Venafi Customer Forum
Please join Venafi & Carahsoft as we host this two-day event to learn from one another about today’s machine identity management challenges and solutions. The key takeaways you will gain from this event: Expand Your Professional Network: Connect with peers and industry experts to exchange valuable insights and strategies for navigating current and future challenges in certificate lifecycle management. Future-Proof Your Cybersecurity...
Getting Started with the Service Mesh
Join Tetrate and Venafi for a hands-on workshop focused on service mesh fundamentals and how it addresses the issues of security, observability, traffic management and high availability for microservices-based applications. Whether you are a developer, DevOps engineer, an IT or Security professional, this workshop is designed to equip you with the foundational knowledge, diving into the core concepts of service meshes including sidecars, data...
Venafi Cyber Day: Machine Identity Mana...
Why are machine identities square one for zero trust? Join Venafi and our featured speakers to round out Cybersecurity Awareness Month with an informative and interactive afternoon of sessions focused on machine identity and zero trust. During these sessions, we will explore the nuances of zero trust security and why it's unachievable without a rock-solid strategy for machine identity management. Why should you attend Venafi's Cyber Day? Venaf...
DevSecOps for Public Sector: A Roadmap...
Join Venafi's session February 1st at 12:45pm ET as part of Carahsoft's DevSecOps Geek Week. During this session Venafi's subject-matter experts will address the following topic, You’ve Deployed Kubernetes. But How Secure & Reliable is it? Cloud-native applications often rely on Kubernetes. No doubt your cloud-native teams are using the world’s leading open-source certificate manager, cert-manager to manage TLS certificates for...
Automating NPEs in Infrastructure-as-Code
Security teams must know what to trust and what not to trust at all times to effectively protect machine identities in dynamic environments. As a result, smart policy enforcement must be automated and embedded into the tools used by application development teams. By shifting machine identity processes left into the pre-production phase and hooking directly into automated DevOps workflows, security teams can regain control over X.509 certificat...
HashiCorp Vault + Venafi: Scaling in Pr...
As agencies continue to migrate to the cloud and adopt DevSecOps practices and tooling, the challenges to protect sensitive data (secrets) and ensure security policies are consistently applied and followed are tougher than ever. Together, Venafi and HashiCorp Vault make it easy for security teams to safeguard secrets and apply consistent policy while enabling development teams to consume those secrets while ensuring compliance. Join us to lear...
Software Supply Chain: Code-to-Code Combat
Is your agency doing everything it can to protect against foreign interests from hacking the software that it relies on? From third party software libraries to in-house developed applications to PowerShell scripts, code signing is a necessary component to securing your software infrastructure. Code signing is effective at ensuring that the code you execute comes from where it claims to come from and hasn’t been modified by a third party....
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.