Secure Shell

Futurex and Venafi Partner to Expand Machine Identity Protection

Retrieved on: 
Tuesday, June 9, 2020

This integration enables enterprises to expand Machine Identity Protection with secure key generation and storage and integrated private PKI with FIPS 140-2 Level 3-validated HSMs to guard against key compromise, reduce fraud risk, and protect against insider attacks.

Key Points: 
  • This integration enables enterprises to expand Machine Identity Protection with secure key generation and storage and integrated private PKI with FIPS 140-2 Level 3-validated HSMs to guard against key compromise, reduce fraud risk, and protect against insider attacks.
  • Venafi Trust Protection Platform provides the visibility, intelligence, and automation security teams need to protect TLS, SSH, and code signing machine identities across the enterprise and cloud.
  • "With attacks on the rise targeting encryption keys, organizations using Venafi's machine identity protection solutions increasingly need added mission-critical security protection provided by FuturexHSMs," said Ryan Smith, vice president of global business development at Futurex.
  • "The integration of Futurex with the Venafi Trust Protection Platform is an exciting development that our mutual customers have asked for," said Kevin Bocek, VP, Ecosystem and Threat Intelligence of Venafi.

Venafi to Acquire Jetstack to Accelerate and Secure Digital Transformation

Retrieved on: 
Thursday, May 14, 2020

This acquisition is an industry first that will transform the way modern applications required by digital transformation are secured.

Key Points: 
  • This acquisition is an industry first that will transform the way modern applications required by digital transformation are secured.
  • In the race to virtualize everything, businesses need faster application innovation and better security; both are mandatory, said Jeff Hudson, CEO of Venafi.
  • By joining Venafi, Jetstack will give our customers a chance to build fast while acting securely.
  • Venafi protects machine identity types by orchestrating cryptographic keys and digital certificates for SSL/TLS, IoT, code signing, mobile and SSH.

Scorpio Bulkers Inc. Announces Purchase of Common Shares by Scorpio Services Holding Limited

Retrieved on: 
Monday, May 11, 2020

MONACO, May 11, 2020 (GLOBE NEWSWIRE) -- Scorpio Bulkers, Inc. (NYSE: SALT) (the Company) announced today that Scorpio Services Holding Limited (SSH), a related party, has purchased 50,000 common shares of the Company at an average price of $17.15 per share in the open market.

Key Points: 
  • MONACO, May 11, 2020 (GLOBE NEWSWIRE) -- Scorpio Bulkers, Inc. (NYSE: SALT) (the Company) announced today that Scorpio Services Holding Limited (SSH), a related party, has purchased 50,000 common shares of the Company at an average price of $17.15 per share in the open market.
  • The Company currently has 7,247,580 common shares outstanding, of which the Scorpio Group of companies, including SSH owns 1,447,751 or 19.98%.
  • Scorpio Bulkers Inc. is a provider of marine transportation of dry bulk commodities.
  • Please see our filings with the Securities and Exchange Commission for a more complete discussion of these and other risks and uncertainties.

ZeroNorth Appoints Chris Riley as Senior Vice President of Sales

Retrieved on: 
Wednesday, May 6, 2020

ZeroNorth , the industrys first provider of risk-based vulnerability orchestration across applications and infrastructure, today announced the addition of Chris Riley as senior vice president of sales.

Key Points: 
  • ZeroNorth , the industrys first provider of risk-based vulnerability orchestration across applications and infrastructure, today announced the addition of Chris Riley as senior vice president of sales.
  • In his new role, reporting to CEO John Worrall, Riley will be responsible for leading strategic sales initiatives, including channel programs.
  • Riley comes to ZeroNorth with more than 25 years of sales, professional services and operational leadership experience.
  • Prior to Mimecast, Riley was senior VP sales and president of SSH Communications Security, North America.

Venafi Media Alert: Multiple Malware Campaigns Demonstrate How Cybercriminals Exploit SSH Keys

Retrieved on: 
Thursday, April 23, 2020

SSH machine identities, also known as SSH keys, control workloads running in cloud computing environments, data center operations, critical infrastructure, VPN connections and more.

Key Points: 
  • SSH machine identities, also known as SSH keys, control workloads running in cloud computing environments, data center operations, critical infrastructure, VPN connections and more.
  • According to Yana Blachman, threat intelligence specialist for machine identity protection leader Venafi , SSH keys are valuable targets for attackers, and malware campaigns equipped with the capability to exploit SSH keys are becoming commoditized.
  • Security researchers at Venafi routinely examine samples of high-profile malware campaigns to detect how SSH capabilities are being utilized.
  • In most cases, the malware added an attackers SSH key to a list of authorized keys in a file on a target machine.

