Overview

Venafi is the Immune System for the Internet™ that protects the foundation of all cybersecurity—cryptographic keys and digital certificates—so they can’t be misused by bad guys in attacks. Venafi does this by constantly assessing which keys and certificates are trusted, protecting those that should be trusted, and fixing or blocking those that are not. As the market leader in key and certificate management and security, Venafi protects against the misuse of SSL/TLS keys and certificates, SSH keys, and WiFi, VPN, and mobile certificates, eliminating security blind spots from threats hidden in encrypted traffic. Venafi customers include the world’s leading Global 5000 companies.

Products

Venafi TrustAuthority™

Continuously Monitors All Keys and Certificates

Get the visibility and control you need to safeguard keys and certificates that should be trusted, and fix or block those that should not.

TrustAuthority discovers the configuration, location, and use of every key and certificate, so you can continuously monitor their status to identify vulnerabilities, enforce policies, and detect anomalies. With this improved enterprise-wide visibility of your keys and certificates, you can ensure that your encryption environment is fully secure and reduce the risk of certificate-related compromises and unplanned outages.

Venafi TrustForce™

Automates the Remediation of Vulnerable Keys and Certificates

Automatically replace vulnerable keys and certificates to avoid the impact of outages or vulnerabilities. TrustForce detects and reports anomalies, enforces security policies, and automatically remediates key and certificate vulnerabilities.

TrustForce uses lightweight agent and agentless technologies to automate complex activities related to your ever-changing key and certificate environment, including automatic rekeying and recertification across the enterprise. This enables you to quickly distribute new keys or fix keys or certificates that don’t meet established security policies. Also, in the event of a CA breach, you can automatically remediate thousands of keys and certificates without worrying about error-prone manual processes that are not only slow but often introduce vulnerabilities.

Venafi TrustNet™

Establish the Trustworthiness of Certificates

After establishing certificate reputation, TrustNet can increase protection by whitelisting trusted CAs and certificates, and blacklisting untrusted ones.

TrustNet integrates with other Venafi Platform components to provide alerts on forged, rogue, and maliciously used certificates found across the internet. When TrustNet detects a rogue certificate, it can immediately blacklist the certificate or the rogue CA that issued it. This allows you to take immediate action to block access to websites that are using blacklisted certificates. You can then use TrustForce to automate the replacement of these rogue certificates quickly and easily. Automation is especially useful to handle the scale of an event such as a CA compromise or new vulnerability such as Heartbleed.

Contracts

GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- June 17, 2017


SEWP Contracts

SEWP V

Contract Number: Group A Small: NNG15SC03B Group D Other Than Small: NNG15SC27B Term: May 1, 2015 - April 30, 2020


State & Local Contracts

City of Seattle Contract

Contract #0000003265 Term: June 17, 2017

CMAS

Contract # CMAS 3-12-70-2247E Term: through September 30, 2017

Fairfax County IT Hardware, Software, & Services

Virginia- Fairfax County CONTRACT EXPIRATION: October 4, 2020 (with 5 option years)

Florida - Palm Beach County

Through April 30, 2019

National Intergovernmental Purchasing Alliance (National IPA)

Term: through May 31, 2018 (with 2 option renewal years)

Ohio State Contract- 534354

Contract # 534354 Term: June 17, 2017

Orange County National IPA Co-Op

Through May 31, 2020 (with 2 option years)

VASCUPP

Contract Number: UVA1482501 Contract Term: May 2, 2014– June 17, 2017


Events

Archived Events

Resources

Automate the installation and remediation of keys and certificates.

A single source for protecting against attacks using keys and certificates.

Why cyber defenses should be modeled on the human immune system.

No other solutions fit our requirements, so Venafi was the top choice.

Prevent certificate misuse with global reputation intelligence.

Better understand the scope of your current key and certificate status.

Streamline security operations while securing confidential data.

Why SSL/TLS certificates and encryption keys are the foundation of security.

Get a SANS analyst's perspective on securing SSH keys.

Discover why agentless discovery can’t find all keys and certificates.