TechValidate Research on Venafi

These pages present data that TechValidate has sourced via direct research with verified customers and users of Venafi. TechValidate stands behind the authenticity of all published data. Learn more »

557 Customers Surveyed

4,453 Data Points Collected

104 Published TechFacts

28 Published Charts

46 Published Case Studies

Selected Research Highlights

Venafi Customer Research

Benefits of Machine Identity Protection

Venafi automation overcomes these key and certificate challenges:

Life Cycle Automation
Elimination of Manual Processes
Accelerated Acquisition for DevOps
Distribution to Security Technologies
Provisioning for Cloud Services
Scalable Certificate Distribution

Venafi Case Study

Leading Airline Uses Venafi for Both SSH Key Management and PKI Refresh


This case study of a large enterprise transportation services company is based on a September 2015 survey of Venafi customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“Venafi is the only tool/app in the key management space.”


The business challenges that led the profiled company to evaluate and ultimately select Venafi:

  • Managed their keys and certificates using manual tracking and management (e.g., spreadsheet) before Venafi.
  • Problems solved using Venafi:
    • Identity and access management (including privileged access management / SSH)
    • PKI refresh

Use Case

The key features and functionalities of Venafi that the surveyed company uses:

  • Venafi products currently being used:
    • TrustAuthority SSL
    • TrustAuthority SSH
    • TrustForce SSL
    • TrustForce SSH
    • TrustNet
  • Systems integrated with Venafi:
    • Public Certificate Authority
    • Private Certificate Authority


The surveyed company achieved the following results with Venafi:

  • Improved their internal IT services SLA from weeks to days with Venafi.
  • Found 1500 additional keys and certificates using Venafi that were previously unknown.
  • Key and certificate visibility improved by 51-75% after finding additional keys and certificates using Venafi.
  • Vulnerabilities to be addressed with Venafi:
    • Heartbleed
    • SSL inspection for threats
    • SHA-1 to SHA-2 migration
    • The use of secure key length
    • Key and certificate ownership identification
    • Key and certificate lifecycle policies
    • SSH misuse
    • Certificate reputation

Venafi Case Study

Large Enterprise Computer Services Company


  • Business challenges that led to purchasing Venafi:
    • Avoid certificate-related outages
    • Automate certificate management to lower costs and resource usage
    • Secure privileged access (IAM, including SSH)
    • Achieve compliance / audit remediation

“The Venafi team is extremely responsive to our needs and issue. We have annual meetings to discuss both company’s roadmaps and try to align them. And the time savings and ease of reporting allows resources to be dedicated to other projects.”

Budget Justification

  • PKI Administration took the lead in purchasing Venafi.


  • Has > 75 lines of business or departments directly interacting with the Venafi platform.
  • Top benefits experienced or will experience with Venafi:
    • Prevented and remediated outages
    • Increased compliance
    • Improved labor / cost savings
  • Will save 3 FTEs annually by using Venafi.
  • Saved $150,000 annually by using Venafi.

Next Steps

  • Plans to expand their use of Venafi in the following ways:
    • Expand their use of Venafi to other use cases (e.g., code-signing, SSH, Mobility, DevOps support, etc.)
    • Expand their use of Venafi to cover more keys and/or certificates

5/5 Stars

How has Venafi Professional Services improved your deployment of your Venafi products?

I have complete faith in our Venafi deployment.

Venafi Customer Satisfaction Rating

Enterprise Mobile Protection

An IT Professional at a Global 500 retail company would be very likely to recommend Venafi for this reason:

The support team is always very helpful when I need them. This solution enables me to allow my users to get a certificate and push the certificate onto their device.

Venafi Customer Research

Financial Services: Key and Certificate Vulnerabilities Addressed

What vulnerabilities did you / do you plan to address with Venafi?

Key and certificate lifecycle policies
SHA-1 to SHA-2 migration
Key and certificate ownership identification
Use of secure key length
SSL inspection for threats
Certificate reputation

More to Explore

About Venafi

Venafi is the cybersecurity market leader in machine identity protection, securing the cryptographic keys and digital certificates on which every business and government depends to deliver safe machine-to-machine communication. Organizations use Venafi key and certificate security to protect communications, commerce, critical systems and data, and mobile and user access.

  Venafi Website