Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

3/27/2013
07:39 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

74 Percent of Enterprise IT Professionals Say SaaS Certificate Authorities Provide Greater Security Than Internal CAs

Survey Reveals SaaS Certificate Authorities Reduce Management Burdens Caused by Internal CAs such as Microsoft Certificate Services

Boston, MA – March 27, 2013 - GlobalSign, the enterprise SaaS Certificate Authority (CA), today announced survey findings revealing the advantages of using a public SaaS CA versus an internal CA, such as Microsoft Certificate Services, for digital certificate issuance and management. A full report with executive summary is available at www.globalsign.com/resources/saas-based-ca-report.pdf. Just as physical IDs ensure trust in the real world, digital certificates ensure trust across the Internet, establishing secure communications between servers, machines, people and enterprise cloud infrastructures. The GlobalSign survey revealed that 74 percent of enterprise IT professionals who responded find SaaS CA providers to be more secure than Microsoft Certificate Services. The survey also revealed that 55 percent of respondents use SaaS CAs to issue digital certificates, and 44 percent of respondents believe SaaS CAs significantly reduce the costs and management burden caused by internal CA processes.

Enterprises use two types of digital certificate services to secure data, their networks, cloud infrastructures and applications. Internal CAs require organizations to create, sign and manage certificates, a process requiring advanced knowledge of the Public Key Infrastructure (PKI) environment and significant time and human resources. SaaS CAs provide enterprises with trusted certificates, the latest in security technology, PKI service management, and fast and easy deployment, without requiring advanced PKI knowledge and significant resources.

“As enterprises become more dependent on digital communications, cloud infrastructures and mobile communications, the need for digital certificates will continue to rise exponentially, providing a challenge to enterprises everywhere," said Steve Waite, CEO of GlobalSign Americas. “The survey proved our initial belief to be true: SaaS CAs provide enhanced services, ease of management and superior security when compared to internal CAs. SaaS CAs allow IT departments to quickly implement certificate services that enable secure communications and protect sensitive data without the administrative burdens and technical headaches of internal CAs.”

Key Survey Findings: When asked about the administrative burden internal CAs such as Microsoft cause, respondents that answered revealed the following: • 45 percent feel that the management of certificates is too complex and that they would rather use a SaaS CA provider • 50 percent responded that they do not have the internal resources or staff with the technical expertise and audit requirements in digital certificates to use an internal CA • 53 percent do not want to bear the burden of maintaining the ever-changing PKI environment

When asked why it is easier to use a SaaS CA as opposed to Microsoft, respondents that answered revealed the following: • 47 percent say it is easier because they do not need internal PKI expertise when using a SaaS CA • 53 percent note that using a SaaS CA is easier because certificate policy standards are already established • 53 percent say SaaS CAs provide the most advanced, up-to-date security • 53 percent feel that the SaaS model eliminates management, upgrade costs and other burdens • 25 percent of respondents plan on increasing use of third-party certificates by over 50 percent in the next two years

For more information on the survey findings and to access the GlobalSign report, www.globalsign.com/resources/saas-based-ca-report.pdf.

The survey polled 154 respondents from various industries, including but not limited to financial services, healthcare, manufacturing, government, retail and technology. Titles of respondents include but are not limited to CEO, vice president, director, IT manager, network administrator and systems administrator. Not all questions applied to all respondents; percentages are based on the number of respondents who answered questions specific to each findings area.

For more information on GlobalSign visit www.globalsign.com. To follow GlobalSign on Twitter, click here. To interact with GlobalSign on Facebook, click here.

About GMO GlobalSign GlobalSign has been a trust service provider since 1996. Its focus has been, and always will be, on providing convenient and highly productive PKI solutions for organizations of all sizes. Its core Digital Certificate solutions allow its thousands of authenticated customers to conduct SSL secured transactions, data transfer, distribution of tamper-proof code, and protection of online identities for secure email and access control. Vision and commitment to innovation led to GlobalSign being recognized by Frost & Sullivan for the 2011 Product Line Strategy Award. The company has local offices in the US, Europe and throughout Asia. For the latest news on GlobalSign visit www.globalsign.com or follow GlobalSign on Twitter (@globalsign).

GMO Internet Group GMO Internet Group is a comprehensive provider of industry-leading Internet solutions including domain name registration, cloud-based and traditional hosting, ecommerce, security, and payment processing services that each hold the top share of their respective markets in Japan. Other key business areas for the Group include online securities/FX trading, Internet advertising, search engine marketing and online research, and smartphone game development and publishing. GMO Internet, Inc. (TSE: 9449) is headquartered in Tokyo, Japan. Please visit http://www.gmo.jp/en for more information.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
Introducing 'Secure Access Service Edge'
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  7/3/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15001
PUBLISHED: 2020-07-09
An information leak was discovered on Yubico YubiKey 5 NFC devices 5.0.0 to 5.2.6 and 5.3.0 to 5.3.1. The OTP application allows a user to set optional access codes on OTP slots. This access code is intended to prevent unauthorized changes to OTP configurations. The access code is not checked when u...
CVE-2020-15092
PUBLISHED: 2020-07-09
In TimelineJS before version 3.7.0, some user data renders as HTML. An attacker could implement an XSS exploit with maliciously crafted content in a number of data fields. This risk is present whether the source data for the timeline is stored on Google Sheets or in a JSON configuration file. Most T...
CVE-2020-15093
PUBLISHED: 2020-07-09
The tough library (Rust/crates.io) prior to version 0.7.1 does not properly verify the threshold of cryptographic signatures. It allows an attacker to duplicate a valid signature in order to circumvent TUF requiring a minimum threshold of unique signatures before the metadata is considered valid. A ...
CVE-2020-15299
PUBLISHED: 2020-07-09
A reflected Cross-Site Scripting (XSS) Vulnerability in the KingComposer plugin through 2.9.4 for WordPress allows remote attackers to trick a victim into submitting an install_online_preset AJAX request containing base64-encoded JavaScript (in the kc-online-preset-data POST parameter) that is execu...
CVE-2020-4173
PUBLISHED: 2020-07-09
IBM Guardium Activity Insights 10.6 and 11.0 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure l...