Venafi Solutions for the Public Sector

Venafi TrustAuthority™

Continuously Monitors All Keys and Certificates

Get the visibility and control you need to safeguard keys and certificates that should be trusted, and fix or block those that should not.

TrustAuthority discovers the configuration, location, and use of every key and certificate, so you can continuously monitor their status to identify vulnerabilities, enforce policies, and detect anomalies. With this improved enterprise-wide visibility of your keys and certificates, you can ensure that your encryption environment is fully secure and reduce the risk of certificate-related compromises and unplanned outages.

Venafi TrustForce™

Automates the Remediation of Vulnerable Keys and Certificates

Automatically replace vulnerable keys and certificates to avoid the impact of outages or vulnerabilities. TrustForce detects and reports anomalies, enforces security policies, and automatically remediates key and certificate vulnerabilities.

TrustForce uses lightweight agent and agentless technologies to automate complex activities related to your ever-changing key and certificate environment, including automatic rekeying and recertification across the enterprise. This enables you to quickly distribute new keys or fix keys or certificates that don’t meet established security policies. Also, in the event of a CA breach, you can automatically remediate thousands of keys and certificates without worrying about error-prone manual processes that are not only slow but often introduce vulnerabilities.

Venafi TrustNet™

Establish the Trustworthiness of Certificates

After establishing certificate reputation, TrustNet can increase protection by whitelisting trusted CAs and certificates, and blacklisting untrusted ones.

TrustNet integrates with other Venafi Platform components to provide alerts on forged, rogue, and maliciously used certificates found across the internet. When TrustNet detects a rogue certificate, it can immediately blacklist the certificate or the rogue CA that issued it. This allows you to take immediate action to block access to websites that are using blacklisted certificates. You can then use TrustForce to automate the replacement of these rogue certificates quickly and easily. Automation is especially useful to handle the scale of an event such as a CA compromise or new vulnerability such as Heartbleed.