Venafi Encryption Director v5
June 01, 2010
$35 to $275 per managed asset
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Solid certificate encryption management and policy compliance.
- Weaknesses: Focuses only on certificate management and no other policy compliance.
- Verdict: If you need to focus on encryption, this is your best bet.
Installation was simple and straightforward. The single executable installer launches a setup wizard, which leads through the process of not only installing the services and the web console, but also setting up the initial private keys. After installation is complete, all management is done through the web-based management console. We found this console to be fairly easy to use and navigate, but we did find initial configuration to be a bit confusing.
This tool can search and discover the already existing certificates throughout the enterprise and inventory them to be sure that they all meet the compliance needs of the environment. This discovery process can also help weed out potential problem certificates, expired certificates, or even rogue certificate authorities. Encryption Director can work with SSL, SSL-EV, TLS, SMTP and self-signed certificates, and provides an inventory so administrators can easily spot and remediate problems.
Documentation included both installation and administrator guides, as well as some other integration guides all in PDF format. We found all the documentation to be easy to follow with many step-by-step instructions, screen shots and configuration examples.
Venafi offers standard and premium support at an extra cost. Support options include both phone and email technical support, as well as access to a small web-based support portal. Customers can use this portal to track support cases and submit new ones. Venafi does not offer an online knowledge base or support resource area on the website.
At a price ranging from $35 to $275 per managed asset, we find this product to be a good value for the money. All in one tool, Encryption Director handles a problem that can plague many enterprises and cause many security risks.
SC Magazine Articles
- Yahoo breach; State-sponsored actors suspected, at least 500 million accounts affected
- Cybercriminals already able to hack ATM biometric readers
- 185M incidents bypassed perimeter defenses - report
- OVH suffers massive 1.1Tbps DDoS attack
- IoT assault, connected devices increasingly used for DDoS attacks
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- CEO sacked after aircraft company grounded by whaling attack
- DōTERRA breach exposes customer info; including SS, DOB, and addresses
- UPDATE: Petya ransomware leverages Dropbox and overwrites hard drives
- Some U.S. Bancorp workers' W-2 info exposed in ADP data breach
- Report on POS campaign provides peek into scalable tactics of cybercrime duo
- Yahoo! data breach likely exceeds 500 million records
- Boards taking more cyber seriously, driven by regulatory requirements, report finds
- Curtain closes on Ransomware Encryptor RaaS, but with master key
- BIND update fixes high-severity flaw affecting ICS, as CERT releases update to CSET tool