Microsoft Outlook Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Saturday, 12 February 2011

Venafi launches 1st universal automated management of all key certificates & keys

Posted on 05:08 by Unknown

Venafi Announces Director 6, First Platform to Automate Management of Widest Range of Encryption Key and Certificate Technologies Across the Enterprise

Venafi Encryption Director 6 Platform Allows Global 2000 Enterprises to Eliminate Unquantified and Unmanaged Risk, Improves Security and Compliance, and Increases System Availability

London – February 9, 2011 – Venafi, the inventor of and market leader in Enterprise Key and Certificate Management (EKCM) solutions, today unveiled Venafi Encryption Director 6™ (Director 6). Director 6 provides out-of-the box automated management capabilities for the widest range of digital certificate and encryption key technologies used by today’s enterprises, including symmetric keys, SSH keys, asymmetric keys and digital certificates. Recognized by Gartner as a “Cool Vendor,”  Venafi provides the only platform that allows organizations to automate discovery, monitoring, validation, management and security of the most commonly used encryption assets. Designed specifically for the enterprise, Director 6 provides interoperability across heterogeneous environments, rapid scalability, and orchestration capabilities that improve security and compliance and increase critical system uptime. In addition to the already-available Certificate Manager™ product, the SSH Key Manager™ and Symmetric Key Manager™ products are being added to the Director 6 platform as separate offerings.

With over eight years experience delivering best-of-breed encryption management solutions to the world’s largest organizations in financial services, insurance, high tech, telecommunications, aerospace, healthcare, retail and other industries, Venafi delivers a true enterprise platform with management functionality that spans organizations’ diverse infrastructures, independent of the managed encryption asset or the complexity and size of the environment. Director 6 is a third-generation architecture that enables easy-to-deploy interoperability, scalability and orchestration across multiple encryption types, operating environments, certificate authorities (CAs), HSMs, applications, directories and other enterprise systems.

“Security, privacy and compliance are driving organizations to deploy encryption technologies at an almost hyper-aggressive pace. Unfortunately, encryption assets can turn into liabilities if managed improperly. One expired certificate can shut down critical systems, and one compromised key can open the gates to sensitive information and compliance violations,” said Richard Stiennon, noted author, speaker and principal analyst at IT Harvest. “Security and compliance initiatives are only going to be as effective as the people managing them, and those managers need to be equipped with powerful tools that allow them to do their jobs. Organizations that rely on encryption keys and digital certificates need to deploy solutions that will allow them to retain control over the thousands of keys and certificates deployed.”

“Venafi is recognized by our customers as the only security vendor that can fully automate EKCM processes and scale to their requirements,” said Jeff Hudson, CEO of Venafi. “Our innovative technology platform gives organizations the ability to solve the rapidly expanding encryption key and certificate security management problem, which has been highlighted by recent sophisticated attacks and breaches like the WikiLeaks and Stuxnet incidents. In addition, we enable our customers to achieve compliance with new regulations and standards. Recent studies show that key and certificate inventories are growing every year by more than 70 percent, and that 85 percent of those organizations surveyed admit to inadequate management of these critical security assets. Director 6 provides advanced management, access control and automation capabilities that significantly reduce the unquantified and unmanaged risk.”

Venafi Encryption Director 6 includes the following:

· SSH Key Manager™

· Certificate Manager™

· Symmetric Key Manager™

· Agent-based Onboard Discovery and Monitoring

· Advanced Management Partitioning across Firewall Boundaries

· Enhanced Operational Network Validation and Alerting

· Expanded Analysis and Reporting of Consolidated Key and Certificate Management Logs

· Actionable Key and Certificate Management Dashboard

Customers to speak at RSA Conference

During RSA Conference 2011, Monday, Feb. 14 through Thursday, Feb. 18, Venafi will be providing on-demand demonstrations of Director 6 in its booth (# 1843) during exhibition hours. Register to attend the RSA Conference case-study session where two Venafi customers—a Fortune 250 financial services payment-processing company and a Fortune 100 high-tech products and services company—will share their experiences in managing encryption keys and certificates across their large enterprise environments. For a free exhibition floor pass, visit the RSA Conference 2011 website and use code EC11VNF.

