Sponsored Content by Venafi

The future of security lies in Machine Identity Management

Humans tend to be anthropocentric. That is to say, we think we’re in control. We pour a wealth of resources into protecting ourselves, monitoring one another and maintaining our identities, especially in the digital world. We tend to think of cybersecurity in human terms as a system of passwords, checkpoints, and verifications set up to identify humans. The problem is there are two actors on any network—humans and machines.

Machine Identity Management is the other, more important, component of cybersecurity. This burgeoning category of online security that certifies machines involved in digital connections rather than human actors. The industry inventor and pioneer is Venafi, a company that manages and protects the machine identities—including keys and certificates—that machines use to authorize secure communication with each other. Recently, Gartner added “Machine Identity Management” to its 2020 Identity and Access Management Hype Cycle, helping to underscore the fundamental role identity management for machines plays in cybersecurity.

In many ways, Venafi is writing the rules for this new generation of cybersecurity solutions.

Why do we need to identify machines?

Networks consist of connections between machines. As new technologies have been adopted, the definition of machines has expanded — from physical machines, such as servers and PCs, to mobile devices, applications, cloud instances, containers, microservices, clusters, APIs and smart algorithms. 

A seemingly simple transaction — such as connecting with your local bank’s server to check your balance — involves hundreds of machines, all of which need to be authenticated before they can connect. These machines run the gamut from the bank’s on-site servers to software in the cloud. 

And every one of these connections requires instantaneous authorization. After all, if machines can’t properly identify another machine how can they decide whether to allow or deny a connection? And how can you and the bank ensure that the data being relayed hasn’t been intercepted by another party?

As Venafi CEO Jeff Hudson explains, “Without identity you’ve got nothing.”

How machine identities differ from human identities

Unlike people, machines don’t use passwords to verify identity. Instead, they use digital certificates to establish identity and authenticity. The most common types of machine identities are TLS/SSL certificates, but there are several others, such as SSH keys and code signing certificates. Every organization needs such identities to decide whether to allow or deny access in order to keep our digital world secure. 

For most people, TLS certificates are the most visible of the machine identities because they secure websites. The lock icon in your browser’s address bar is evidence of a TLS machine identity. But behind that lock, billions of other machine identities are being used as well. A small enterprise typically needs thousands of machine identities to keep its networks secure; Global 5000 organizations tend to use millions of machine identities. And these numbers are growing exponentially.

Effective Machine Identity Management more critical than ever before

Image Credits: Getty Images

Navigating this massive volume of machine identities is made even more difficult by the fact that machine identity lifecycles are shortening. Digital certificates used to be valid for three to five years. But because these identities are so critical to security, browser makers are mandating shorter lifespans. In 2020, TLS certificate lifecycles were reduced to one year, and Venafi expects these lifecycles to shrink to six months relatively quickly. 

As a result, companies need more resources just to manage the same number of machine identities. For many enterprises the need is compounded by digital transformation initiatives such as cloud migration and expanding DevOps processes. When organizations fail to keep up with the volume and variety of machine identities they need, the consequences can be dire. 

In mid-2020, the State of California was unable to tabulate Covid-19 testing results after a TLS certificate on its centralized reporting system expired. The 2017 Equifax data breach occurred when a certificate controlling a crucial piece of security software expired, leaving them vulnerable to attack for 76 days. Even companies like Microsoft and Spotify have experienced machine identity outages — and the resulting problems ranged from lost customers to compromised security. 

Cybercriminals exploit improperly managed machine identities

Outages caused by expired certificates are the most visible symptom of poor machine identity management, but there are many other ways machine identities may be compromised. SSH keys, which are used to secure cloud-based servers and other machines, have been easily breached by the rising tide of SSH malware. Meanwhile, cybercriminals can steal private code signing keys to cloak malicious binaries within software updates, which are then unknowingly pushed out to unsuspecting end users.

Given that machine identities are of the least understood and weakly protected parts of enterprise networks, it should come as no surprise that cybercriminals are aggressively exploiting them. From Stuxnet to Solarwinds, attackers are increasingly abusing unprotected machine identities to launch a variety of attacks. In fact, over the past four years threats targeting weak machine identities have increased by 400%, a troubling trend Venafi anticipated years ago. 

That’s why Venafi has invested millions of hours developing practical, real-world solutions to manage machine identities. The company is at the forefront of making machine identity management a core part of enterprise security.

