Skip to main content
resource banner
venafi logo

Venafi Resources

phone image
Featured {[{ item.field_resource_type }]}

{[{ item.title }]}

Download PDF
Filter Resources
Topics
Industries
Content Types
Reset Filters
Venafi CodeSign Protect Helps Transportation Company Thwart Ransomware Attacks
Case Study

Venafi CodeSign Protect Helps Transportation Company Thwart Ransomware Attacks

Case Study

Ransomware has become a growing problem in today's perimeterless world. And all code is vulnerable—…

Learn More   
Venafi SSH Protect
Data Sheet

Venafi SSH Protect

Data Sheet

With the explosive growth in machines—devices, applications, cloud workloads, virtual machines and…

Learn More   
Ransomware Report
Industry Research

Global Security Report: Rapid Increase in Ransomware Threats Drives Need for Security Controls That Speed the Kill Chain

Industry Research

Ransomware attacks are increasing in number and severity, to the point where a ransomware attack…

Learn More   
APT41 Perfects Code Signing Abuse to Escalate Supply Chain Attacks
White Paper

APT41 Perfects Code Signing Abuse to Escalate Supply Chain Attacks

White Paper

Learn about the infamous APT41 group and why they are abusing code signing keys and certificates as…

Learn More   
Code Signing MIM for Dummies
eBook

Code Signing Machine Identity Management for Dummies

eBook

Despite their value in protecting critical software infrastructure, code signing keys and…

Learn More   
Ready for the next SolarWinds-style attack?
Infographic

Ready for the next SolarWinds-style attack?

Infographic

Learn More   
EMEA Bank Improves Competitive Edge by Accelerating Machine Identity Management
Case Study

EMEA Bank Improves Competitive Edge by Accelerating Machine Identity Management

Case Study

Case Study Organizations must adopt digital transformation strategies to gain competitive…

Learn More   
True Tales of 8 Certificate Outages
eBook

True Tales of 8 Certificate Outages - How to Avoid Disruption, Distraction & Downtime

eBook

For every publicized outage, there are thousands more no one hears about. Yet these outages take…

Learn More   
Manufacturing Company Returns to Venafi
Case Study

Manufacturing Company Returns to Venafi After Ill-Fated Switch to Low-Cost Competitor

Case Study

Case Study Several low-cost competitors claim they offer comprehensive machine identity management…

Learn More   
Buyer’s Guide for Machine Identity Management
Buyer's Guide

Buyer’s Guide for Machine Identity Management

Buyer's Guide

Read our buyers guide to get a checklist that helps you evaluate which solutions provide the most…

Learn More   
Jetstack Helps Alpha FX Supercharge Their Payments Business
Case Study

Jetstack Helps Alpha FX Supercharge Their Payments Business

Case Study

The payments space has grown 10-fold in just the last three years—and players in this space must…

Learn More   
Survey: Tech professionals expect more SolarWinds-style attacks
White Paper

Survey: Tech professionals expect more SolarWinds-style software supply chain attacks in 2021 and beyond: Can organizations change the way they secure software build environments fast enough?

White Paper

The SUNBURST attack on SolarWinds shone a klieg light on how threat actors can "shift left" and…

Learn More   
Large Bank Uses Venafi to Achieve Crypto-Agility; Absorbs New Acquisition Without Hiccups
Case Study

Large Bank Uses Venafi to Achieve Crypto-Agility; Absorbs New Acquisition Without Hiccups

Case Study

Companies acquire other companies for many business reasons—but merging IT infrastructures is…

Learn More   
Solution Brief icon
Multimedia

Rewatch our Global Machine Identity Management Summit

Multimedia

Learn More   
SSH For Dummies
eBook

SSH Machine Identity Management for Dummies

eBook

Why is it more important than ever to secure SSH machine identities across your organization?…

Learn More   
get-started-overlay close-overlay cross icon

How can we help you?

Thank you!

Venafi will reach out to you within 24 hours. If you need an immediate answer please use our chat to get a live person.

In the meantime, please explore more of our solutions

Explore Solutions

learn more

Email Us a Question

learn more

Chat With Us

learn more