Product Availability

Venafi Encryption Director 6, with available products Symmetric Key Manager™, Certificate Manager™ and SSH Key Manager™, will ship in the second quarter of 2011. For more information on Director 6 visit www.venafi.com/Director6.

Venafi is the inventor of and market leader in Enterprise Key and Certificate Management (EKCM) solutions. Venafi delivered the first enterprise-class platform to automate the provisioning, discovery, monitoring and management of digital certificates and encryption keys—from the desktop to the datacenter—built specifically for encryption management interoperability across heterogeneous environments. Venafi products reduce the unquantified and unmanaged risks associated with encryption deployments that result in data breaches, security audit failures and unplanned system outages. Venafi customers include the world's most prestigious Global 2000 organizations in financial services, insurance, high tech, telecommunications, aerospace, healthcare and retail. Venafi is backed by top-tier venture capital funds, including Foundation Capital, Pelion Venture Partners and Origin Partners. For more information, visit www.venafi.com.

Source: Eskenzi PR

This press release is presented without editing for your information only.

Full Disclosure Statement: The ICT REVIEW received no compensation for any component of this article.

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • DDoS-Attacks disable many shopping websites, including Amazon
    Just in time for last minute Christmas shopping major shopping sites disabled by Michael Smith (Veshengro) London, December 26, 2009: An...
  • Open Source Software in Business & Government
    by Michael Smith (Veshengro) Lots of Open Source in use in mainland Europe, including EU member states, very little in the UK and less still...
  • Cyber-Ark Expands RSA Secured Partner Program Certification Status
    Cyber-Ark Privileged Identity Management Suite, Inter-Business Vault and Sensitive Document Vault Now Formally Interoperable with RSA enVisi...
  • Infosecurity Adviser applauds forensics lab training facilities at key UK university
    London, UK. May 2009: Infosecurity Adviser, Infosecurity Europe’s online community for the information security industry, has published a r...
  • Scientific company discusses simultaneously protecting applications and data
    Simultaneously protecting applications and data: The next evolution in security? September 2009 (Eskenzi PR) – In a recent Imperva podcast...
  • TUFIN TECHNOLOGIES WINS the PRESTIGIOUS 2010 Computing Security Award for ‘Best bench tested solution of the Year’
    Network Computing and Computing Security Magazine Editors Select Tufin’s SecureChange Workflow as the Top Product Reviewed in 2010 Londo...
  • Brocade Service Could Help Reduce Billions in Data Centre Operations Costs
    New Energy Efficiency Review provides holistic assessment and remedial strategies to help companies optimise efficiency and reduce costs Ene...
  • Infosecurity Europe 2011 Hall of Fame nominations now open
    London UK, February  2011 – The time is ripe to elevate the greatest movers and shakers in the world of information security as nominations ...
  • Tufin survey reveals the truth about fudging audits, IT cost cutting and buying equipment online
    Ramat Gan, Israel – May 27, 2009 – Tufin Technologies today announced the results of its “Reality Bytes” security survey. The survey parti...
  • ISACA’s EuroCACS Conference Demystifies the Cloud
    Event for IT Professionals Will Take Place 20-23 March, Manchester London, England, (8 th March 2011)— Global business and information ...

