How it Works
How it Works
Frequently Asked Questions
Technical Documents & Guides
Internet of Things
How To Guides
Secure Email (S/MIME)
A to Z
Found 17 resources of type
Automation is now critical to any certificate management system. Not only does it reduce the overall cost of ownership; but automation also enforces cryptographic compliance and prevents potential service disruptions caused by human error.
Subordinate Public CA
The Sectigo subordinate CA program allows partners to issue digital certificates using a custom-branded subordinate CA certificate from Sectigo’s globally-trusted root CA.
Private Certification Authority Service
Under a Private CA, enterprises can create their own private root certificates, which can issue private, end-entity certificates to their internal servers and users.
Sectigo Channel Partner Program Guide
This guide outlines a partner’s eligibility, level, and associated benefits of membership in the program. Sectigo reserves the right, at its sole discretion, to modify this Program Guide.
Securing Email with S/MIME Certificates for HIPAA Compliance
Meeting Federal Requirements For Secure Email
Compliance to Defense Federal Acquisition Regulation - Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations
Email Certificates For GDPR Compliance
Enable Encryption and Identity Authentication for Greater Email Security with S/MIME Certificates
Sectigo SSL Solutions Brief
All SSL certificates must be issued by a Certificate Authority (CA) with roots that are trusted by client operating systems and browsers. By regulation, CAs must follow a codified, minimum vetting process before issuing any SSL certificate.
Sectigo IoT Manager Brief
With more than one billion devices deployed today, Internet of Things (IoT) is among the most important growth areas for technology in the coming years. Companies of all sizes and industries are planning and implementing IoT strategies.
Sectigo S/MIME Email Certificates Brief
Posing as legitimate employees, servers, or devices, hackers can utilize email to infiltrate an organization’s digital infrastructure and wreak havoc on its business. You can combat these potential attacks by signing email using Sectigo.
Sectigo Code Signing Brief
Sectigo Code Signing enables developers to add a layer of assurance, informing users the software they’re receiving can be trusted. Utilizing certificates that allow developers to digitally sign software before distribution.
Sectigo Certificate Manager Brief
Sectigo Certificate Manager is the cloud-based platform that gives businesses complete visibility and lifecycle control over any certificate in their environments, helping them reduce risk, quickly respond to threats, and control costs.
Chat With Us
We are here for you!
Talk to a fellow human.