Displaying 1 - 2 of 2 results

  • Stop Unauthorized Privileged Access - SSH: An Unquantified Risk

    White Papers · Aug 2015 · Provided By Venafi

    For most organizations, Secure Shell (SSH) key credentials are left unprotected and leave the door open to be exploited. System administrators and automated applications, which use SSH keys for authentication and access, have the highest level of rights and privileges for accessing servers, applications, and virtual instances. APTs and other...

    Learn More
  • Eliminate Blind Spots in SSL Encrypted Traffic

    White Papers · Aug 2015 · Provided By Venafi

    While SSL/TLS provides privacy and authentication, it also creates a blind spot for enterprise security. Cybercriminals can use SSL to hide their exploits from an organization’s security controls, including Next Generation Firewalls (NGFW), Intrusion Prevention Systems (IPS), Unified Threat Management (UTM), secure gateways, Data Loss Prevention (DLP), anti-malware solutions, and...

    Read More