Welcome!

News Feed Item

Venafi Announces Adaptable Application Driver for Trust Protection Platform

Venafi®, the leading provider of protection for cryptographic keys and digital certificates, today announced a new Adaptable Application Driver in the latest release of the Venafi Trust Protection Platform™. The Adaptable Application Driver dramatically simplifies the integration of the Venafi platform with any certificate-dependent, third-party application. This integration allows organizations to automate key and certificate provisioning and lifecycle management across their entire security technology environment. It enables users, partners, or system integrators to easily integrate the Venafi Trust Protection Platform with minimal programming expertise.

“The addition of this functionality means that we are the only solution that can provide turnkey orchestration of keys and certificates across the extended enterprise,” said Hari Nair, director of product management for the Venafi Trust Protection Platform. “Many organizations currently use manual processes to provision keys and certificates that are both error prone and time intensive. Our new solution makes real-time certificate provisioning and intelligence available to every enterprise device or application. Automating certificate provisioning and the lifecycle for certificate-dependent applications as well as integrating crucial, real-time intelligence with other security applications, dramatically improves an organization’s overall security posture and makes it much more difficult for cyber criminals to hide in encrypted traffic.”

The new Adaptable Application Driver allows the Venafi partner ecosystem to integrate Venafi certificate intelligence into a wide range of solutions. The Adaptable Application Driver has been leveraged by several Venafi partners across a variety of applications.

Venafi partner quotes:

"Integration between Avi and Venafi was fast and straightforward. The integration enables our mutual customers to take advantage of secure key and certificate lifecycle automation. Our customers can now securely scale the use of modern encryption to protect customer privacy and data across applications everywhere."

Edward Sharp, vice president of strategy, Avi Networks

“By integrating the Venafi Trust Protection Platform with the Brocade vADC solution customers have the opportunity to automate the creation and management of certificates. Streamlining this workflow enables customers to be more agile, making it much easier to deploy and maintain applications.”

Michael Bushong, vice president product management, software networking for Brocade

“We are excited to take Radware’s certification management automation to the next level, through the integration with Venafi certificate automation system, allowing Alteon to be part of a complete SSL/TLS certificate management ecosystem.”

Tamir Ron, vice president of products for Radware

In addition to the Adaptable Application Driver, the most recent version of the Venafi Trust Protection Platform includes a range of new enhancements:

  • Support for Public Key Cryptography Standards 12 (PKCS 12) and IBM Global Security Kit (GSKit) key store formats.
  • Support for the Venafi agent on RedHat Enterprise Linux7 and CentOS 7.
  • Improved certificate validation that increases certificate inventory accuracy and broadens support of dynamic cloud and DevOps environments.
  • SSH key automation and scalability enhancements that simplify protection and management of large-scale SSH deployments.

For more information about the Venafi Trust Protection Platform please visit, https://www.venafi.com/platform.

About Venafi

Venafi is the market-leading cybersecurity company that secures and protects the cryptographic keys and digital certificates every business and government depends on for secure communications, commerce, computing, and mobility. Venafi provides the Immune System for the Internet®, constantly assessing which keys and certificates are trusted, protecting those that should be trusted, and fixing or blocking those that are not. By protecting the foundation of all cybersecurity—keys and certificates—Venafi prevents them from being misused by cyber criminals. The Venafi Trust Protection Platform delivers an ever-evolving, intelligent response that protects your network, business, and brand.

Venafi customers are among the world's most demanding, security-conscious Global 2000 organizations, including four of the top five U.S. banks, eight of the top U.S. 10 health insurance companies and four of the top seven U.S. retailers. Venafi is backed by top-tier venture capital funds, including Foundation Capital, Intel Capital, Origin Partners, Pelion Venture Partners, QuestMark Partner and Silver Lake Partners. For more information, visit www.venafi.com.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
"We build IoT infrastructure products - when you have to integrate different devices, different systems and cloud you have to build an application to do that but we eliminate the need to build an application. Our products can integrate any device, any system, any cloud regardless of protocol," explained Peter Jung, Chief Product Officer at Pulzze Systems, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Keeping pace with advancements in software delivery processes and tooling is taxing even for the most proficient organizations. Point tools, platforms, open source and the increasing adoption of private and public cloud services requires strong engineering rigor – all in the face of developer demands to use the tools of choice. As Agile has settled in as a mainstream practice, now DevOps has emerged as the next wave to improve software delivery speed and output. To make DevOps work, organization...
Get deep visibility into the performance of your databases and expert advice for performance optimization and tuning. You can't get application performance without database performance. Give everyone on the team a comprehensive view of how every aspect of the system affects performance across SQL database operations, host server and OS, virtualization resources and storage I/O. Quickly find bottlenecks and troubleshoot complex problems.
Internet of @ThingsExpo has announced today that Chris Matthieu has been named tech chair of Internet of @ThingsExpo 2017 New York The 7th Internet of @ThingsExpo will take place on June 6-8, 2017, at the Javits Center in New York City, New York. Chris Matthieu is the co-founder and CTO of Octoblu, a revolutionary real-time IoT platform recently acquired by Citrix. Octoblu connects things, systems, people and clouds to a global mesh network allowing users to automate and control design flo...
"We are an all-flash array storage provider but our focus has been on VM-aware storage specifically for virtualized applications," stated Dhiraj Sehgal of Tintri in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
With 15% of enterprises adopting a hybrid IT strategy, you need to set a plan to integrate hybrid cloud throughout your infrastructure. In his session at 18th Cloud Expo, Steven Dreher, Director of Solutions Architecture at Green House Data, discussed how to plan for shifting resource requirements, overcome challenges, and implement hybrid IT alongside your existing data center assets. Highlights included anticipating workload, cost and resource calculations, integrating services on both sides...
Unless your company can spend a lot of money on new technology, re-engineering your environment and hiring a comprehensive cybersecurity team, you will most likely move to the cloud or seek external service partnerships. In his session at 18th Cloud Expo, Darren Guccione, CEO of Keeper Security, revealed what you need to know when it comes to encryption in the cloud.
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
"We are the public cloud providers. We are currently providing 50% of the resources they need for doing e-commerce business in China and we are hosting about 60% of mobile gaming in China," explained Yi Zheng, CPO and VP of Engineering at CDS Global Cloud, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
The WebRTC Summit New York, to be held June 6-8, 2017, at the Javits Center in New York City, NY, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 20th International Cloud Expo and @ThingsExpo. WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web co...
Between 2005 and 2020, data volumes will grow by a factor of 300 – enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘big data’ phenomenon. Unfortunately, traditional approaches to handling, storing and analyzing data aren’t adequate at this scale: they’re too costly, slow and physically cumbersome to keep up. Fortunately, in response a new breed of technology has emerged that is cheaper, faster and more scalable. Yet, in meeting these new needs they...
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...