Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Venafi Launches Stop Unauthorized Code Solution to Defend Against Software Supply Chain Attacks

New Industry-First Solution Reduces Attack Surface and Hardens Enterprise Security by Preventing Malicious Code

Venafi, the inventor of machine identity management, introduced its new Stop Unauthorized Code Solution, uniquely designed to help security teams proactively prevent unauthorized code across any operating environment. By leveraging the combined power of Venafi’s CodeSign Protect product, trusted team of security experts and expansive technology ecosystem, the end-to-end solution enables organizations to significantly reduce their attack surface, prevent potential malware and cyber attacks, and minimize security breaches through improved application control.

“Modern software development often brings increasingly complex security threats, with unauthorized code and malicious software emerging as a favored attack vector for cybercriminals. In fact, in a recent Venafi research study, 70% of security leaders reported that software supply chain attacks are their biggest security blind spot,” said Shivajee Samdarshi, chief product officer at Venafi. “Unauthorized code can introduce significant security risk into any organization, with major business implications. Venafi’s industry-first Stop Unauthorized Code Solution helps security teams tackle this growing challenge by stopping unauthorized code in its tracks, effectively hardening systems and networks.”

Recommended AI News: Riding on the Generative AI Hype, CDP Needs a New Definition in 2024

The integrated, end-to-end solution enables security teams and administrators to maintain their code signing trust chain across all environments – from modern, cloud native environments such as Kubernetes to environments such as Windows, Linux, Apple and Android. It gives teams strict control over code use and execution by verifying that software originates from an approved source and has not been altered. Coupled with stringent execution policy controls, the solution permits only authorized code to run and blocks any unauthorized code throughout the enterprise.

Recommended AI News: Varonis Accelerates Secure Adoption of Microsoft Copilot for Microsoft 365

Venafi’s Stop Unauthorized Code Solution features:

Related Posts
1 of 40,668
  • Secure Code Signing Process – Security teams can automate and secure the entire code signing lifecycle while also reducing the burden on development teams. Code is signed using private digital certificates or those issued by trusted Certificate Authorities.
  • Dynamic Certificate-Based Application Control – A dynamic, certificate-based approach to application control minimizes the burden on security teams while improving compliance and security. Teams have ultimate flexibility to maintain this list through their operating system or existing security solutions – such as endpoint protection platforms or intrusion prevention systems – which have built-in capabilities to manage certificate-based allowlists.
  • Certificate Verification – Before code can execute, the organization’s security solution is configured to check the digital signature against trusted code signing certificates. The integrated solution permits only authentic and unaltered software to be executed.
  • Unauthorized Code Blocking – To prevent unauthorized software from running, the solution blocks code if it does not use valid, trusted code signing certificates or if it is not on the list of approved certificates.
  • Optimization and Integration Services – Comprehensive, ongoing support and guidance from Venafi’s trusted team of security experts helps customers tailor the solution to specifically meet their organization’s needs. This includes configuring and optimizing third-party technology integrations with an organization’s existing security vendors and workflows.

Recommended AI News:  NowVertical Secures Brazilian Government Contracts in Data Analytics

“As part of Ferguson’s ongoing efforts to build and improve our DevSecOps tools and automation, we are beginning an initiative with Venafi to partner on integration of its Stop Unauthorized Code Solution for its end-to-end capabilities for Kubernetes container signing, signature verification, policy configuration and enforcement, and runtime verification to prevent the execution of unsigned or tampered images,” said Shawn Irving, CISO and VP of infrastructure & security at Ferguson. “As a long-time customer of Venafi for TLS Protect and SSH Protect at multiple companies, I am confident that this addition to our portfolio of security capabilities will complement our existing investments and help us to leap forward in combating software supply chain threats with continued machine identity management.”

[To share your insights with us as part of editorial or sponsored content, please write to sghosh@martechseries.com]

Comments are closed.