Venafi SSH Protect Introduction

Venafi Trust Protection Platform™ automates the provisioning, discovery, monitoring, validation and management of encryption keys and digital certificates. Trust Protection Platform supports heterogeneous certificate authorities (CAs), multiple platform deployments, and various encryption types, and has proven scalability within some of the world's largest deployments. With Trust Protection Platform, you can ensure that your encryption systems provide the security they are designed to deliver while at the same time reducing operational risk and administrative workload.

Venafi SSH Protect provides the ability to manage SSH keysets by helping you discover the SSH keys in use across your environment and rotate the keysets. These features help you be proactive in identifying weak keys or keys that fall outside your organization's policies (for example, in terms of age or security level). You can also quickly react to a security incident by rotating all affected keys quickly and efficiently.

For more information on SSH Protect, see Venafi SSH Protect Introduction

To browse all the topics in this section, use the menu on the right side of this page. The Next Topic and Previous Topic buttons on the bottom of each page allow you to navigate page-by-page.

If you're already familiar with Venafi SSH Protect and want to find instructions for a task based on your role, use the links below.

 

Venafi SSH Protect tasks based on role