How it Works
How it Works
Frequently Asked Questions
Technical Documents & Guides
Internet of Things
How To Guides
Secure Email (S/MIME)
A to Z
Found 15 resources of type
Leveraging PKI to Secure Connected Devices and Enable IoT Business Models
The Sectigo IoT Platform removes the complexity of PKI, allowing manufactures to easily, scalably, and cost effectively authenticate connected devices and protect them from fraud, theft, and tampering.
Understanding the Role of Extended Validation Certificates in Internet Abuse
Original research from Georgia Tech's Cyber Forensics Innovation Lab shows that domains with EV SSL certificates are 99.99% likely to be free of online abuse. Download the report here.
Supporting Microsoft CA with Sectigo Certificate Manager Private CA
Sectigo Certificate Manager provides enterprises with a Private Certificate Authority (CA) solution, delivering a complete, managed public key infrastructure (PKI) platform.
Sectigo Product Guide
Whether implementing a single solution or a multi-layered approach, Sectigo’s diverse range of web security products complement each other to deliver a full spectrum of protection.
Zero Touch Email Certificate Deployment
S/MIME certificates protect against spying and social engineering attacks that depend on email and comply with mandatory regulatory requirements. Sectigo’s Zero-Touch S/MIME solution is easy to install and manage for enterprise application.
Ensuring Compliance Through Email Certificates
Businesses across all industries depend on email as an indispensable communication medium.
BEC and Sectigo SMIME
Email hacking is a commonly used malicious tactic in our increasingly connected world. Business email compromise (BEC), or email account compromise (EAC), is one such scheme that uses email hacking for potentially huge payouts for attackers
Extended Validation SSL: Your Key to Maximizing Online Trust
Extended Validation (EV) SSL is the highest-security form of SSL certificate available. EV SSL certificates take advantage of proven, highly trusted authentication methods to give the best possible assurance of a web site’s legitimacy.
The Value of Automatic SSL Certificate Installation for Enterprises
The installation of SSL certificates is labor intensive, requires scarce skills, and poses a risk to the enterprise. This document outlines the value of automating SSL certificate installation and renewal.
Digital Identities for Identity and Access Management
One of the leading attacks on an Enterprise occurs when the attacker impersonates a legitimate user or device to steal intellectual property, or otherwise harm the business. A strong digital identity is the best proven method to prevent.
Beware: Phishing Attacks Using SSL Are On The Rise
The rate of phishing attacks using a valid DV SSL certificate has grown from 450 in all of 2005 to 47,500 in the first quarter of 2017.
Enterprise Certificate Authority Made Easy
While PKI is the most secure and easy to use digital identity, the challenge remains to make it the easiest to deploy and Sectigo makes deployment and management easy for both a customer premises Microsoft CA and Sectigo.
Chat With Us
We are here for you!
Talk to a fellow human.