isn't enough to automate the signing of code in CI/CD pipelines. You must also secure code…

Learn More   
SolarWinds: Anatomy of a Supersonic Supply Chain Attack
White Paper

SolarWinds: Anatomy of a Supersonic Supply Chain Attack

White Paper

The recent SolarWinds/JetBrains cyberattack compromised 80% of the Fortune 500, along with numerous…

Learn More   
Can Your SSH Key Management Program Pass an Audit?
eBook

Can Your SSH Key Management Program Pass an Audit? Ask Yourself These Questions

eBook

SSH keys are difficult to secure. They never expire and are hard to track, let alone manage. But as…

Learn More   
TLS MIM For Dummies
eBook

TLS Machine Identity Management for Dummies

eBook

Learn More   
SSH Risk CIO Study
White Paper

CIO Study: CIOs Massively Underestimate SSH Risks - 300% Growth in SSH Malware

White Paper

Why is SSH key management so critical now? And why are CIOs—despite knowing the risks they pose—…

Learn More   
get-started-overlay close-overlay cross icon

How can we help you?

Thank you!

Venafi will reach out to you within 24 hours. If you need an immediate answer please use our chat to get a live person.

In the meantime, please explore more of our solutions

Explore Solutions

learn more

Email Us a Question

learn more

Chat With Us

learn more