Тёмный
Venafi, a CyberArk Company
Venafi, a CyberArk Company
Venafi, a CyberArk Company
Подписаться
Venafi, a CyberArk company, offers the most comprehensive solutions to address critical challenges in PKI, certificate management and workload identity management. Through centralized visibility and automation, we help customers monitor and secure any machine identity, anywhere, across extended enterprise networks. As an innovative leader, we solve today’s greatest machine identity challenges while anticipating those of tomorrow.

By combining Venafi’s best-in-class machine identity management with CyberArk’s leading identity security capabilities, these two category creators together establish the world’s first platform for end-to-end machine identity security at enterprise scale. To learn more about CyberArk’s acquisition of Venafi, visit: venafi.com/news-center/press-release/cyberark-completes-acquisition-of-machine-identity-management-leader-venafi/

For more info about Venafi, visit www.venafi.com. To learn more about CyberArk, visit www.cyberark.com.
Комментарии
@grifmang
@grifmang 2 дня назад
Wild that this was recorded mono...
@AlbertaLiddy
@AlbertaLiddy 14 дней назад
Appreciate the detailed breakdown! 🧐 Just a small off-topic question: 😅 I only have these words 🤔. (behave today finger ski upon boy assault summer exhaust beauty stereo over). Can someone explain what this is? 😅
@hicksticks2001
@hicksticks2001 Месяц назад
Firefly is really cool technology.
@magnoliaspeaks9528
@magnoliaspeaks9528 Месяц назад
Brilliant explanation of transparency and risk mitigation.
@lakshanchamod1208
@lakshanchamod1208 2 месяца назад
nice
@kmsknight6600
@kmsknight6600 2 месяца назад
well explained TY!!!
@javijavi8594
@javijavi8594 3 месяца назад
🇪🇸
@antdx316
@antdx316 4 месяца назад
👍 So, you have the root cert in a generator and from that it stems? then every next one is in its own gen that stems too? Each had their own set permissions of limitations?
@foreach1
@foreach1 4 месяца назад
Great video!
@seasoningfine5562
@seasoningfine5562 5 месяцев назад
Awesome, just need some diagrams for us bad listeners
@thatweirdchicc1561
@thatweirdchicc1561 5 месяцев назад
thank you so much for making this video,, i finally understand how the keys work!! -an aspiring Sec+ taker :)
@kowshikjayakumar8405
@kowshikjayakumar8405 6 месяцев назад
ca we directly certify by root CA removing intermediate certificate
@estruendorumble4883
@estruendorumble4883 6 месяцев назад
Great platform, I hope to join your team as an Customer Success Manager. 🙂
@uberfu
@uberfu 7 месяцев назад
01:58 Google will not invalidate active certificates when it goes to switch to 90 Day Certs. This scneario was not done the last 2 times the valdiation period was reduced. Any active cert that was already built+purchased+implemented will continue to be valid until it expires. At which point any new replacement certifiate would be then forced to a 90 day validity period and would either need to be automated or someone is going to have a lot of work constantly.
@lourivalfrancisco2497
@lourivalfrancisco2497 8 месяцев назад
Muito interessante!
@gasovensforqcult
@gasovensforqcult 8 месяцев назад
Key Takeaways ! - stop it, you're killing me "key takeaways" 😂
@materialgirl338
@materialgirl338 8 месяцев назад
I just happened to get into root certificate and found China Financial
@dangaines405
@dangaines405 9 месяцев назад
Well done. Liked and subscribed.
@lohitdutta
@lohitdutta 9 месяцев назад
Thanks for all the helpful information
@Cxrruptwd
@Cxrruptwd 10 месяцев назад
noooooooooo can someone protest it?
@ranjithrocks350
@ranjithrocks350 11 месяцев назад
Informative !!
@VenafiCo
@VenafiCo 11 месяцев назад
Thank you, SO glad to hear this helped you out!
@dewanbageradorsho
@dewanbageradorsho 11 месяцев назад
Nice❤❤❤❤❤
@NockyLucky
@NockyLucky 11 месяцев назад
You expained something in two minues that my lecturer couldn’t do in an hour :D
@VenafiCo
@VenafiCo 11 месяцев назад
That is EXACTLY what we're aiming for! :)
@code_cutter
@code_cutter 11 месяцев назад
If user A has to be given access to machines 1,2,3,4, and user B needs machines 1 & 3. How do manage this with certificates?
