Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

3/27/2013
07:39 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

74 Percent of Enterprise IT Professionals Say SaaS Certificate Authorities Provide Greater Security Than Internal CAs

Survey Reveals SaaS Certificate Authorities Reduce Management Burdens Caused by Internal CAs such as Microsoft Certificate Services

Boston, MA – March 27, 2013 - GlobalSign, the enterprise SaaS Certificate Authority (CA), today announced survey findings revealing the advantages of using a public SaaS CA versus an internal CA, such as Microsoft Certificate Services, for digital certificate issuance and management. A full report with executive summary is available at www.globalsign.com/resources/saas-based-ca-report.pdf. Just as physical IDs ensure trust in the real world, digital certificates ensure trust across the Internet, establishing secure communications between servers, machines, people and enterprise cloud infrastructures. The GlobalSign survey revealed that 74 percent of enterprise IT professionals who responded find SaaS CA providers to be more secure than Microsoft Certificate Services. The survey also revealed that 55 percent of respondents use SaaS CAs to issue digital certificates, and 44 percent of respondents believe SaaS CAs significantly reduce the costs and management burden caused by internal CA processes.

Enterprises use two types of digital certificate services to secure data, their networks, cloud infrastructures and applications. Internal CAs require organizations to create, sign and manage certificates, a process requiring advanced knowledge of the Public Key Infrastructure (PKI) environment and significant time and human resources. SaaS CAs provide enterprises with trusted certificates, the latest in security technology, PKI service management, and fast and easy deployment, without requiring advanced PKI knowledge and significant resources.

“As enterprises become more dependent on digital communications, cloud infrastructures and mobile communications, the need for digital certificates will continue to rise exponentially, providing a challenge to enterprises everywhere," said Steve Waite, CEO of GlobalSign Americas. “The survey proved our initial belief to be true: SaaS CAs provide enhanced services, ease of management and superior security when compared to internal CAs. SaaS CAs allow IT departments to quickly implement certificate services that enable secure communications and protect sensitive data without the administrative burdens and technical headaches of internal CAs.”

Key Survey Findings: When asked about the administrative burden internal CAs such as Microsoft cause, respondents that answered revealed the following: • 45 percent feel that the management of certificates is too complex and that they would rather use a SaaS CA provider • 50 percent responded that they do not have the internal resources or staff with the technical expertise and audit requirements in digital certificates to use an internal CA • 53 percent do not want to bear the burden of maintaining the ever-changing PKI environment

When asked why it is easier to use a SaaS CA as opposed to Microsoft, respondents that answered revealed the following: • 47 percent say it is easier because they do not need internal PKI expertise when using a SaaS CA • 53 percent note that using a SaaS CA is easier because certificate policy standards are already established • 53 percent say SaaS CAs provide the most advanced, up-to-date security • 53 percent feel that the SaaS model eliminates management, upgrade costs and other burdens • 25 percent of respondents plan on increasing use of third-party certificates by over 50 percent in the next two years

For more information on the survey findings and to access the GlobalSign report, www.globalsign.com/resources/saas-based-ca-report.pdf.

The survey polled 154 respondents from various industries, including but not limited to financial services, healthcare, manufacturing, government, retail and technology. Titles of respondents include but are not limited to CEO, vice president, director, IT manager, network administrator and systems administrator. Not all questions applied to all respondents; percentages are based on the number of respondents who answered questions specific to each findings area.

For more information on GlobalSign visit www.globalsign.com. To follow GlobalSign on Twitter, click here. To interact with GlobalSign on Facebook, click here.

About GMO GlobalSign GlobalSign has been a trust service provider since 1996. Its focus has been, and always will be, on providing convenient and highly productive PKI solutions for organizations of all sizes. Its core Digital Certificate solutions allow its thousands of authenticated customers to conduct SSL secured transactions, data transfer, distribution of tamper-proof code, and protection of online identities for secure email and access control. Vision and commitment to innovation led to GlobalSign being recognized by Frost & Sullivan for the 2011 Product Line Strategy Award. The company has local offices in the US, Europe and throughout Asia. For the latest news on GlobalSign visit www.globalsign.com or follow GlobalSign on Twitter (@globalsign).

GMO Internet Group GMO Internet Group is a comprehensive provider of industry-leading Internet solutions including domain name registration, cloud-based and traditional hosting, ecommerce, security, and payment processing services that each hold the top share of their respective markets in Japan. Other key business areas for the Group include online securities/FX trading, Internet advertising, search engine marketing and online research, and smartphone game development and publishing. GMO Internet, Inc. (TSE: 9449) is headquartered in Tokyo, Japan. Please visit http://www.gmo.jp/en for more information.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18954
PUBLISHED: 2019-11-14
Pomelo v2.2.5 allows external control of critical state data. A malicious user input can corrupt arbitrary methods and attributes in template/game-server/app/servers/connector/handler/entryHandler.js because certain internal attributes can be overwritten via a conflicting name. Hence, a malicious at...
CVE-2019-3640
PUBLISHED: 2019-11-14
Unprotected Transport of Credentials in ePO extension in McAfee Data Loss Prevention 11.x prior to 11.4.0 allows remote attackers with access to the network to collect login details to the LDAP server via the ePO extension not using a secure connection when testing LDAP connectivity.
CVE-2019-3661
PUBLISHED: 2019-11-14
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in McAfee Advanced Threat Defense (ATD) prior to 4.8 allows remote authenticated attacker to execute database commands via carefully constructed time based payloads.
CVE-2019-3662
PUBLISHED: 2019-11-14
Path Traversal: '/absolute/pathname/here' vulnerability in McAfee Advanced Threat Defense (ATD) prior to 4.8 allows remote authenticated attacker to gain unintended access to files on the system via carefully constructed HTTP requests.
CVE-2019-3663
PUBLISHED: 2019-11-14
Unprotected Storage of Credentials vulnerability in McAfee Advanced Threat Defense (ATD) prior to 4.8 allows local attacker to gain access to the root password via accessing sensitive files on the system.