Get the visibility and control you need to safeguard keys and certificates that should be trusted, and fix or block those that should not.
TrustAuthority discovers the configuration, location, and use of every key and certificate, so you can continuously monitor their status to identify vulnerabilities, enforce policies, and detect anomalies. With this improved enterprise-wide visibility of your keys and certificates, you can ensure that your encryption environment is fully secure and reduce the risk of certificate-related compromises and unplanned outages.
Automatically replace vulnerable keys and certificates to
avoid the impact of outages or vulnerabilities. TrustForce detects and reports
anomalies, enforces security policies, and automatically remediates key and
certificate vulnerabilities.
TrustForce uses lightweight agent and agentless technologies to automate
complex activities related to your ever-changing key and certificate
environment, including automatic rekeying and recertification across the
enterprise. This enables you to quickly distribute new keys or fix keys or
certificates that don’t meet established security policies. Also, in the event
of a CA breach, you can automatically remediate thousands of keys and
certificates without worrying about error-prone manual processes that are not
only slow but often introduce vulnerabilities.
After establishing certificate reputation, TrustNet can increase protection by whitelisting trusted CAs and certificates, and blacklisting untrusted ones.
TrustNet integrates with other Venafi Platform components to provide alerts on forged, rogue, and maliciously used certificates found across the internet. When TrustNet detects a rogue certificate, it can immediately blacklist the certificate or the rogue CA that issued it. This allows you to take immediate action to block access to websites that are using blacklisted certificates. You can then use TrustForce to automate the replacement of these rogue certificates quickly and easily. Automation is especially useful to handle the scale of an event such as a CA compromise or new vulnerability such as Heartbleed.