product-logo

Venafi Trust Protection Platform

See all products by this partner 

The Venafi Trust Protection Platform secures and protects digital certificates and encryption keys so they can’t be used by the bad guys to hide in encrypted traffic, spoof websites, deploy malware, and steal data. It helps to avoid costly certificate-related outages by automating the full renewal and installation lifecycle.

Request Information

Compatibility

  • down-arrow Citrix ADC
    11.0 VPX, 11.0 MPX, 10.5 VPX, 10.5 MPX, 10.1 VPX, 10.1 MPX, 10.0 VPX, 10.0 MPX, 11.1 VPX, 11.1 MPX
  • down-arrow Citrix Gateway
    11.0, 10.5, 10.1, 11.1

Product Details

The Venafi Trust Protection Platform secures and protects digital certificates and encryption keys so they can’t be used by the bad guys to hide in encrypted traffic, spoof websites, deploy malware, and steal data. It helps to avoid costly certificate-related outages by automating the full renewal and installation lifecycle.

Gain Visibility and Control Over Your Keys and Certificates
The Trust Protection Platform protects multiple types of keys and certificates from multiple CAs—whether they are installed on mobile devices, desktops, and application servers. You gain complete visibility into your key and certificate inventory. You then have what it takes to establish a baseline of normal usage, enforce security policies, and respond quickly to remediate key and certificate anomalies.

Automate Protection Across Your Extended Enterprise
The Trust Protection Platform offers open APIs and customizable drivers to integrate quickly and easily with any application and network device that across the enterprise and out to the cloud. Automating the issuance and renewal process and enforcing policies and workflows simplifies protection across your entire encryption environment.

Create an Ever-Evolving Intelligent Response
Venafi provides the Immune System for the Internet™, constantly assessing which keys and certificates are trusted, protecting those that should be trusted, and fixing or blocking those that are not. The platform gives you the visibility, threat intelligence, and policy enforcement you need to block compromises as well as preventing certificate-related outages.

Improve Your Threat Intelligence
Control all of your keys and certificates so that you can easily identify any security gaps that you need to close. You can then discover keys that use weak encryption and uncover rogue keys that an attacker may be using to disguise malicious actions on your network.

Reduce Your Organizational Risk
Increase your visibility into key and certificate inventories so you can reduce attack surfaces. You can then reduce risk by regaining control over certificates used for privileged access. Plus, you can enforce policies to ensure that all keys and certificates comply with your secure standards.

Rapidly Recover from a Compromise
Limit your exposure to a breach by responding quickly with fully automated process for key rotation and configuration restoration. By monitoring authorized key files in real time, you can automatically remediate any unauthorized configuration changes.

Streamline Your Compliance and Audits
Easily comply with standards like PCI-DSS, GLBA, SOX, HIPAA, by applying secure key management processes, strict separation of duties, and dual control policies. You can also log and report on all key and certificate events.

Coordinate Security for All Keys and Certificates
The Trust Protection Platform enables enterprises to automate the protection and management of all the keys and certificates efficiently and effectively with a single solution to meet compliance requirements and audit-readiness. The Trust Protection Platform gives you the visibility and control of Venafi TrustAuthority™, the automated remediation of Venafi TrustForce™,and the global certificate reputation of Venafi TrustNet™

Features

  • Identify all keys, certificates, CAs and trust stores
  • Continuously monitor keys and certificates for anomalies
  • Rapidly replace compromised keys and certificates
  • Enforce key and certificate policies to maintain security
  • Automate certificate requests and renewals