Venafi Cloud for DevOps Announced
April 18, 2017

Venafi announced Venafi Cloud for DevOps, a new, integrated cloud-based service that delivers fast, frictionless, secure cryptographic keys and digital certificates that work with popular enterprise DevOps platforms.

“DevOps teams value innovation; they need platforms that deliver speed and agility,” said Kevin Bocek, Chief Decurity Dtrategist for Venafi. “Unfortunately, even the most sophisticated DevOps teams struggle to secure keys and digital certificates. For the first time, Venafi Cloud for DevOps gives engineers access to secure, fully automated key and certificates without slowing down application development.”

DevOps teams require automation to accelerate application development delivery but corporate key and certificate acquisition processes are often time consuming and cumbersome. As a result, DevOps engineers create new key and certificate acquisition processes tailored to their needs. These ad hoc key and certificate processes rarely meet enterprise security standards and introduce significant new security risks. Through seamless API integration with the DigiCert high-volume Certificate Authority, Venafi Cloud for DevOps allows developers to gain automated, fast, scalable no-cost access to keys and certificates from within the DevOps platforms they already use without compromising enterprise security.

Key features of Venafi Cloud for DevOps:

- Accelerated application development makes it easy for DevOps to acquire trusted keys and certificates.

- Robust integration delivers seamless, out-of-the-box integration with leading DevOps platforms, including Docker Enterprise, HashiCorp Terraform and SaltSack Enterprise.

- Continuous delivery uses elastic scalability and fully automated key and certificate orchestration to respond to rapid changes in demand.

Keys and certificates establish identities for all kinds of machines, including containers, making the protection of keys and certificates a critical element of an organization’s security strategy. Malicious use of forged or stolen certificates allows cyber attackers to hide in encrypted traffic, and many organizations do not have the tools to manage and mitigate these threats. This is driving a dramatic rise in enterprise security risks.

These security risks are amplified in DevOps environments because the speed and scale of development is accelerating. As a result, the number of machines, and the keys and certificates needed to uniquely identify them, is exploding. Without scalable, automated protection, keys and certificates that are compromised in development can lead directly to serious production vulnerabilities.

The Latest

September 21, 2017

There are many options when it comes to container orchestration platforms and services. Figuring out which one is best for a particular organization’s needs and applications can be a challenge. Which platform for containerization you choose can significantly influence your business success, so the selection process should be carefully considered ...

September 20, 2017

A powerful tool for simplifying DevOps is containerization, which delivers a convenient form of application packaging, combined with the opportunity to automate certain IT provisioning processes. With containerization, DevOps teams can focus on their priorities — the Ops team preparing containers with all needed dependencies and configurations; and the Dev team focusing on efficient coding of an application that can be easily deployed ...

September 18, 2017

Web development and web design are intertwined in such a way that there is not one without the other — not anymore at least. The following outlines 5 benefits of collaboration ...

September 14, 2017

Mastering modern software development by building a "Modern Software Factory" is at the heart of business success in the digital economy, according to the results of a survey of over 1,200 IT leaders released today by CA Technologies ...

September 13, 2017

IT-Business convergence is needed to deliver continuous change, but many of the current tools add complexity and fail to merge the two, according to the Panaya 2017 State of Functional Testing Report ...

September 11, 2017

Application Program Interfaces (API’s) represent an effective way to build and manage mobile services. By using APIs — a set of routines, protocols and tools for building software applications — application developers no longer have to buy technology software or hardware. Instead, they can simply plug into a growing open ecosystem of API-driven services. It is simple to integrate, and saves time and money for new developers ...

September 07, 2017

More than a quarter of enterprises globally have not built, customized or virtualized any mobile apps in the last 12 months, according to the latest mobile app survey by Gartner ...

September 06, 2017

The number of malware breaches (to use a generic term) are rising in near exponential numbers and, unless there are radical changes, this is set to continue unabated. Most pundits agree with this forecast ...

September 01, 2017

DevOps encourages communication and collaboration between development and operations teams. Achieving greater synergies between the Dev and Ops teams doesn't happen overnight, but it is possible to fast track the process with the right technologies in place. One such technology is IT automation ...

August 29, 2017

Newly released data shows that distributed denial of service (DDoS) and web application attacks are on the rise once again, according to the Second Quarter, 2017 State of the Internet / Security Report released by Akamai Technologies ...

Share this