Machine identifies are the new network perimeter

When a machine (hardware or software) is created, it is issued a digital certificate. This certificate acts as an ID badge for the machine when it needs to connect to other machines. This ID badge is important because every single digital transaction requires multiple connections between many different machines.

Before the pandemic, the challenge of machine identity management was already a growing concern. Covid-19 has created new layers of complexity and urgency, as companies scramble to enable remote workers and move critical business functions online quickly — which frequently means moving to the cloud.

“Over the last 9 months, the firewall model of security has been obliterated,” explains Hudson. “Each new technology, from cloud migration to DevOps processes, was already pushing enterprise networks beyond the traditional perimeter. After the pandemic hit and everyone started working remotely, it became absolutely clear that there is no such thing as a network perimeter. The world we’re living in today has machines everywhere, and very few organizations have made the investment required to manage these identities effectively. Implementing a ‘zero trust’ strategy to stop attackers has to begin with strong machine identity management.”

Venafi has spent over a decade solving the machine identity management challenges of the largest, most critical businesses in the global digital economy. With more than 30 patents and the largest ecosystem of partners and developers, Venafi is universally recognized as the industry leader in machine identity management and is aggressively investing for the future. 

The future

Image Credits: Getty Images

The implication of a world in which machines act independently without humans can make some people itchy. Don’t worry — digital transformation will not facilitate (or combat) some Terminator-style machine takeover. Rather Venafi envisions a world in which humans and machines work together to create a better world because all machine identities are managed and protected. Much of this vision is available to businesses today. Venafi already works with five of the world’s top airlines, as well as four of the top five health insurers, retailers, consulting firms and banks. Over the last 10 years, Venafi has grown from five customers to 3,800 customers. When you shop, use your credit card, check your medical records, or transfer money to your bank account, chances are that at least some of the machines needed to complete these transactions are protected by Venafi. 

However, the tremendous acceleration in digital transformation means broader adoption of machine identity management is critical to the future of digital business. The future of security depends on every organization moving beyond human identity management to manage all machine identities. 

The pandemic has only accelerated the reality that machine identity management must be a core component of any cybersecurity strategy. To learn how your business could benefit from machine identity management, visit venafi.com.

More TechCrunch

Welcome back to TechCrunch’s Week in Review — TechCrunch’s newsletter recapping the week’s biggest news. Want it in your inbox every Saturday? Sign up here. Over the past eight years,…

Fisker collapsed under the weight of its founder’s promises

What is AI? We’ve put together this non-technical guide to give anyone a fighting chance to understand how and why today’s AI works.

WTF is AI?

President Joe Biden has vetoed H.J.Res. 109, a congressional resolution that would have overturned the Securities and Exchange Commission’s current approach to banks and crypto. Specifically, the resolution targeted the…

President Biden vetoes crypto custody bill

How large a role humanoids will play in that ecosystem is, perhaps, the biggest question on everyone’s mind at the moment.

Industries may be ready for humanoid robots, but are the robots ready for them?

VCs are clamoring to invest in hot AI companies, willing to pay exorbitant share prices for coveted spots on their cap tables. Even so, most aren’t able to get into…

VCs are selling shares of hot AI companies like Anthropic and xAI to small investors in a wild SPV market

The fashion industry has a huge problem: Despite many returned items being unworn or undamaged, a lot, if not the majority, end up in the trash. An estimated 9.5 billion…

Deal Dive: How (Re)vive grew 10x last year by helping retailers recycle and sell returned items

Tumblr officially shut down “Tips,” an opt-in feature where creators could receive one-time payments from their followers.  As of today, the tipping icon has automatically disappeared from all posts and…

You can no longer use Tumblr’s tipping feature 

Generative AI improvements are increasingly being made through data curation and collection — not architectural — improvements. Big Tech has an advantage.

AI training data has a price tag that only Big Tech can afford

Keeping up with an industry as fast-moving as AI is a tall order. So until an AI can do it for you, here’s a handy roundup of recent stories in the world…

This Week in AI: Can we (and could we ever) trust OpenAI?

Jasper Health, a cancer care platform startup, laid off a substantial part of its workforce, TechCrunch has learned.

General Catalyst-backed Jasper Health lays off staff

Live Nation says its Ticketmaster subsidiary was hacked. A hacker claims to be selling 560 million customer records.

