Critical Systems at Risk Due to Poor Key and Certificate Management

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7
Previous Next

Click through for results from a survey on certificate and key management, conducted by Venafi in conjunction with Osterman Research.

Venafi Inc., the inventor and market leader of enterprise key and certificate management (EKCM) solutions, in conjunction with Osterman Research, recently released the results of an extensive survey designed to determine how well organizations understand the risks associated with poor key and certificate management. Based on responses from 174 IT and information-security professionals, the survey reveals a significant lack of knowledge, understanding and oversight, resulting in a series of information-security vulnerabilities.

Fifty-four percent of respondents, for example, admit to having an inaccurate or incomplete inventory of their Secure Socket Layers (SSL) certificate populations. Deploying encryption solutions without maintaining comprehensive certificate and key inventories is a worst practice that jeopardizes vital business systems and processes and exposes organizations to substantial risk of security and compliance incidents.

"The importance of sound certificate management practices is highlighted by the repeated certificate authority (generally referred to as CA) breaches over the past year," said Michael Osterman, president of Osterman Research. "We were startled by the lack of urgency regarding the issue. When considered in tandem with the high-value target CAs represent to hackers, we can predict more CA breaches and more security threats than we saw in 2011."

"Organizations protect mission-critical and often regulated data with hundreds or thousands of encryption keys and digital certificates," said Jeff Hudson, Venafi CEO. "But as this survey reveals, too many companies have inaccurate or incomplete data about their security assets. The unquantified and unmanaged risks these certificates and keys pose is significant — risks magnified through the increasingly pervasive use in corporate data centers, cloud-based systems and mobile devices."

More Slideshows:


Seven Tips to Help Professionals Negotiate Like Ninjas Strengthen your confidence and impact at work.

Five Unique Ways to Use a Log Management Solution Log management solutions enable companies to monitor and analyze all kinds of activity happening on their networks.

Top Ten Desktop Virtualization Myths A closer look at the differences between Virtual Desktop Infrastructure and Intelligent Desktop Virtualization.

 

Related Topics : A Big Market for Big Data Jobs, Midmarket CIO, IT Management Automation, SharePoint, Technology Markets

 
More Slideshows

GECapitalSkillsGap0x Getting Ahead of Your Organization's IT Skills Gap

Many CIOs are enthused by the potential of the Internet of Things, Big Data and cloud computing, but are uncertain as to whether they are prepared to maintain an IT workforce with all the necessary skills to support it. ...  More >>

Glassdoor2015OddballQs0x Top 30 Oddball Interview Questions in the U.S., UK and Canada for 2015

Once again, Glassdoor has combed through tens of thousands of interview questions shared by job candidates over the past year to find some pretty spectacular oddballs. ...  More >>

TheLaddersResumeRefresh0x Resume Cleanup: Sixteen Items You Should Remove Today

You have six seconds to make a great first impression. Go! Recruiters don't give much time to resumes, so it's essential that yours is on the mark. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date