Hear from Richard Barstow, Lead Security Architect, Eversource – a fortune 500 Energy company in the US, on how he enabled seamless certificate management in the cloud.
This segment features Murali Palanisamy, Chief Solutions Officer at AppViewX, emphasizing the need for enterprises to move to cloud or containers and that it is no more a matter of “if” but “when.”
Each year, Public Key Infrastructures (PKIs) become more and more important to maintaining a secure online presence, and 2021 trends suggest this year will not be an exception. PKI provides a variety of security benefits to an organization, including authentication and building a trust between organizations. 2020 has seen a rise in cloud-based Public Key Infrastructures, and the trends for 2021 suggest this will continue into this year. Research into 2021 PKI trends also reveals that PKIs will likely:
- Be used for authentication in DevOps and Internet of Things (IoT) devices and creation of a chain of trust between these devices
- See a growth in the adoption of Public Key Infrastructures for both on-premises and cloud-based IT infrastructures
- See a resurgence around mission critical systems within organizations
Data is the new Oil of the digital economy. Maintaining trust and control of data is an enabler for any business. Securing the sensitive data is considered as the top priority in CIO/CISO checklist. In this session, we would explore various solutions or best practices to secure data in either on-premise or in the cloud.
– Data protection is critical
– Data encryption can be implemented in different layers
– Hardware key protection and key management is a must.
Join Erwin Hulst, IT Specialist Certificate Management, and Yoram Peek, DevOps Engineer from Rabobank, the 2nd largest bank in the Netherlands, as they walk us through their challenges and how CMDB automation helped them simplify their certificate enrollment process.
Digital identities (machines and human/machine hybrids like assisted bots) are growing rapidly across organizations to enable fast and efficient execution of routine tasks. These digital workers come in many different flavors (e.g., APIs and container-based workloads, assisted and unassisted bots, a variety of IoT devices and robots). Securing and governing the identities and associated secrets of these digital identities at scale requires automation, agility and orchestration. Governing these identities requires centralized rules and oversight, while allowing for decentralized approaches to managing the many different flavors of digital workers.
The digital world is experiencing unprecedented growth and interconnectivity due to a perfect storm of conditions over the past few years. Achieving almost a flywheel effect, the advent of many technological innovations – the rise of cloud computing, the emergence of 5G, the proliferation of Internet-of-things (IoT) smart devices – has created immense market opportunities for digital products that interconnect our lives and workplaces. At the center of this explosion of connected devices and software-defined-everything is the ability for these interconnected devices to verify their identity with each other. The industry is quickly converging into using digital certificates to express identity. Join us to see how you should get ready for this new world and plan your infrastructure to be able to accommodate the new scale and security requirements for identity platforms, specifically, using digital certificate and certificate authorities.
By 2022, More than 50% of enterprise data will have moved to the public cloud. As we move more sensitive data to the cloud, it’s critical that we choose the best available data security services including encryption, key management, HSM, secrets management, and tokenization to protect that data from breaches and to comply with expanding data privacy and residency regulations. In this webinar, we will cover the confusing set of options and best practices for using cloud-native data security services and when third-party multi-cloud data security services are required to achieve compliance or maintain consistent data security policies, secure key storage, and accelerate DevOps.
What Will You Learn:
- Key Management Options (BYOK , BYOKMS , BYOE).
- Hardware Security Modules (HSM) options and compliance standards.
- Tokenization in cloud applications.
- Secrets Management to support application developers.
“Today, everything is connected – apps, devices, and servers – and everything is relying on public key infrastructure (PKI). Digital certificates are the most prevailing, secure and cost effective way of protecting identities and devices.
As the number of people within organizations and connected devices increases, deploying individual certificates for each application with multiple certificates per device can become a challenge for IT Teams. They have to stay on top of:
- Issuance, renewals and revocation to ensure business continuity
- IT operational costs
- Preventing downtime of business services
With IT departments handling a significant volume of digital certificates, they need management and monitoring tools to improve their operational efficiency and effectiveness.
As one of the world’s original experts and trusted authorities in PKI management and CA services, GlobalSign’s solutions enable enterprises to prevent and resolve PKI challenges. With our own proprietary solutions and through collaboration with best in class technology vendors such as AppviewX, we provide managed services and on-premise solutions for Certificate Lifecycle Management and Provisioning (CLMP), including Certificate Discovery. GlobalSign’s technology partnership with AppviewX delivers specialist services that are readily integrated with GlobalSign’s scalable public and private CA services. This includes managed public, private and dedicated CA hierarchies for your internal and external PKI trust, DevOps and IoT requirements.
There are typically three core benefits of using a Certificate Management Services. GlobalSign can help you understand how you can:
- Know what PKI certificates you have through centralized management & reporting
- Delegate administration and save time and money
- Easily adopt services without extensive change management and burdensome deployment
Join this presentation to understand that Certificate Lifecycle Management is at the core of Certificate Discovery and Provisioning and learn what you need to ensure you are mitigating risk whilst understanding compliance to legal, industry and company policy requirements.
Five Key Takeaways
- Consider what drives your business to have a robust automated CLMP service
- Consider the use cases that you can cover when using the service against
- Understand risk mitigation
- Understand legal compliance & regulations
- Consider an easy end-to-end all in one service”