Live Nation confirms Ticketmaster was hacked, says personal information stolen in data breach

An autonomous pod. A solid-state battery-powered sports car. An electric pickup truck. A convertible grand tourer EV with up to 600 miles of range. A “fully connected mobility device” for…

Inside EV startup Fisker’s collapse: how the company crumbled under its founders’ whims

Late Friday afternoon, a time window companies usually reserve for unflattering disclosures, AI startup Hugging Face said that its security team earlier this week detected “unauthorized access” to Spaces, Hugging…

Hugging Face says it detected ‘unauthorized access’ to its AI model hosting platform

Using stalkerware is creepy, unethical, potentially illegal, and puts your data and that of your loved ones in danger.

Hacked, leaked, exposed: Why you should never use stalkerware apps

The design brief was simple: each grind and dry cycle had to be completed before breakfast. Here’s how Mill made it happen.

Mill’s redesigned food waste bin really is faster and quieter than before

Google is embarrassed about its AI Overviews, too. After a deluge of dunks and memes over the past week, which cracked on the poor quality and outright misinformation that arose…

Google admits its AI Overviews need work, but we’re all helping it beta test

Welcome to Startups Weekly — Haje‘s weekly recap of everything you can’t miss from the world of startups. Sign up here to get it in your inbox every Friday. In…

Startups Weekly: Musk raises $6B for AI and the fintech dominoes are falling

The product, which ZeroMark calls a “fire control system,” has two components: a small computer that has sensors, like lidar and electro-optical, and a motorized buttstock.

a16z-backed ZeroMark wants to give soldiers guns that don’t miss against drones

The RAW Dating App aims to shake up the dating scheme by shedding the fake, TikTok-ified, heavily filtered photos and replacing them with a more genuine, unvarnished experience. The app…

Pitch Deck Teardown: RAW Dating App’s $3M angel deck

Yes, we’re calling it “ThreadsDeck” now. At least that’s the tag many are using to describe the new user interface for Instagram’s X competitor, Threads, which resembles the column-based format…

‘ThreadsDeck’ arrived just in time for the Trump verdict

Japanese crypto exchange DMM Bitcoin confirmed on Friday that it had been the victim of a hack resulting in the theft of 4,502.9 bitcoin, or about $305 million.  According to…

Hackers steal $305M from DMM Bitcoin crypto exchange

This is not a drill! Today marks the final day to secure your early-bird tickets for TechCrunch Disrupt 2024 at a significantly reduced rate. At midnight tonight, May 31, ticket…

Disrupt 2024 early-bird prices end at midnight

Instagram is testing a way for creators to experiment with reels without committing to having them displayed on their profiles, giving the social network a possible edge over TikTok and…

Instagram tests ‘trial reels’ that don’t display to a creator’s followers

U.S. federal regulators have requested more information from Zoox, Amazon’s self-driving unit, as part of an investigation into rear-end crash risks posed by unexpected braking. The National Highway Traffic Safety…

Feds tell Zoox to send more info about autonomous vehicles suddenly braking

You thought the hottest rap battle of the summer was between Kendrick Lamar and Drake. You were wrong. It’s between Canva and an enterprise CIO. At its Canva Create event…

Canva’s rap battle is part of a long legacy of Silicon Valley cringe

Voice cloning startup ElevenLabs introduced a new tool for users to generate sound effects through prompts today after announcing the project back in February.

ElevenLabs debuts AI-powered tool to generate sound effects

We caught up with Antler founder and CEO Magnus Grimeland about the startup scene in Asia, the current tech startup trends in the region and investment approaches during the rise…

VC firm Antler’s CEO says Asia presents ‘biggest opportunity’ in the world for growth

Temu is to face Europe’s strictest rules after being designated as a “very large online platform” under the Digital Services Act (DSA).

Chinese e-commerce marketplace Temu faces stricter EU rules as a ‘very large online platform’

Meta has been banned from launching features on Facebook and Instagram that would have collected data on voters in Spain using the social networks ahead of next month’s European Elections.…

Spain bans Meta from launching election features on Facebook, Instagram over privacy fears

Stripe, the world’s most valuable fintech startup, said on Friday that it will temporarily move to an invite-only model for new account sign-ups in India, calling the move “a tough…

Stripe curbs its India ambitions over regulatory situation