sb-as logo
Story image

Venafi announces new enterprise endpoint management solution

04 Jul 2018

Machine identity protection provider Venafi has announced the debut of Venafi Enterprise Mobility Protect, a new solution that safeguards the machine identities used on endpoints that access enterprise networks and resources.

Venafi Enterprise Mobility Protect is now available and delivers continuous visibility and comprehensive machine identity intelligence across all authorised mobile devices, including those that are owned by employees (Bring Your Own Device or BYOD).

With Venafi Enterprise Mobility Protect, organisations can protect the machine identities on mobile endpoints by managing device certificates through a central certificate security platform.

The Venafi Platform delivers certificate visibility, issuance, distribution, and policy enforcement, as well as the control needed to terminate access for unauthorised users and employees.

“As businesses embrace BYOD policies, organisations have multiple teams issuing and using machine identities for mobile devices,” says Venafi security strategy and threat intelligence vice president Kevin Bocek.

The enterprise-class machine identity protection solution for mobile devices increases flexibility by supporting all industry-leading certificate authorities.

Endpoints on enterprise networks – such as Windows, Mac, iOS and Android devices – need access to corporate resources to keep employees connected and productive.

In order to protect the communication between enterprise networks and the increasing number of mobile endpoints, organisations must provide mobile devices of all types with secure machine identities that support authentication, encryption and decryption.

However, if the digital certificates that serve as machine identities for these mobile devices are issued outside of enterprise policy, are not tracked, or are left unrevoked after use, they become prime targets for cybercriminals who can compromise them and then use them to access critical enterprise systems and data.

These issues can be especially problematic with employee-owned devices.

“Venafi makes it possible for security teams to include employee-owned and corporate-owned mobile endpoints in their machine identity protection strategy,” Bocek says.

“This allows all machine identities for mobile devices to be protected and comply with policy throughout their entire lifecycle, regardless of who owns the device or which team issues and manages the machine identity.”

Features of Venafi Enterprise Mobility Protect include:

  • Visibility and protection of machine identities across Windows, OS X, iOS and Android devices.
  • Out-of-the-box integrations with leading devices and systems, including Windows and Mac OS.
  • Single kill switch for mobile devices and applications that allows security teams to terminate access from a single, central console.
  • Support for corporate-owned devices, domain-joined or not, as well as BYOD.
  • Automated certificate issuance from over 40+ certificate authorities including Microsoft, DigiCert, and Entrust.
  • Support for NAC, 802.1X, VPN and other use cases
Story image
Average person has 100 passwords - study
The average user has about 25% more passwords compared to earlier this year.More
Link image
How to head off a rise in DDoS attacks
Many businesses invest in costly DDoS mitigation and protection solutions, but few test them. NCC Group tests all environments and is one of only two AWS DDoS Test Partners. Claim 10% off your next DDoS service today.More
Story image
CrowdStrike targets Zero Trust blind spot with new offering
CrowdStrike has officially launched CrowdStrike Falcon Zero Trust Assessment (ZTA), designed to aid in overall security posture by delivering continuous real-time assessments across all endpoints in an organisation regardless of the location, network or user. More
Story image
Microsoft is most imitated brand for phishing attacks in Q3
Popular phishing tactics using the Microsoft brand used email campaigns to steal credentials of Microsoft accounts, luring victims to click on malicious links which redirect them to a fraudulent Microsoft login page. More
Story image
Why best-practice threat data management provides confident automation
Understanding an organisation’s threat landscape requires having both the right threat data sources and the proper prioritisation to derive actionable threat intelligence for your organisation. More
Story image
Financial institutions in APAC region to invest millions in fraud prevention
"The pandemic is creating a lot of uncertainty, but the majority of FIs in APAC recognise that an end to end fraud management platform is strategic to differentiating themselves from the highly disruptive landscape they are playing in."More