Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Venafi Acquires Kubernetes Services Provider Jetstack

Identity protection provider Venafi this week announced that it has entered a definitive agreement to acquire Jetstack, a company specializing in open source machine identity protection software for Kubernetes.

Identity protection provider Venafi this week announced that it has entered a definitive agreement to acquire Jetstack, a company specializing in open source machine identity protection software for Kubernetes.

Founded in 2000, Utah-based Venafi provides solutions for securing and protecting cryptographic keys and digital certificates. The company helps both private organizations and government agencies around the world protect TLS, SSH and code signing machine identities.

Jetstack, a Kubernetes professional services company and a contributor to the open-source community, was founded in 2015 in London. The company builds cloud-native infrastructure using Kubernetes and educates and supports organizations embracing the cloud.

Jetstack is well known for Cert-manager, an open-source piece of software with millions of downloads and a community of hundreds of contributors. The solution provides developers with an easy way to create, connect and consume certificates with Kubernetes and cloud native tools.

With this acquisition, Venafi aims to “transform the way modern applications required by digital transformation are secured.”

According to the company, a flurry of new machines are being created using Kubernetes clusters, cloud instances, service mesh, and microservice APIs, each of them requiring a unique identity to operate securely.

Venafi and Jetstack claim they are uniquely positioned to take advantage of this opportunity, as they can protect machine identities and support enterprises using Kubernetes in mission-critical infrastructure.

The acquisition was announced following a two-year collaboration on accelerating machine identity protection in Kubernetes, multi-cloud, service mesh and microservices ecosystems.

According to Venafi, Jetstack will operate as a separate division. Furthermore, the company says it is committed to keeping existing open source projects open and strengthen the open-source community with further investment.

“Together, we have the chance to do something really special as our joint resources and expertise give us the opportunity to help developers to build fast and securely,” Matt Barker, CEO and co-founder of Jetstack, said.

Related: VMware to Acquire Kubernetes Security Firm Octarine

Related: Code Analysis Company SonarSource Acquires RIPS Technologies

Related: CyberArk Acquires Identity as a Service Provider Idaptive for $70 Million

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Management & Strategy

Industry professionals comment on the recent disruption of the Hive ransomware operation and its hacking by law enforcement.

Funding/M&A

Tenable has launched a $25 million venture fund to place bets on early-stage startups in the exposure management space.

Management & Strategy

Tens of cybersecurity companies have announced cutting staff over the past year, in some cases significant portions of their global workforce.

Management & Strategy

Microsoft making a multiyear, multibillion dollar investment in the artificial intelligence startup OpenAI, maker of ChatGPT and other tools.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.