When Machines Talk, Who Do You Trust? Elevating Autonomous Trust with AppViewX AVX ONE CLM

It only takes one expired certificate to bring everything to a halt. When a certificate expired at a smart meter company, it halted energy tracking for over 15 million homes. In another ...

Let’s Encrypt Issued Its First Six-Day Certificate—Here’s Why Certificate Lifecycle Management Automation Matters

In late 2024, Let’s Encrypt caught many by surprise by announcing plans to introduce shorter-lived certificates, specifically, certificates with a six-day lifespan. Their 2024 Annual Report described this move a “big upgrade ...
Integrating AVX ONE CLM with AWS Certificate Manager (ACM)

Certificate Lifecycle Management Automation with AWS Certificate Manager and AppViewX AVX ONE CLM

AWS Certificate Manager (ACM) enables AWS customers to provision and manage SSL/TLS certificates in AWS services and connected resources. However, several challenges can arise when using ACM for comprehensive end-to-end certificate lifecycle ...

Securing Modern Applications in Amazon EKS with AVX ONE CLM for Kubernetes

Modern applications are increasingly deployed in containers to leverage scalability, availability, and simplified maintenance. Migrating legacy applications to managed Kubernetes services like Amazon Elastic Kubernetes Service (Amazon EKS) provides significant benefits such ...
Get Ready for 90-day TLS Certificates with AppViewX

PKI and CLM Insights from 2024: Preparing for a Cyber Resilient 2025

As the year winds down, it’s the perfect time to pause for retrospection. 2024 has been both exciting and challenging for the PKI and CLM space, pushing the industry to rethink strategies ...

Apple Follows Google’s Lead: Get Ready for 45-Day TLS Certificate Lifespans

At the last CA/Browser (CA/B) Forum meeting, Apple dropped a big announcement, causing quite a stir in the PKI industry. Apple introduced a draft ballot, proposing a gradual reduction of the maximum ...

The AppViewX Experience: A Journey to Seamless Solution Onboarding

In today’s digital world where availability and security are of the utmost importance, time is of the essence. We know how important it is for our customers to get up and running ...
SSH Key Sprawl: Causes and Consequences

SSH Key Sprawl: Causes and Consequences

Providing and managing privileged remote access to servers and systems is critical for uninterrupted operations in modern-day business. Secure Shell (SSH) is a standard network protocol used for this purpose. SSH keys ...
AppViewX AVX ONE CLM – Managing Java TrustStore with Google Cloud Platform

AppViewX AVX ONE CLM – Managing Java TrustStore with Google Cloud Platform

Google Cloud Storage is a highly scalable, secure, and durable object storage service designed to handle vast amounts of data for a wide range of applications. As part of the Google Cloud ...
Securing Kubernetes: The Risks Of Unmanaged Machine Identities

Securing Kubernetes: The Risks Of Unmanaged Machine Identities

Microservices and containers are changing the way businesses build, deploy, and manage their applications. Within a short span, these technologies have become the de facto standard for software development and distribution. Kubernetes, ...