{"id":7658,"date":"2021-12-02T08:39:52","date_gmt":"2021-12-02T06:39:52","guid":{"rendered":"https:\/\/www.almtoolbox.com\/blog_he\/?p=7658"},"modified":"2022-01-24T08:13:13","modified_gmt":"2022-01-24T06:13:13","slug":"we-represent-venafi-israel","status":"publish","type":"post","link":"https:\/\/www.almtoolbox.com\/blog_he\/we-represent-venafi-israel\/","title":{"rendered":"\u05d0\u05e0\u05d5 \u05de\u05d9\u05d9\u05e6\u05d2\u05d9\u05dd \u05d0\u05ea \u05d4\u05e4\u05ea\u05e8\u05d5\u05e0\u05d5\u05ea \u05e9\u05dc \u05d7\u05d1\u05e8\u05ea Venafi"},"content":{"rendered":"<p>\u05dc\u05d0\u05d7\u05e8\u05d5\u05e0\u05d4 \u05d4\u05ea\u05d7\u05dc\u05e0\u05d5 \u05dc\u05d9\u05d9\u05e6\u05d2 \u05d1\u05d0\u05d5\u05e4\u05df \u05e8\u05e9\u05de\u05d9 \u05d0\u05ea \u05d7\u05d1\u05e8\u05ea Venafi \u05d1\u05d9\u05e9\u05e8\u05d0\u05dc \u05d5\u05d1\u05e8\u05d7\u05d1\u05d9 \u05d4\u05e2\u05d5\u05dc\u05dd.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-7659\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2022\/01\/Venafi_logo.svg_.png\" alt=\"venafi logo\" width=\"512\" height=\"95\" srcset=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2022\/01\/Venafi_logo.svg_.png 512w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2022\/01\/Venafi_logo.svg_-300x56.png 300w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/><\/p>\n<p>\u05d7\u05d1\u05e8\u05ea Venafi \u05de\u05e6\u05d9\u05e2\u05d4 \u05d0\u05d5\u05e1\u05e3 \u05e4\u05ea\u05e8\u05d5\u05e0\u05d5\u05ea \u05dc\u05e0\u05d9\u05d4\u05d5\u05dc \u05d6\u05d4\u05d5\u05d9\u05d5\u05ea \u05e9\u05dc \u05d4\u05ea\u05e7\u05e9\u05e8\u05d5\u05d9\u05d5\u05ea \u05d1\u05d9\u05df \u05de\u05db\u05d5\u05e0\u05d5\u05ea,<br \/>\n\u05d5\u05d1\u05e4\u05e8\u05d8 \u05de\u05e4\u05ea\u05d7\u05d5\u05ea TLS \u05d5\u05ea\u05e2\u05d5\u05d3\u05d5\u05ea (certificates), \u05de\u05e4\u05ea\u05d7\u05d5\u05ea SSH, \u05d7\u05ea\u05d9\u05de\u05d4 \u05e2\u05dc \u05ea\u05d5\u05db\u05e0\u05d5\u05ea (code signing keys).<\/p>\n<p>\u05e4\u05ea\u05e8\u05d5\u05e0\u05d5\u05ea \u05d4\u05d7\u05d1\u05e8\u05d4 \u05de\u05ea\u05de\u05de\u05e9\u05e7\u05d9\u05dd \u05e2\u05dd \u05db\u05dc\u05d9\u05dd \u05de\u05d5\u05d1\u05d9\u05dc\u05d9\u05dd \u05db\u05d2\u05d5\u05df<br \/>\nHashiCorp Vault, F5, Check Point, Imperva, CyberArk, AWS, Gigamon, Gemalto, Akeyless and more<\/p>\n<h3>\u05dc\u05de\u05d9\u05d3\u05e2 \u05e0\u05d5\u05e1\u05e3 \u05e4\u05e0\u05d5 \u05d0\u05dc\u05d9\u05e0\u05d5:<\/h3>\n<p><a href=\"mailto:venafi@almtoolbox.com\" target=\"_blank\" rel=\"noopener\">venafi@almtoolbox.com<\/a> \u05d0\u05d5 \u05d8\u05dc\u05e4\u05d5\u05e0\u05d9\u05ea 072-240-5222<\/p>\n<h3>\u05e1\u05e8\u05d8\u05d5\u05df \u05d4\u05e1\u05d1\u05e8 \u05e7\u05e6\u05e8 (\u05d3\u05e7\u05d4 \u05d5\u05d7\u05e6\u05d9) \u05e2\u05dc \u05e0\u05d9\u05d4\u05d5\u05dc \u05d6\u05d4\u05d5\u05d9\u05d5\u05ea \u05de\u05db\u05d5\u05e0\u05d4:<\/h3>\n<p>\u05de\u05d5\u05e2\u05d1\u05e8 \u05e2&quot;\u05d9 \u05de\u05e0\u05db&quot;\u05dc Jeff Hudson Venafi<\/p>\n<div style=\"padding: 57% 0 0 0; position: relative;\"><iframe style=\"position: absolute; top: 0; left: 0; width: 100%; height: 100%;\" title=\"Machine Identity Protection Explained\" src=\"https:\/\/player.vimeo.com\/video\/669060816?h=555acddca8&amp;badge=0&amp;autopause=0&amp;player_id=0&amp;app_id=58479\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/div>\n<p><script src=\"https:\/\/player.vimeo.com\/api\/player.js\"><\/script><br \/>\n(\u05dc\u05e0\u05d5\u05d7\u05d9\u05d5\u05ea\u05db\u05dd \u05d4\u05d5\u05e1\u05e4\u05e0\u05d5 \u05db\u05ea\u05d5\u05d1\u05d9\u05d5\u05ea)<\/p>\n<h3>\u05d0\u05e0\u05d5 \u05de\u05e6\u05d9\u05e2\u05d9\u05dd \u05de\u05d2\u05d5\u05d5\u05df \u05e4\u05ea\u05e8\u05d5\u05e0\u05d5\u05ea \u05e1\u05d1\u05d9\u05d1 Venafi :<\/h3>\n<p>\u05d9\u05e2\u05d5\u05e5, \u05e2\u05d6\u05e8\u05d4 \u05d1\u05d1\u05d7\u05d9\u05e8\u05ea \u05d4\u05e8\u05d9\u05e9\u05d5\u05d9 \u05d4\u05de\u05ea\u05d0\u05d9\u05dd \u05d5\u05de\u05db\u05d9\u05e8\u05ea \u05e8\u05d9\u05e9\u05d5\u05d9, \u05d7\u05d9\u05d1\u05d5\u05e8 \u05dc\u05db\u05dc\u05d9\u05dd \u05d5\u05ea\u05d4\u05dc\u05d9\u05db\u05d9 \u05e2\u05d1\u05d5\u05d3\u05d4 \u05d5\u05e2\u05d5\u05d3.<br \/>\n\u05e4\u05ea\u05e8\u05d5\u05e0\u05d5\u05ea Venafi \u05de\u05ea\u05d5\u05d5\u05e1\u05e4\u05d9\u05dd \u05dc\u05de\u05d2\u05d5\u05d5\u05df \u05e4\u05ea\u05e8\u05d5\u05e0\u05d5\u05ea \u05d4- DevOps , CI\/CD \u05d5- DevSecOps \u05e9\u05d0\u05e0\u05d5 \u05de\u05e6\u05d9\u05e2\u05d9\u05dd.<\/p>\n<h3>\u05dc\u05e4\u05e8\u05d8\u05d9\u05dd \u05e0\u05d5\u05e1\u05e4\u05d9\u05dd \u05e4\u05e0\u05d5 \u05d0\u05dc\u05d9\u05e0\u05d5:<\/h3>\n<p><a href=\"mailto:venafi@almtoolbox.com\" target=\"_blank\" rel=\"noopener\">venafi@almtoolbox.com<\/a> \u05d0\u05d5 \u05d4\u05ea\u05e7\u05e9\u05e8\u05d5: 072-240-5222<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u05dc\u05d0\u05d7\u05e8\u05d5\u05e0\u05d4 \u05d4\u05ea\u05d7\u05dc\u05e0\u05d5 \u05dc\u05d9\u05d9\u05e6\u05d2 \u05d1\u05d0\u05d5\u05e4\u05df \u05e8\u05e9\u05de\u05d9 \u05d0\u05ea \u05d7\u05d1\u05e8\u05ea Venafi \u05d1\u05d9\u05e9\u05e8\u05d0\u05dc \u05d5\u05d1\u05e8\u05d7\u05d1\u05d9 \u05d4\u05e2\u05d5\u05dc\u05dd. \u05d7\u05d1\u05e8\u05ea Venafi \u05de\u05e6\u05d9\u05e2\u05d4 \u05d0\u05d5\u05e1\u05e3 \u05e4\u05ea\u05e8\u05d5\u05e0\u05d5\u05ea \u05dc\u05e0\u05d9\u05d4\u05d5\u05dc \u05d6\u05d4\u05d5\u05d9\u05d5\u05ea \u05e9\u05dc \u05d4\u05ea\u05e7\u05e9\u05e8\u05d5\u05d9\u05d5\u05ea \u05d1\u05d9\u05df \u05de\u05db\u05d5\u05e0\u05d5\u05ea, \u05d5\u05d1\u05e4\u05e8\u05d8 \u05de\u05e4\u05ea\u05d7\u05d5\u05ea TLS \u05d5\u05ea\u05e2\u05d5\u05d3\u05d5\u05ea (certificates), \u05de\u05e4\u05ea\u05d7\u05d5\u05ea SSH, \u05d7\u05ea\u05d9\u05de\u05d4 \u05e2\u05dc \u05ea\u05d5\u05db\u05e0\u05d5\u05ea (code signing keys). \u05e4\u05ea\u05e8\u05d5\u05e0\u05d5\u05ea \u05d4\u05d7\u05d1\u05e8\u05d4 \u05de\u05ea\u05de\u05de\u05e9\u05e7\u05d9\u05dd \u05e2\u05dd \u05db\u05dc\u05d9\u05dd \u05de\u05d5\u05d1\u05d9\u05dc\u05d9\u05dd \u05db\u05d2\u05d5\u05df HashiCorp Vault, F5, Check Point, Imperva, CyberArk, AWS, Gigamon, Gemalto, Akeyless and more [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":7659,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[189,666],"tags":[668,667],"class_list":["post-7658","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-devsecops","category-venafi","tag-machine-identity","tag-667"],"_links":{"self":[{"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/posts\/7658","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/comments?post=7658"}],"version-history":[{"count":0,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/posts\/7658\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/media\/7659"}],"wp:attachment":[{"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/media?parent=7658"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/categories?post=7658"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/tags?post=7658"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}