A large health insurer already struggled with certificate outages. But then the unthinkable happened.
Over a holiday weekend, the mobile app that their customers used to find doctors, manage claims and pay deductibles went down. The cause: a single expired F5 certificate. As a result, several customers weren’t able to pay their deductibles—and were accidentally kicked off their insurance plans.
The senior manager of InfoSec knew the company needed to secure their machine identities to safeguard business continuity. And having used Venafi in the past, she knew right where to turn.
Read this case study to learn how the insurer didn’t just eliminate their F5-based outages, but automated certificate management across their entire enterprise.
You’ll see how the health insurer:
- Discovered three times as many certificates with near real-time visibility
- Integrated TLS Protect with F5, right within the BIG-IQ management platform—and cut the time to provision F5 certificates from days to minutes
- Automated certificate management across the enterprise without impacting developer workflows, even in Kubernetes, Jenkins, Vault and Ansible workflows
- Reinforced security through automatic policy compliance, certificate revocation and audit log/report generation
“We needed insight into all our TLS certificates, not just our F5s—and we needed to automate certificate management across our enterprise. This problem affected everyone, and we [couldn’t] keep pretending.” - Senior Manager of InfoSec, Health Insurance Company