Categories

  • ASUS
  • AVG Link Scanner
  • BeCrypt
  • book review
  • Brocade
  • Codenomicon
  • Columbian USB stick loss
  • computer recycling
  • Conficker worm
  • Credant Technologies
  • cyber crime
  • Cyber-Ark
  • Cyber-Ark®
  • Data Center
  • data encryption
  • DeviceLock
  • Digital Pathways
  • diskGenie
  • Eclypt
  • Eee PC
  • Eee PC Seashell 1008HA
  • F5 Networks
  • Facebook
  • Finjan
  • Finjan Inc.
  • Finjan MCRC
  • Firewall Management
  • Fortify
  • Fortify 360
  • Fortify Software
  • Fortify® Software
  • gadgets
  • Google
  • Google Chrome
  • green computing
  • green IT
  • IBM
  • Infosec
  • Infosec Europe 2009
  • Infosecurity Adviser
  • Infosecurity Europe
  • Infosecurity Europe 2009
  • Internet privacy
  • iStorage
  • iStorage diskGenie
  • iStorage Ltd.
  • Juniper Networks
  • Lakeland
  • Lapdesk
  • LLC
  • Logitech
  • malware
  • ManageEngine
  • McAfee International Ltd
  • MI6
  • MI6 data loss
  • Microsoft
  • MiFi™ 2352
  • Mio
  • Mobile Broadband
  • MS Office
  • National Cybersecurity Advisor
  • Navman
  • Navman Spirit
  • Netac
  • Novatel
  • Novatel Wireless Intelligent Mobile Hotspot 2352
  • OneClick IntelliPanel Desktop
  • online social media
  • open source
  • OpenOffice.org
  • Optenet
  • Origin Data Locker
  • Origin Storage
  • PNDs
  • product review
  • Red
  • SaaS
  • Sat Nav
  • saving energy
  • Security
  • Shavlik Technologies
  • SIS
  • spam
  • Stonewood Group
  • Storage Area Networks
  • Storage Expo
  • Storage Expo 2009
  • Sun Microsystems
  • Swine Flu
  • Syphan Technologies
  • Throwing Sheep in the Boardroom
  • Tufin Technologies
  • Twitter
  • U256
  • Unisys Security Index
  • USB drives
  • Vektor
  • VisionRacer
  • VisionRacer VR3
  • VMware
  • Weast
  • Web Apps Security
  • WebFilter PC Solution
  • WebSpy
  • XSS-driven attacks

Blog Archive

  • ►  2012 (1)
    • ►  January (1)
  • ▼  2011 (67)
    • ►  December (1)
    • ►  April (1)
    • ►  March (14)
    • ▼  February (30)
      • Security Concerns over Cloud Storage
      • Lieberman Software warns on new hacking trend of m...
      • 95% of parents found children accessing internet p...
      • Parallels to leverage Scality RING technology in i...
      • Connectria selects Scality to launch a public clou...
      • Flash disk security is very different to magnetic ...
      • New Financial Trojan OddJob Keeps Online Banking S...
      • US worries over Internet `kill switch' highlights ...
      • CREDANT TECHNOLOGIES LAUNCHES BETA PROGRAM FOR CLO...
      • Beware the Enemy Within
      • Infosecurity Europe welcomes plans for rapid taked...
      • ISACA’s EuroCACS Examines Data Protection, Cloud C...
      • Imperva warns on the real insider security threat
      • Tufin unveils new functionality & updated PCI DSS ...
      • Trusteer Secure Web Access prevents attacks that e...
      • Venafi launches 1st universal automated management...
      • Safer Internet Day - The role of Security within S...
      • `What are the banks not telling us about card frau...
      • DES Offers Free Encryption
      • Tufin introduces next generation firewall manageme...
      • Infosecurity Europe 2011 Hall of Fame nominations ...
      • Huddersfield NHS laptop loss highlights need to pr...
      • Innovative software solutions to reduce business e...
      • Talk of Intel developing IT security game-changer ...
      • SOURCEFIRE’S IMMUNET ANTI-MALWARE SOLUTION DELIVERS
      • Lieberman Software and Q1 Labs Partner to stop ins...
      • Data governance and leaks drives Varonis growth
      • ISACA report emphasizes governance's central role ...
      • WikiLeaks DDoS arrests welcomed by Infosecurity Eu...
      • KOBIL mIDentity secures e-Banking of the BBVA (Sui...
    • ►  January (21)
  • ►  2010 (192)
    • ►  December (20)
    • ►  November (22)
    • ►  October (19)
    • ►  September (5)
    • ►  August (8)
    • ►  July (5)
    • ►  June (22)
    • ►  May (13)
    • ►  April (11)
    • ►  March (13)
    • ►  February (27)
    • ►  January (27)
  • ►  2009 (240)
    • ►  December (25)
    • ►  November (9)
    • ►  October (21)
    • ►  September (19)
    • ►  August (30)
    • ►  July (35)
    • ►  June (30)
    • ►  May (21)
    • ►  April (42)
    • ►  March (8)
Powered by Blogger.

About Me

Unknown
View my complete profile