Story image

New code-signing solution released by Venafi

30 Jul 2019
Twitter
Facebook

Venafi, a vendor of machine identity protection, has released Next-Gen Code Signing, a machine identity protection solution that secures code signing processes by delivering enterprise-wide visibility into all code signing operations. 

The solution provides centralised private key storage, code signing policy enforcement, and automation while reducing code signing burden on software development teams.

For decades, code signing has been used to verify the integrity of software, and nearly every organisation relies on it to confirm their code has not been corrupted with malware. 

Despite this, modern organisations often struggle to secure and protect code signing operations because they don’t have a solution that allows them to consistently enforce policies across locations, tools and processes without slowing down development teams.

“Today, every organisation is a software developer building apps, libraries, containers and other tools,” says Venafi security strategy and threat intelligence vice president Kevin Bocek.

“However, it can be very difficult to scale code signing operations. The security procedures that protect code signing are typically seen as cumbersome, and developers often ignore them. Unfortunately, this leaves security teams in the dark and it’s very advantageous for bad actors. Stolen code signing keys are powerful cyber weapons that put companies and their customers at risk. From Stuxnet to everyday malware and phishing campaigns, attacks that leverage code signing evade next-generation AV detection.”

In addition to securing enterprise code signing processes, Next-Gen Code Signing automates the management of all code signing private keys. 

Private code signing keys never leave the trusted Venafi storage platform or connected hardware security modules (HSMs). 

This new solution provides information security teams with comprehensive visibility and detailed intelligence about all aspects of code signing operations, including who signed the code and with which certificate, as well as who approved the request and when each action occurred. 

Using the intelligence gathered from code signing processes, Next-Gen Code Signing delivers compliance and audit reporting across all code signing activities.

Key benefits include:

  • Scalability that can support a few developers in one location to tens of thousands of developers distributed globally, and millions of code signing operations a week.
     
  • Automation and support for a broad range of software development processes; development teams do not need to change tools.
     
  • A central, permanent storage location for private keys so they remain protected.
     
  • Flexible, customisable policy enforcement that supports the needs of multiple software projects, including the approval of workflows, certificate types, certificate authorities, HSMs and software development tool sets.
     
  • Allows security teams to provide a code signing service that enforces policies and is transparent to developers.

“Next-Gen Code Signing lets software developers use the same code signing tools and does not require changes to their build environments,” Bocek adds.

“It provides an invisible layer of technology that keeps code signing keys safe and out of the hands of attackers. Venafi Next-Gen Code Signing gives security teams and developers an exciting way to be both fast and safe.”

Story image
14 Nov
DXC Technology & VMware team up on IaC cloud platform
“By combining VMware’s hybrid cloud offerings with DXC cloud services and industry expertise, DXC Managed Multi-Cloud Services powered by VMware gives IT the ability to rapidly deploy a universal management experience across all cloud environments."More
Download image
Why unification is critical to transformation for midmarket businesses
The cybersecurity threat landscape has given IT leaders an easy conversation starter about why their initiatives make a material strategic impact to the business.More
Story image
13 Nov
Why supply chain companies should adopt cloud-based communications
Here are 8x8’s five reasons cloud-based communications applications will improve productivity and support growth for Australian transport and logistics businesses.More
Link image
Whitepaper: Gartner highlights the 12 frontiers of edge computing
By year-end 2023, more than 50% of large enterprises will deploy at least six edge computing use cases deployed for IoT or immersive experience.More
Story image
13 Nov
Motorola APX NEXT brings tech innovation to public safety
With public safety virtual assistant ViQi, APX NEXT helps officers focus on what matters most.More
Story image
14 Nov
Splunk in the wild: the ‘data to everything’ platform in action
With a platform offering that professes to ‘do everything with your data’, Splunk’s solutions come alive in its use cases and with customers who are taking the technology and using it to solve specific pain points or to extend capabilities.More