Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

Abonnez-vous gratuitement à notre NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Se désabonner

Latest Delinea Product Update Streamlines DevOps Security

septembre 2022 par Patrick LEBRETON

Delinea, a leading announce the latest release of DevOps Secrets Vault, its high-speed vault for DevOps and DevSecOps teams. New enhancements include development support on the most recent Mac computers, and improved secrets management usability through automation, intended to reduce development time and increase visibility.

According to a 2022 Crowdstrike report, 80% of cyber attacks involve stolen credentials, and in late 2021 Gartner listed managing machine identities as one of the top five cybersecurity and risk trends. Delinea strives to reduce the risk of using hardcoded credentials in applications and services by instead dynamically injecting secure credentials with Just-in-Time access from DevOps Secrets Vault.


Expanded Support for developers on Macs

With added support for the M1 chip, developers coding on the latest Macs can now benefit from using DevOps Secrets Vault’s command line interface (CLI) and the DSV Engine (an agent supporting database dynamic secrets) as part of their toolset. Building upon its focus on seamless usability, Delinea continues to reduce friction that commonly arises when securing sensitive secrets and credentials, especially in fast-paced DevOps environments.


Continual interface improvements reduce friction for DevOps teams

Both the CLI and graphical interface receive continual usability and flexibility enhancements, allowing developers to work seamlessly in their preferred interface with their preferred tools while helping organizations decrease the risk of compromised credentials.

New features added to both interfaces include :

 Expanded support for Security Information and Event Management (SIEM) functionality

 A certified Ansible plugin for use on Ansible Automation Hub

 Enhanced authentication methods


Voir les articles précédents

    

Voir les articles suivants