Story image

Venafi announces new enterprise endpoint management solution

04 Jul 2018

Machine identity protection provider Venafi has announced the debut of Venafi Enterprise Mobility Protect, a new solution that safeguards the machine identities used on endpoints that access enterprise networks and resources.

Venafi Enterprise Mobility Protect is now available and delivers continuous visibility and comprehensive machine identity intelligence across all authorised mobile devices, including those that are owned by employees (Bring Your Own Device or BYOD).

With Venafi Enterprise Mobility Protect, organisations can protect the machine identities on mobile endpoints by managing device certificates through a central certificate security platform.

The Venafi Platform delivers certificate visibility, issuance, distribution, and policy enforcement, as well as the control needed to terminate access for unauthorised users and employees.

“As businesses embrace BYOD policies, organisations have multiple teams issuing and using machine identities for mobile devices,” says Venafi security strategy and threat intelligence vice president Kevin Bocek.

The enterprise-class machine identity protection solution for mobile devices increases flexibility by supporting all industry-leading certificate authorities.

Endpoints on enterprise networks – such as Windows, Mac, iOS and Android devices – need access to corporate resources to keep employees connected and productive.

In order to protect the communication between enterprise networks and the increasing number of mobile endpoints, organisations must provide mobile devices of all types with secure machine identities that support authentication, encryption and decryption.

However, if the digital certificates that serve as machine identities for these mobile devices are issued outside of enterprise policy, are not tracked, or are left unrevoked after use, they become prime targets for cybercriminals who can compromise them and then use them to access critical enterprise systems and data.

These issues can be especially problematic with employee-owned devices.

“Venafi makes it possible for security teams to include employee-owned and corporate-owned mobile endpoints in their machine identity protection strategy,” Bocek says.

“This allows all machine identities for mobile devices to be protected and comply with policy throughout their entire lifecycle, regardless of who owns the device or which team issues and manages the machine identity.”

Features of Venafi Enterprise Mobility Protect include:

  • Visibility and protection of machine identities across Windows, OS X, iOS and Android devices.
  • Out-of-the-box integrations with leading devices and systems, including Windows and Mac OS.
  • Single kill switch for mobile devices and applications that allows security teams to terminate access from a single, central console.
  • Support for corporate-owned devices, domain-joined or not, as well as BYOD.
  • Automated certificate issuance from over 40+ certificate authorities including Microsoft, DigiCert, and Entrust.
  • Support for NAC, 802.1X, VPN and other use cases
Container survey shows adoption accelerating while security concerns remain top of mind
The report features insights from over 500 IT professionals.
Google 'will do better' after G Suite passwords exposed since 2005
Fourteen years is a long time for sensitive information like usernames and passwords to be sitting ducks, unencrypted and at risk of theft and corruption.
Hackbusters! Reviewing 90 days of cybersecurity incident response cases
While there are occasionally very advanced new threats, these are massively outnumbered by common-or-garden email fraud, ransomware attacks and well-worn old exploits.
SEGA turns to Palo Alto Networks for cybersecurity protection
When one of the world’s largest video game pioneers wanted to strengthen its IT defences against cyber threats, it started with firewalls and real-time threat intelligence from Palo Alto Networks.
Forrester names Trend Micro Leader in email security
TrendMicro earned the highest score for technology leadership, deployment options and cloud integration.
LogRhythm releases cloud-based SIEM solution
LogRhythm Cloud provides the same feature set and user experience as its on-prem experience.
One Identity named Leader in PAM and IAM by KuppingerCole
KuppingerCole lead analyst Anmol Singh evaluated the strengths and weaknesses of 20 solution providers in the PAM market for the report.
Healthcare environments difficult to secure - Forescout
The convergence of IT, Internet of Things (IoT) and operational technology (OT) makes it more difficult for the healthcare industry to manage a wide array of hard-to-control network security risks.