Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

3/27/2013
07:39 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

74 Percent of Enterprise IT Professionals Say SaaS Certificate Authorities Provide Greater Security Than Internal CAs

Survey Reveals SaaS Certificate Authorities Reduce Management Burdens Caused by Internal CAs such as Microsoft Certificate Services

Boston, MA – March 27, 2013 - GlobalSign, the enterprise SaaS Certificate Authority (CA), today announced survey findings revealing the advantages of using a public SaaS CA versus an internal CA, such as Microsoft Certificate Services, for digital certificate issuance and management. A full report with executive summary is available at www.globalsign.com/resources/saas-based-ca-report.pdf. Just as physical IDs ensure trust in the real world, digital certificates ensure trust across the Internet, establishing secure communications between servers, machines, people and enterprise cloud infrastructures. The GlobalSign survey revealed that 74 percent of enterprise IT professionals who responded find SaaS CA providers to be more secure than Microsoft Certificate Services. The survey also revealed that 55 percent of respondents use SaaS CAs to issue digital certificates, and 44 percent of respondents believe SaaS CAs significantly reduce the costs and management burden caused by internal CA processes.

Enterprises use two types of digital certificate services to secure data, their networks, cloud infrastructures and applications. Internal CAs require organizations to create, sign and manage certificates, a process requiring advanced knowledge of the Public Key Infrastructure (PKI) environment and significant time and human resources. SaaS CAs provide enterprises with trusted certificates, the latest in security technology, PKI service management, and fast and easy deployment, without requiring advanced PKI knowledge and significant resources.

“As enterprises become more dependent on digital communications, cloud infrastructures and mobile communications, the need for digital certificates will continue to rise exponentially, providing a challenge to enterprises everywhere," said Steve Waite, CEO of GlobalSign Americas. “The survey proved our initial belief to be true: SaaS CAs provide enhanced services, ease of management and superior security when compared to internal CAs. SaaS CAs allow IT departments to quickly implement certificate services that enable secure communications and protect sensitive data without the administrative burdens and technical headaches of internal CAs.”

Key Survey Findings: When asked about the administrative burden internal CAs such as Microsoft cause, respondents that answered revealed the following: • 45 percent feel that the management of certificates is too complex and that they would rather use a SaaS CA provider • 50 percent responded that they do not have the internal resources or staff with the technical expertise and audit requirements in digital certificates to use an internal CA • 53 percent do not want to bear the burden of maintaining the ever-changing PKI environment

When asked why it is easier to use a SaaS CA as opposed to Microsoft, respondents that answered revealed the following: • 47 percent say it is easier because they do not need internal PKI expertise when using a SaaS CA • 53 percent note that using a SaaS CA is easier because certificate policy standards are already established • 53 percent say SaaS CAs provide the most advanced, up-to-date security • 53 percent feel that the SaaS model eliminates management, upgrade costs and other burdens • 25 percent of respondents plan on increasing use of third-party certificates by over 50 percent in the next two years

For more information on the survey findings and to access the GlobalSign report, www.globalsign.com/resources/saas-based-ca-report.pdf.

The survey polled 154 respondents from various industries, including but not limited to financial services, healthcare, manufacturing, government, retail and technology. Titles of respondents include but are not limited to CEO, vice president, director, IT manager, network administrator and systems administrator. Not all questions applied to all respondents; percentages are based on the number of respondents who answered questions specific to each findings area.

For more information on GlobalSign visit www.globalsign.com. To follow GlobalSign on Twitter, click here. To interact with GlobalSign on Facebook, click here.

About GMO GlobalSign GlobalSign has been a trust service provider since 1996. Its focus has been, and always will be, on providing convenient and highly productive PKI solutions for organizations of all sizes. Its core Digital Certificate solutions allow its thousands of authenticated customers to conduct SSL secured transactions, data transfer, distribution of tamper-proof code, and protection of online identities for secure email and access control. Vision and commitment to innovation led to GlobalSign being recognized by Frost & Sullivan for the 2011 Product Line Strategy Award. The company has local offices in the US, Europe and throughout Asia. For the latest news on GlobalSign visit www.globalsign.com or follow GlobalSign on Twitter (@globalsign).

GMO Internet Group GMO Internet Group is a comprehensive provider of industry-leading Internet solutions including domain name registration, cloud-based and traditional hosting, ecommerce, security, and payment processing services that each hold the top share of their respective markets in Japan. Other key business areas for the Group include online securities/FX trading, Internet advertising, search engine marketing and online research, and smartphone game development and publishing. GMO Internet, Inc. (TSE: 9449) is headquartered in Tokyo, Japan. Please visit http://www.gmo.jp/en for more information.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
4 Security Tips as the July 15 Tax-Day Extension Draws Near
Shane Buckley, President & Chief Operating Officer, Gigamon,  7/10/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15105
PUBLISHED: 2020-07-10
Django Two-Factor Authentication before 1.12, stores the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authenticati...
CVE-2020-11061
PUBLISHED: 2020-07-10
In Bareos Director less than or equal to 16.2.10, 17.2.9, 18.2.8, and 19.2.7, a heap overflow allows a malicious client to corrupt the director's memory via oversized digest strings sent during initialization of a verify job. Disabling verify jobs mitigates the problem. This issue is also patched in...
CVE-2020-4042
PUBLISHED: 2020-07-10
Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director's cram-md5 challenge to...
CVE-2020-11081
PUBLISHED: 2020-07-10
osquery before version 4.4.0 enables a priviledge escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables l...
CVE-2020-6114
PUBLISHED: 2020-07-10
An exploitable SQL injection vulnerability exists in the Admin Reports functionality of Glacies IceHRM v26.6.0.OS (Commit bb274de1751ffb9d09482fd2538f9950a94c510a) . A specially crafted HTTP request can cause SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerabi...