Venafi TLS Protect Reviews & Product Details

Venafi TLS Protect Overview

What is Venafi TLS Protect?

Provides dynamic protection for machine identities across your extended infrastructure in one trust platform. Global visibility, deep intelligence and automation of all aspects of machine identities allow you to rapidly identify and automatically correct vulnerabilities and weaknesses in keys and certificates at machine speed and scale.

Venafi TLS Protect Details
Product Description

Provides dynamic protection for machine identities across your extended infrastructure in one trust platform. Global visibility, deep intelligence and automation of all aspects of machine identities allow you to rapidly identify and automatically correct vulnerabilities and weaknesses in keys and certificates at machine speed and scale.


Seller Details
Seller
Venafi
Company Website
HQ Location
Salt Lake City, UT
Twitter
@Venafi
5,169 Twitter followers
Show More
Answer a few questions to help the Venafi TLS Protect community
Have you used Venafi TLS Protect before?
Yes

Venafi TLS Protect Reviews

Write a Review
Filter reviews
LinkedIn®
Connections
Showing 2 Venafi TLS Protect reviews
Showing 2 reviews
Filter Reviews
Filter Reviews
Sort by
Ratings
Company Size
User Role
All Industries
Region
Already have Venafi TLS Protect?
Write a Review
Financial Advisor, Ameriprise Financial Services, Inc.
Enterprise(> 1000 emp.)
Validated Reviewer
Review source: Invitation from G2
What do you like best?

The software is simple to use. It is not a resource hog and easy to explain. Review collected by and hosted on G2.com.

What do you dislike?

When you go to put in a password and hit enter it doesn’t automatically verify it take you back to the home screen...just a quirk. Review collected by and hosted on G2.com.

Recommendations to others considering the product:

This software does what it is advertised to do. User friendly and cost effective. Review collected by and hosted on G2.com.

What problems are you solving with the product? What benefits have you realized?

The monitoring it provides is very good and it is fairly autonomous. It does not slow down our computers and runs effectively in the back ground. Review collected by and hosted on G2.com.

Show More
Show Less
CI
Mid-Market(51-1000 emp.)
Validated Reviewer
Verified Current User
Review source: Invitation from G2
What do you like best?

The best part is logic of structure, notifications on the expiring certs and the workflow specifics and flexibility. And the support reply more or less quick and on point. Compared to other on the market - this one actually seems to listen to the corporate public and add on new capabilities. Review collected by and hosted on G2.com.

What do you dislike?

Sometimes support gets smitten with the new issues, the ones that are not covered in the standard support process. Then it takes a lot of time to get things moved on. Still a startup, so sometimes non-official communication is to be expected. Review collected by and hosted on G2.com.

Recommendations to others considering the product:

Ask for customization, they are available. Review collected by and hosted on G2.com.

What problems are you solving with the product? What benefits have you realized?

Well, as said, centralized management of the certificates, and in a forest of 50k+ it is more than great tool helping there. Review collected by and hosted on G2.com.

Show More
Show Less

There are not enough reviews of Venafi TLS Protect for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Egnyte Logo
Egnyte
4.3
(631)
Egnyte delivers the only modern content platform that is purpose-built for businesses. Egnyte gives IT centralized control and protection over their files, and users fast access to their content, no matter how or where work happens.
2
Keyfactor Command Logo
Keyfactor Command
4.5
(20)
Keyfactor Command, formerly Certified Security Solutions (CSS), is a leading provider of secure digital identity management solutions that enables organizations to confirm authenticity, and ensure the right things are interacting in the right ways in our connected world.
3
OpenSSH Logo
OpenSSH
4.7
(39)
OpenSSH provides tools that allows you to encrypt all traffic to help manage eavesdropping, connection hijacking, and other attacks to your Internet while providing secure tunneling capabilities and more.
4
HashiCorp Vault Logo
HashiCorp Vault
4.3
(30)
HashiCorp Vault is a tool that secure user applications and infrastructure to limit the surface area and attack time in the event of a breach
5
Azure Key Vault Logo
Azure Key Vault
4.2
(29)
Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms and enables the use of Hardware Security Modules (HSM) for high value customer keys.
6
AWS Key Management Service (KMS) Logo
AWS Key Management Service (KMS)
4.3
(27)
AWS Key Management Service (KMS) is a service that help to create and control the encryption keys used to encrypt data, and uses Hardware Security Modules (HSMs) to protect the security of keys.
7
TokenEx Logo
TokenEx
4.6
(17)
TokenEx is an enterprise-class tokenization platform that offers virtually unlimited flexibility in how customers can access, store, and secure data. TokenEx extends flexibility by working with multiple data acceptance channels and by maintaining a processor-agnostic approach. Moreover, TokenEx is able to tokenize and secure almost any data type your company works with, including PCI, PII, PHI, and even unstructured data formats.
8
AWS CloudHSM Logo
AWS CloudHSM
4.3
(12)
AWS CloudHSM is a cloud-based hardware security module (HSM) that enables you to easily generate and use your own encryption keys on the AWS Cloud.
9
GnuPG Logo
GnuPG
4.2
(11)
GnuPG allows to encrypt and sign your data and communication, features a versatile key management system as well as access modules for all kinds of public key directories.
10
Vormetric Data Security Platform Logo
Vormetric Data Security Platform
3.8
(2)
Vormetric is a data security platform that helps companies move and quickly to protect data wherever it resides any database, and application in any server environment.
Show More