Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

11/28/2012
01:26 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Entrust Solves 3 Major SSL Compliance Challenges With Certificate Discovery Service

Entrust Discovery includes automatic certificate chain validation email alerts

DALLAS — November 28, 2012 — Finding, managing and analyzing SSL and other digital certificates can be time-consuming, complex and expensive. To help automate and simplify these tasks, Entrust Inc. introduces innovative features for the Entrust Discovery service that is designed to help solve three of the industry’s top SSL challenges: avoiding application outages, ensuring compliance and managing multi-source certificate environments.

“Enterprise technical environments are too complex to believe that buying a few SSL certificates is sufficient to satisfy both internal and external security and compliance responsibilities,” said Entrust President and CEO Bill Conner. “From discovery, management and validation, to analysis and reporting, digital certificate management is required on an ongoing basis. This is particularly true for large organizations that may have different types of digital certificates from many different vendors.”

Simplifying these responsibilities, Entrust introduces key service upgrades to directly address the most difficult SSL and digital certificate pitfalls experienced by enterprises, organizations and businesses in various industries and verticals.

Avoid Application Outages — Automatic ‘Certificate Chain Validation’ Alerts

Entrust Discovery includes automatic certificate chain validation email alerts to quickly identify the status of an organization’s applications, sites or server to help confirm they are secure.

While a publically trusted certificate may be installed correctly, intermediate SSL certificates installed improperly will make websites appear unsecure to end-users. This critical feature can help organizations and businesses avoid lost sales, address compliance issues and reduce administrator workloads.

Ensure Compliance, Avoid Breach — ‘Custom Charts, Filtering & Rules’

By providing certificate administrators with relevant information, organizations can better monitor their online environments to verify they are in compliance — a key capability to help avoid breach. Entrust Discovery’s custom charts, filtering and rules provide graphic-based reports to help organizations gain a comprehensive perspective on their certificate environment.

“Developed as a direct result from valued customer feedback, the certificate discovery service now provides some of the most graphical, in-depth certificate reporting and analysis on the market — and it can all be automated and provided directly to a user’s easy-to-understand homepage,” said Conner.

Each organization has unique policies, security standards and compliance requirements. Entrust Discovery now includes report customization, advanced filtering and automatic rules policy that help streamline the day-to-day management of certificate pools.

New advanced rules — established within notice, issuer and certificate rules categories — assist organizations in automating certificate tasks based on established policy or guidelines. This can range from automating bulk actions, assigning management of certificates based on issuer, or deciding management status based on specific information (e.g., organization, location, custom fields) within the certificate.

Organizations may tailor data to create custom, easy-to-read charts for better analysis that can help uncover problems in an environment, simplify decision-making and gain a better understanding of current and future certificate needs.

Complementing that ability, custom data charts add extensive reporting capabilities within the Entrust Discovery dashboard. Certificate administrators may use easy, click-and-drag features to re-order charts, leverage high-resolution capabilities for better viewing or printing, customize dashboard chart views or create unlimited new charts from saved data filters. New detailed filtering options include subject name, public/non-public attributes, serial numbers, CAPI Store components and more.

Entrust Discovery’s comprehensive customization streamlines analysis and enables easier access to critical certificate data. It’s an advanced tool that empowers organizations with unlimited versatility and customization for monitoring a certificate population.

Simplify Management in Delegated Environments — ‘Organization’ Customization

For many organizations, a certificate environment is managed by multiple teams or business units. Entrust Discovery now simplifies management of certificates in multi-organization environments — even from a mix of public, private or Microsoft CAs.

The service’s advanced organization capabilities enable administrators to split data into “organizations” to allow them to delegate control of different certificates pools. This flexibility eases the burden on top-level certificate administrators without losing the ability to control or monitor a complete environment.

True Certificate Discovery

Available as a managed service (cloud model) or a customer-deployed solution, Entrust Discovery simplifies the certificate discovery and inventory process. This can help save the management effort of manually inventorying machines and networks, as well as tracking certificate expiry dates in complicated spreadsheets or tables.

Within an organization’s environment, Entrust Discovery is capable of quickly finding and inventorying certificates. Three separate components — Entrust Discovery Agent, Entrust Discovery CAPI Scanner and Entrust Discovery Manager — collaborate to help organizations discover the risks caused by rogue or expiring certificates, and then subsequently assists in resolving these issues.

For more information about Entrust Discovery, visit entrust.net/discovery.

About Entrust

A trusted provider of identity-based security solutions, Entrust secures enterprises, governments, financial institutions, citizens and websites in more than 5,000 organizations spanning 85 countries. Entrust’s customer-centric focus is the foundation to delivering organizations an unmatched level of security, trust and value. For strong authentication, credentialing, physical and logical access, mobile security, digital certificates, SSL and PKI, call 888-690-2424, email [email protected] or visit www.entrust.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Zero Trust doesn't have to break your budget!
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-34812
PUBLISHED: 2021-06-18
Use of hard-coded credentials vulnerability in php component in Synology Calendar before 2.4.0-0761 allows remote attackers to obtain sensitive information via unspecified vectors.
CVE-2021-34808
PUBLISHED: 2021-06-18
Server-Side Request Forgery (SSRF) vulnerability in cgi component in Synology Media Server before 1.8.3-2881 allows remote attackers to access intranet resources via unspecified vectors.
CVE-2021-34809
PUBLISHED: 2021-06-18
Improper neutralization of special elements used in a command ('Command Injection') vulnerability in task management component in Synology Download Station before 3.8.16-3566 allows remote authenticated users to execute arbitrary code via unspecified vectors.
CVE-2021-34810
PUBLISHED: 2021-06-18
Improper privilege management vulnerability in cgi component in Synology Download Station before 3.8.16-3566 allows remote authenticated users to execute arbitrary code via unspecified vectors.
CVE-2021-34811
PUBLISHED: 2021-06-18
Server-Side Request Forgery (SSRF) vulnerability in task management component in Synology Download Station before 3.8.16-3566 allows remote authenticated users to access intranet resources via unspecified vectors.