Story image

New code-signing solution released by Venafi

30 Jul 2019

Venafi, a vendor of machine identity protection, has released Next-Gen Code Signing, a machine identity protection solution that secures code signing processes by delivering enterprise-wide visibility into all code signing operations. 

The solution provides centralised private key storage, code signing policy enforcement, and automation while reducing code signing burden on software development teams.

For decades, code signing has been used to verify the integrity of software, and nearly every organisation relies on it to confirm their code has not been corrupted with malware. 

Despite this, modern organisations often struggle to secure and protect code signing operations because they don’t have a solution that allows them to consistently enforce policies across locations, tools and processes without slowing down development teams.

“Today, every organisation is a software developer building apps, libraries, containers and other tools,” says Venafi security strategy and threat intelligence vice president Kevin Bocek.

“However, it can be very difficult to scale code signing operations. The security procedures that protect code signing are typically seen as cumbersome, and developers often ignore them. Unfortunately, this leaves security teams in the dark and it’s very advantageous for bad actors. Stolen code signing keys are powerful cyber weapons that put companies and their customers at risk. From Stuxnet to everyday malware and phishing campaigns, attacks that leverage code signing evade next-generation AV detection.”

In addition to securing enterprise code signing processes, Next-Gen Code Signing automates the management of all code signing private keys. 

Private code signing keys never leave the trusted Venafi storage platform or connected hardware security modules (HSMs). 

This new solution provides information security teams with comprehensive visibility and detailed intelligence about all aspects of code signing operations, including who signed the code and with which certificate, as well as who approved the request and when each action occurred. 

Using the intelligence gathered from code signing processes, Next-Gen Code Signing delivers compliance and audit reporting across all code signing activities.

Key benefits include:

  • Scalability that can support a few developers in one location to tens of thousands of developers distributed globally, and millions of code signing operations a week.
     
  • Automation and support for a broad range of software development processes; development teams do not need to change tools.
     
  • A central, permanent storage location for private keys so they remain protected.
     
  • Flexible, customisable policy enforcement that supports the needs of multiple software projects, including the approval of workflows, certificate types, certificate authorities, HSMs and software development tool sets.
     
  • Allows security teams to provide a code signing service that enforces policies and is transparent to developers.

“Next-Gen Code Signing lets software developers use the same code signing tools and does not require changes to their build environments,” Bocek adds.

“It provides an invisible layer of technology that keeps code signing keys safe and out of the hands of attackers. Venafi Next-Gen Code Signing gives security teams and developers an exciting way to be both fast and safe.”

Story image
27 Nov
Interview: Microsoft's Diana Kelley talks talent gaps and D&I
Kelley recently spoke at Microsoft Asia’s new Experience Center, where she talked through her experience as a security CTO, as well as IoT security, what’s ahead in 2020, and diversity and inclusion both in the cybersecurity sector, and in technology.More
Story image
29 Nov
Black Friday fraud: Who foots the bill?
“Given the incredibly high volume of transactions over the coming weekend, and indeed the whole festive period, often merchants will accept that fraud will be higher than usual."More
Story image
10 Dec
Trend Micro debuts security services platform for cloud applications
Trend Micro Cloud One automates and simplifies cloud security to give organisations the flexibility they need to meet their most strategic cloud priorities.More
Story image
14 Jan
How integrated edge security and WAF can secure application delivery
Edge security, SSO application integration and flexible authentication options are critical for optimal user experience and information security policy compliance, Kemp says.More
Story image
12 Dec
StorageCraft report suggests firms need a 'ransomware reality check'
68% of respondents have a ransomware recovery plan, yet almost a quarter (23%) don’t test those plans, and 46% test them once a year or less.More
Story image
21 Nov
Check Point signs new distributor for Aussie SMB market
"Their market share, extensive and skilled partner channel, and strong collaboration with Australia’s leading telecommunication carrier made this an easy choice for us."More