MS Office

Certificate based authentication News

View All News

Certificate based authentication Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Certificate based authentication Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

  • What to Look for in Secure Sockets Layer

    Any website that collects or transmits sensitive information must be protected by Secure Socket Layer encryption. SSL and its successor, Transport Security Layer (TLS), are security protocols used to create an encrypted link between a server and a client on the Internet, typically between a Web server and a Web browser. Failing to employ SSL/TLS can result in lawsuits and possible penalties should visitor data be compromised. Likewise, reputation damage can greatly impact future business.

    This Buyer's Guide explains SSL and TLS technology in general and the types of SSL certificates available today. It also reviews features to consider and offers insights on how to determine the best SSL for a particular enterprise.

    Infosec pros and others who study this guide will come away with a more thorough understanding of SSL/TLS and be able to better identify what their company needs when in the market for SSL.

     Continue Reading

  • How to buy the best SSL for your enterprise

    To choose the best SSL for your enterprise, you need to stay up to date on SSL/TLS encryption developments. Learn why SSL/TLS remains a vital technology and how to determine the approach that will work best for your company. Continue Reading

  • Is eDellRoot certificate vulnerability an isolated problem?

    Is the Dell eDellRoot security threat a serious problem and, if so, can it be prevented with self-signed root certificate authorities? Expert Michael Cobb explains the potential threats. Continue Reading

View All Evaluate

Manage Certificate based authentication

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Certificate based authentication Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

  • Exchange Online Protection adds tools to fight spammers

    Secure your email with EOP tools like DKIM and DMARC that verify incoming messages aren't spam or spoofs. Avoid unauthorized email with digital signatures and authenticated domains. Continue Reading

  • How can enterprises defend against digitally signed malware?

    Malicious software using legitimate digital certificates is reportedly on the rise. Expert Nick Lewis explains how to mitigate the risks of digitally signed malware. Continue Reading

  • Will TLS 1.3 solve the problems of certificate authorities?

    Transport Layer Security (TLS) and Secure Sockets Layer (SSL) cryptographic protocols have long been the cornerstone of Web application security, and the whole process finds its root (quite literally) in a system of signed certificates. The trouble is this security system has turned into a vulnerability. Too often an enterprise possesses a hodgepodge of signed certificates from various Certificate Authorities (CAs) that are thrown into the directories of protected services, and then often forgotten until they expire. Worse yet, recently hackers have managed to create fake certificates. CAs -- once a seemingly effective answer to ensuring Web security -- are now providing an attack surface for hackers to take advantage of.

    This technical guide surveys the CA landscape, opening with a field report on the latest CA security issue, the problem of fake certificates. To help explain the nature of this threat, our second chapter delves into the certificate system, current problems with it, and what enterprise IT staff can do. This guide’s closing chapter examines industry efforts to cope with the threat: TLS 1.3. Through this guide, IT professionals, and especially those concerned with network security, will learn the latest about TLS/SSL security. Continue Reading

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close