White Paper Examines Certificate Management Challenges and Entrust

With the constant evolution of security threats, forward-thinking companies must closely scrutinize their security framework.  Key components in an organization's security infrastructure are digital certificates, which not only provide identification assurances, but also support secure data transfer.  The IT departments of organizations may be tasked with managing, discovering and monitoring hundreds or even thousands of certificates, a massive duty in the grand scheme of protecting business critical information.

Frost & Sullivan's white paper, "Easing the Pains of Certificate Management: An Overview of Entrust, the No. 2 Provider of SSL Certificates in the Market," examines the need for digital certificates, as well as the responsibilities and challenges related to digital certificate management.  The white paper pays particular attention to Secure Sockets Layer (SSL) certificates, which are cryptographic protocols providing security and identification support, among the many types of digital certificates present at an organization.

Maintaining trust between an organization providing content and the end-user relies, in part, on the proper management of digital certificates.  Certificate management can be challenging due to the quantity of certificates in use, as well as the need to constantly control encryption levels on the certificates, ensure there are no rogue or expired certificates, and replace non-compliant certificates to conform to security policies or regulations within a security framework.

Additionally, there must be a high level of trust in the verification process by the Certification Authority (CA).  In 2011 alone, there were several breaches of two CAs.  This factor, along with the growing complexities of dangers organizations face on a daily basis, has pushed the industry to re-evaluate defense strategies.                  

"The need for proper and reliable IT security is of paramount importance to any enterprise involved in data transfer," said Frost & Sullivan Research Analyst Richard Martinez, Jr. "If implemented and maintained in a consistent and efficient manner, organizations can avoid the headache of an outage due to an expired certificate. An outage can result in the loss of traffic, costing an organization hundreds of thousands to millions of dollars."

To keep on top of this critical part of IT infrastructure, organizations need a certificate provider with a reputable brand, reliable track record and high-assurance certificates.  Frost & Sullivan has identified Entrust, an internationally-trusted digital certificate provider, as a leader in customer service and comprehensive management and discovery platforms that oversee a wide range of certificates.  This white paper evaluates Entrust security solutions, as well as the general landscape of the digital certificate environment.

"Entrust brings together value and trust, both of which are of the utmost importance to consumers leery of Web-based dangers," said Martinez.  "With the second highest market share in the total CA and high-assurance certificate markets, Entrust provides all-inclusive solutions to streamline the challenges of digital certificate management."

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3