Venafi Media Alert: The Five Key Trends Driving the Machine Identity Crisis

Retrieved on: 
Tuesday, February 25, 2020

Secure, reliable authentication is essential to protect machine-to-machine communication, yet protecting every machine identity across an enterprise can be a challenge.

Key Points: 
  • Secure, reliable authentication is essential to protect machine-to-machine communication, yet protecting every machine identity across an enterprise can be a challenge.
  • As a result, organizations need a technical solution designed to help them protect the barrage of new DevOps machine identities.
  • Venafi is the cybersecurity market leader and inventor of machine identity protection, securing machine-to-machine connections and communications.
  • Venafi protects machine identity types by orchestrating cryptographic keys and digital certificates for SSL/TLS, IoT, code signing, mobile and SSH.

Venafi to Exhibit at RSA Conference 2020

Retrieved on: 
Monday, February 24, 2020

Venafi protects machine identity types by orchestrating cryptographic keys and digital certificates for SSL/TLS, IoT, code signing, mobile and SSH.

Key Points: 
  • Venafi protects machine identity types by orchestrating cryptographic keys and digital certificates for SSL/TLS, IoT, code signing, mobile and SSH.
  • Venafi provides global visibility of machine identities and the risks associated with them for the extended enterprise at machine speed and scale.
  • With over 30 patents, Venafi delivers innovative solutions for the world's most demanding, security-conscious Global 5000 organizations and government agencies.
  • Venafi is backed by top-tier investors, including TCV, Foundation Capital, Intel Capital, QuestMark Partners, Mercato Partners and NextEquity.

CyberArk Expands Just-in-Time Capabilities Across Industry’s Broadest Privileged Access Management Portfolio

Retrieved on: 
Thursday, January 16, 2020

CyberArk (NASDAQ: CYBR ), the global leader in privileged access management , today unveiled new just-in-time access capabilities that help reduce risk and improve operational efficiency as organizations implement broader least privilege strategies.

Key Points: 
  • CyberArk (NASDAQ: CYBR ), the global leader in privileged access management , today unveiled new just-in-time access capabilities that help reduce risk and improve operational efficiency as organizations implement broader least privilege strategies.
  • Some privileged accounts are granted standing, always on access despite only requiring access for brief periods of time increasing the attack surface.
  • Broker and Remove Access In addition to the new CyberArk Just-in-Time Access with SSH Certificate Authentication delivered via CyberArk Core Privileged Access Security or CyberArk Privilege Cloud , the companys privileged access management as a service offering, CyberArk Alero also provides just-in-time access to third party remote users.
  • By delivering the industrys most comprehensive portfolio of just-in-time capabilities, CyberArk helps organizations reduce standing privileged access risk, simplify operations and strengthen their overall security posture across hybrid IT environments.

SSH Communications Security and Digital Information Technologies Form Partnership to Strengthen Privileged Access Management for Enterprises

Retrieved on: 
Thursday, January 9, 2020

SSH Communications Security ( SSH.COM ), one of the worlds most trusted security brands, has formed a partnership with Digital Information Technologies (DIT), an independent systems integration company operating in Japan since 1982.

Key Points: 
  • SSH Communications Security ( SSH.COM ), one of the worlds most trusted security brands, has formed a partnership with Digital Information Technologies (DIT), an independent systems integration company operating in Japan since 1982.
  • SSH.COMs PrivX is a lean, quick-to-implement and easy-to-use access management software for privileged access to on-prem and cloud environments.
  • Satoshi Ichikawa, CEO, Digital Information Technologies, said, As a systems integrator, we are always concerned about our customers security needs.
  • We are pleased to announce this partnership, since it helps us to strengthen our services with a best-of-breed Privileged Access Management (PAM) solution.

Venafi Study: Organizations Fail to Protect Keys and Certificates as Effectively as Usernames and Passwords

Retrieved on: 
Thursday, December 19, 2019

People rely on usernames and passwords to identify themselves to machines so they can gain access to data and services.

Key Points: 
  • People rely on usernames and passwords to identify themselves to machines so they can gain access to data and services.
  • Machines also need to authenticate themselves to each other so they can communicate securely, relying on cryptographic keys and digital certificates, which serve as machine identities.
  • Only 42% of organizations automatically enforce the rotation of TLS certificates, compared with 79% that automatically enforce the rotation of passwords.
  • Venafi protects machine identity types by orchestrating cryptographic keys and digital certificates for SSL/TLS, IoT, code signing, mobile and SSH.