There are many options when it comes to container orchestration platforms and services. Figuring out which one is best for a particular organization’s needs and applications can be a challenge. Which platform for containerization you choose can significantly influence your business success, so the selection process should be carefully considered ...
Venafi announced Venafi Cloud for DevOps, a new, integrated cloud-based service that delivers fast, frictionless, secure cryptographic keys and digital certificates that work with popular enterprise DevOps platforms.
“DevOps teams value innovation; they need platforms that deliver speed and agility,” said Kevin Bocek, Chief Decurity Dtrategist for Venafi. “Unfortunately, even the most sophisticated DevOps teams struggle to secure keys and digital certificates. For the first time, Venafi Cloud for DevOps gives engineers access to secure, fully automated key and certificates without slowing down application development.”
DevOps teams require automation to accelerate application development delivery but corporate key and certificate acquisition processes are often time consuming and cumbersome. As a result, DevOps engineers create new key and certificate acquisition processes tailored to their needs. These ad hoc key and certificate processes rarely meet enterprise security standards and introduce significant new security risks. Through seamless API integration with the DigiCert high-volume Certificate Authority, Venafi Cloud for DevOps allows developers to gain automated, fast, scalable no-cost access to keys and certificates from within the DevOps platforms they already use without compromising enterprise security.
Key features of Venafi Cloud for DevOps:
- Accelerated application development makes it easy for DevOps to acquire trusted keys and certificates.
- Robust integration delivers seamless, out-of-the-box integration with leading DevOps platforms, including Docker Enterprise, HashiCorp Terraform and SaltSack Enterprise.
- Continuous delivery uses elastic scalability and fully automated key and certificate orchestration to respond to rapid changes in demand.
Keys and certificates establish identities for all kinds of machines, including containers, making the protection of keys and certificates a critical element of an organization’s security strategy. Malicious use of forged or stolen certificates allows cyber attackers to hide in encrypted traffic, and many organizations do not have the tools to manage and mitigate these threats. This is driving a dramatic rise in enterprise security risks.
These security risks are amplified in DevOps environments because the speed and scale of development is accelerating. As a result, the number of machines, and the keys and certificates needed to uniquely identify them, is exploding. Without scalable, automated protection, keys and certificates that are compromised in development can lead directly to serious production vulnerabilities.