Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Identity & Access

Venafi Launches Certificate-based Mobile Device “Kill Switch”

Venafi, a Salt Lake City, Utah-based provider of enterprise key and certificate management solutions, has launched a new product that the company describes as a mobile device “kill switch” which gives IT security teams the ability to instantly cut off mobile access to applications and networks when suspicious activity is detected.

Venafi, a Salt Lake City, Utah-based provider of enterprise key and certificate management solutions, has launched a new product that the company describes as a mobile device “kill switch” which gives IT security teams the ability to instantly cut off mobile access to applications and networks when suspicious activity is detected.

The new offering, Mobile Certificate Manager, is designed to protect companies from the increasing use of digital certificates for malicious purposes, the company said.

Built on Venafi’s Director platform, Mobile Certificate Manager enables IT security teams to identify risks from the use of mobile certificates and take action to prevent unauthorized network access and data theft.

By levering Venafi’s Mobile Certificate Manager, security managers can recognize digital certificate anomalies, such as duplicate or orphaned certificates that might provide unauthorized access, and take immediate action to remediate by revoking certificates across one or more devices.

The solution currently integrates with and complements Mobile Device Management (MDM) systems, including solutions from MobileIron and AirWatch.

“Bad actors and cybercriminals have proven time and time again that once they gain access to unprotected certificates they can authenticate into networks and gain access to corporate information,” Venafi explained. “The use of certificates for users, mobile devices, and mobile applications is becoming more attractive as enterprises look to reduce the use of passwords and improve usability. Enterprises can now secure and protect the trust established by certificates issued to users, mobile devices, and mobile applications to stop cybercriminals from using stolen, forged or hijacked mobile certificates to authenticate infiltrate networks.”

“Passwords remain one of the weakest links in IT security. Simple passwords are used too often, and the same password is used with too many different services. New demands for mobile usability have changed the situation and enterprises are keen to explore other options,” said Song Chuang, Research Director at Gartner. “The good news is that there are viable alternatives including user certificates. Implemented properly for suitable scenarios, certificate-based authentication can provide a high level of security, as well as a great UX,” according to Chuang.

“Enterprises have lost control of the technology that establishes trust that all IT security is built on: cryptographic keys and digital certificates. Organizations are falling further and further behind every time a new mobile device or application is added to the network,” said Jeff Hudson, CEO, Venafi. “You can remote wipe a mobile device, but that does not remove the risk of potentially rogue or compromised mobile certificates being used against the enterprise.”

Advertisement. Scroll to continue reading.

Mobile Certificate Manager delivers features and benefits to secure and protect enterprise use of mobile certificates, including:

Secure MDM Policy Enforcement: Seamless integration with existing MDM solutions such as MobileIron and AirWatch allows customers to leverage them to easily enforce policies such as required key lengths and approved Certificate Authorities (CAs) for mobile devices and applications.

User Certificate Mapping: Customers can view all mobile user and device certificates issued to a single user and identify certificate anomalies such as duplicate, orphaned, and unneeded certificates.

Single-click Revocation: Customers can immediately revoke mobile and user certificates associated with employees that have left the company or been reassigned to prevent unauthorized access to corporate information. This “kill switch” technology empowers IT security teams to respond and remediate immediately to risks.

Automatic CA Import: Automatically connect to one or more certificate authority (CA) to import certificates that are not in the Director inventory. System administrators can easily define rules for importing specific certificates, designate where they are placed in the Director hierarchy, and schedule when certificates are automatically imported.

Flexible CA Migration: After determining which CA best meets their mobile certificate requirements, customers can leverage their MDM to connect with the CA and then automate certificate issuance and revocation for all mobile devices and applications.

Centralized Policy Enforcement: Analytics intelligence enables system administrators to examine, correlate and view their organization’s certificates and keys across all users and to detect anomalous certificates.

More information on Mobile Certificate Manager is available online

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Artificial Intelligence

ChatGPT is increasingly integrated into cybersecurity products and services as the industry is testing its capabilities and limitations.

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

Email Security

Many Fortune 500, FTSE 100 and ASX 100 companies have failed to properly implement the DMARC standard, exposing their customers and partners to phishing...

Funding/M&A

The private equity firm merges the newly acquired ForgeRock with Ping Identity, combining two of the biggest names in enterprise IAM market.

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...