@josephpatrick8407
@josephpatrick8407 11 месяцев назад
Great insight on how USPTO is working secure the environment down to the code level. Great battlefiled metaphors Jaime!
@Akash-xv5sk
@Akash-xv5sk Год назад
Hi, my AntiVirus is blocking Electron js Application to download,(i.e unable to download Electron JS Application) do you have any idea what is happening
@nzmb4087
@nzmb4087 Год назад
Hi there, very nice video
@garyschraper5255
@garyschraper5255 Год назад
this is the best explanation I've come across with a real life scenario, excellent
@fredleetee
@fredleetee Год назад
Thank you SO much for this video, and BIGGER thanks for the DIAGRAMS!! I am currently studying for the MD100 test with Microsoft and am currently on subject of local VPN server configuration (the Microsoft way of course), and am on the SSTP connection type.
@VenafiCo
@VenafiCo Год назад
Thanks for sharing, we are SO happy this was helpful for you :)
@IronCyberPro
@IronCyberPro Год назад
loved the funny, comic way of explanation. keep doing it.
@VenafiCo
@VenafiCo 11 месяцев назад
There are definitely more of these to come! :)
@tajstewart7231
@tajstewart7231 Год назад
EXCELLENT VIDEO, Very easy to digest
@dewanbageradorsho
@dewanbageradorsho Год назад
Lovely❤❤❤❤❤❤
@funkkyno8058
@funkkyno8058 Год назад
I had a security alert pop up about the revocation certificate being invalid or unknown of whether to be trusted, however at the time I saw the issuer was Huawei so i thought nothing more of it, and installed the certificate, furthermore in retrospect I'm having second thoughts of if i should have, plus we never had alert appear before until after our internet went out and came back today.
@dewanbageradorsho
@dewanbageradorsho Год назад
Wonderful ❤❤❤❤❤
@dewanbageradorsho
@dewanbageradorsho Год назад
❤❤❤❤❤❤
@dewanbageradorsho
@dewanbageradorsho Год назад
Beautiful ❤❤❤❤
@dewanbageradorsho
@dewanbageradorsho Год назад
Well ❤❤❤❤❤❤❤
@SnapJD
@SnapJD Год назад
Very well stated. Good stuff!
@gemmafreefire5830
@gemmafreefire5830 Год назад
thank you
@hoyamana
@hoyamana Год назад
hello, not sure if you respond. came across the CRL in my downloads and unsure why its there. is the CRL a safe thing? if so can i move it or delete it from my downloads. the CRL contains items from a year ago and i only just bought this from a pawn shop. if it is safe to delete please let me know.
@dewanbageradorsho
@dewanbageradorsho Год назад
GREAT
@irenestanely6462
@irenestanely6462 Год назад
awesome explanation!
@sylviagarcia5794
@sylviagarcia5794 Год назад
PeŔfF€Ct
@josephpatrick8407
@josephpatrick8407 Год назад
Use SSH Certificates to eliminate the risk of compromise!
@devinnemusemeche1273
@devinnemusemeche1273 Год назад
😘 Pᵣₒmₒˢᵐ
@EpiCMixedWithAwesome
@EpiCMixedWithAwesome 2 года назад
Interesting video, thanks
@yayapeace8502
@yayapeace8502 2 года назад
currently working on venafai ssl cert configuration and have challenging to create certificate and application
@tilla455
@tilla455 2 года назад
So is the chain of trust followed up the web server’s intermediate(s) and root installed certificates? Some descriptions sound like the browser is following the certificate chain on the client (browser)
@VenafiCo
@VenafiCo 2 года назад
Thanks for your question! In short, you are correct that the browser is responsible for establishing the chain of trust. To verify a certificate, a browser will obtain a sequence of certificates, each one having signed the next certificate in the sequence, connecting the signing CA’s root to the server’s certificate. For more details, check out this Venafi blog post: www.venafi.com/blog/how-does-browser-trust-certificate?
@Unknown-tf2yb
@Unknown-tf2yb 2 года назад
In the Vault , are we saving just the private key of target server?
@VenafiCo
@VenafiCo 2 года назад
Thanks for reaching out! In short, it is only storing the private key in the vault. Check out our Venafi Solution Brief to learn more about this integrated solution: www.venafi.com/sites/default/files/2020-07/CyberArk_SSH_Discovery_Venafi_Solution_Brief_2020.pdf