Venafi Encryption Director v5
June 01, 2010
$35 to $275 per managed asset
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Solid certificate encryption management and policy compliance.
- Weaknesses: Focuses only on certificate management and no other policy compliance.
- Verdict: If you need to focus on encryption, this is your best bet.
Installation was simple and straightforward. The single executable installer launches a setup wizard, which leads through the process of not only installing the services and the web console, but also setting up the initial private keys. After installation is complete, all management is done through the web-based management console. We found this console to be fairly easy to use and navigate, but we did find initial configuration to be a bit confusing.
This tool can search and discover the already existing certificates throughout the enterprise and inventory them to be sure that they all meet the compliance needs of the environment. This discovery process can also help weed out potential problem certificates, expired certificates, or even rogue certificate authorities. Encryption Director can work with SSL, SSL-EV, TLS, SMTP and self-signed certificates, and provides an inventory so administrators can easily spot and remediate problems.
Documentation included both installation and administrator guides, as well as some other integration guides all in PDF format. We found all the documentation to be easy to follow with many step-by-step instructions, screen shots and configuration examples.
Venafi offers standard and premium support at an extra cost. Support options include both phone and email technical support, as well as access to a small web-based support portal. Customers can use this portal to track support cases and submit new ones. Venafi does not offer an online knowledge base or support resource area on the website.
At a price ranging from $35 to $275 per managed asset, we find this product to be a good value for the money. All in one tool, Encryption Director handles a problem that can plague many enterprises and cause many security risks.
Sign up to our newsletters
SC Magazine Articles
- RSA Conference 2015: Prepare for the IoT before it's too late, Sorebo warns
- Study: Open Source Software use increasing in enterprises but without vulnerability monitoring
- 'Aaron's Law' returns to Congress
- RSA 2015: Tension continues to grow between govt, cryptographers
- CozyDuke APT group believed to have targeted White House and State Department
- Study: Conficker declared top threat of 2014, but N. America targeted mainly by AnglerEK
- RSA 2015: Straight talk about encryption, bulk surveillance and IoT
- RSA 2015: In the healthcare industry, security must innovate with business
- RSA 2015: Unintended use of aircraft systems next challenge for counterterrorism community
- RSA 2015: Bug hunting and responsible vulnerability disclosure