Mobile machine security

Venafi Enterprise Mobility Protect delivers continuous visibility and comprehensive machine identity intelligence across all mobile devices.

  • 6 years ago Posted in
Venafi is introducing Venafi Enterprise Mobility Protect, a new solution that safeguards the machine identities used on endpoints that access enterprise networks and resources. Venafi Enterprise Mobility Protect will be available on July 2, 2018 and delivers continuous visibility and comprehensive machine identity intelligence across all authorized mobile devices, including those that are owned by employees (Bring Your Own Device or BYOD).

 

With Venafi Enterprise Mobility Protect, organizations can protect the machine identities on mobile endpoints by managing device certificates through a central certificate security platform. The Venafi Platform delivers comprehensive certificate visibility, issuance, distribution, and policy enforcement, as well as the control needed to terminate access for unauthorized users and employees. The enterprise-class machine identity protection solution for mobile devices also maximizes flexibility by supporting all industry-leading certificate authorities.

 

Key benefits of Venafi Enterprise Mobility Protect include:

  • Complete visibility and protection of machine identities across Windows, OS X, iOS and Android devices.
  • Robust, out-of-the-box integrations with leading devices and systems, including Windows and Mac OS.
  • Single kill switch for mobile devices and applications that allows security teams to terminate access from a single, central console.
  • Support for corporate-owned devices, domain-joined or not, as well as BYOD.
  • Automated certificate issuance from over 40+ certificate authorities including Microsoft, DigiCert, and Entrust.
  • Support for NAC, 802.1X, VPN and other use cases.

Endpoints on enterprise networks – such as Windows, Mac, iOS and Android devices – need access to corporate resources to keep employees connected and productive. In order to protect the communication between enterprise networks and the increasing number of mobile endpoints, organizations must provide mobile devices of all types with secure machine identities that support authentication, encryption and decryption. However, if the digital certificates that serve as machine identities for these mobile devices are issued outside of enterprise policy, are not tracked, or are left unrevoked after use, they become prime targets for cyber criminals who can compromise them and then use them to access critical enterprise systems and data. These issues can be especially problematic with employee-owned devices.

 

“As businesses embrace BYOD policies, organizations have multiple teams issuing and using machine identities for mobile devices,” said Kevin Bocek, vice president of security strategy and threat intelligence at Venafi. “Venafi makes it possible for security teams to include employee-owned and corporate owned mobile endpoints in their machine identity protection strategy. With Enterprise Mobility Protect, security teams can be confident that all machine identities used for mobile devices, laptops, desktops, VPNs, WiFi and NAC authentication are secure. This allows all machine identities for mobile devices to be protected and comply with policy throughout their entire lifecycle, regardless of who owns the device or which team issues and manages the machine identity.”

Research shows ‘game needs to be changed,’ with security innovation years behind that of the...
73% of organizations lack automated patch management, and 62% experienced incidents involving...
Quest Software has signed a definitive agreement with Clearlake Capital Group, L.P. (together with...
Dell EMC PowerProtect Cyber Recovery for AWS provides a fast, easy-to-deploy public cloud vault to...
Aqua’s cloud native application protection platform becomes the only solution that protects cloud...
54% of organisations working on a security transformation project now or in the next 12 months.
Node4 has released its Mid-Market IT Priorities Report 2021. The independent report reveals that...
Zscaler Zero Trust exchange cloud-based architecture enables superior green security capabilities...