Venafi Technology Network Announced
April 11, 2017

Venafi announced the Venafi Technology Network, a new program designed to connect leading certificate authorities, security technologies, DevOps platforms and cloud services with the real time key and certificate intelligence necessary to orchestrate and protect machine identities available from Venafi.

“From containers in data centers to cloud services to IoT devices, the growth of machines on enterprise networks is skyrocketing,” said Kevin Bocek, Chief Security Strategist for Venafi. “In today’s ultrafast, complex business environment it’s critical that organizations have the ability to protect machine identities at speed and scale across their entire global ecosystem. The only way to accomplish this is with a machine identity protection platform that delivers automated intelligence to every part of the enterprise technology ecosystem that needs real time information on cryptographic keys and digital certificates.”

The Venafi Technology Partner Network brings together the leading machine identity protection platform with security, application performance, DevOps, and cloud technologies allowing mutual customers to:

- Automate and secure the complete lifecycle of machine identities across global, extended, hybrid networks – from the data center, to the cloud, to IoT and mobile devices.

- Gain complete visibility into all certificates associated with any organization, including those used in short-lived, cloud, virtual and DevOps environments.

- Automate real-time response to elastic demands for keys and certificates, while retaining the agility to respond instantly to new threats and events like SHA-2 migration, certificate authority compromises and cloud service failures.

- Effectively use and maintain new technologies like short-lived certificates and Elliptic Curve Cryptography (ECC).

- Comply with National Institute of Standards and Technology (NIST) mandates and other industry regulatory requirements.

The Venafi Technology Network brings together industry leaders that issue, automate, and use keys and certificates to protect machine identities, scale the use of encryption, and make sure cyber attackers can’t hide in encrypted traffic. Venafi Adaptable Driver technology and REST APIs make integration easy and fast. The program currently includes over 1000 different integrations across industry leading certificate authorities, application servers, load balancers, cloud services, threat protection and DevOps platforms.

The Latest

June 23, 2017

Why Agile? DEVOPSdigest asked the experts for their opinions on what are the most important advantages of being Agile. Part 3 covers how Agile enables you to grow and adapt to change ...

June 21, 2017

Why Agile? DEVOPSdigest asked the experts for their opinions on what are the most important advantages of being Agile. Part 2 is all about speed ...

June 19, 2017

Earlier this year, DEVOPSdigest featured a list of expert opinions on the essential steps to become agile. Now that we have an idea on how to achieve agility, however, we have to consider why. What's the payoff? With this question in mind, DEVOPSdigest asked the experts — including analysts, consultants and vendors — for their opinions on what are the most important advantages of being Agile ...

June 15, 2017

In the development community, creating additional efficiency through improved collaboration has been prevalent for some time. But despite the head start on the rest of the corporate world when it comes to collaboration, many organizations function today as they did 15-20 years ago. Since time is money in the tech world, outdated collaboration is a huge missed opportunity ...

June 14, 2017

Given the efforts we put in these days to deconstructing monolithic applications, and using distributed microservices to make us more agile, the potential for app performance to take a nosedive because of unseen (and unanticipated) network congestion and outages is only getting greater. There is help at hand, though, in the form of new ways to program network awareness directly into your code ...

June 12, 2017

What if you discover a fatal error or an exploit in your app? What if your app is down during a crucial time? As a developer, how you react to a crisis can mean the difference between minor blip and an embarrassing or costly company blunder. Here's a crisis management plan to get things right when they go wrong ...

June 08, 2017

Recently, the results from SmartBear Software's annual survey, the State of Code Review 2017: Trends & Insights into Dev Collaboration were released. One point I found interesting is that it suggests only 66 percent of organizations can get releases out on time. Why are the other 34 percent struggling to get releases out the door? ...

June 06, 2017

Today's app development landscape is competitive and expensive. Thousands of apps are released each month, and user acquisition and retention are costing app developers millions. User abandonment is one of the main battles of every app developer — as every lost user means another wasted investment ...

June 05, 2017

Developers love using containers to build, run and ship applications in a flexible and simple way. However, the technology has received backlash for not being as secure as other (traditional) methods, such as Virtual Machines (VMs). Securing containers and securing VMs requires a completely different process. Below are four key differences between securing containers versus securing VMs ...

May 31, 2017

DevOps results in improvements in software delivery performance, according to a new first-of-its-kind study by CA Technologies to quantify the benefits for companies that combine DevOps methodologies with Cloud-based tools and delivery mechanisms ...

Share this