Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


01:26 PM
Dark Reading
Dark Reading
Products and Releases

Entrust Solves 3 Major SSL Compliance Challenges With Certificate Discovery Service

Entrust Discovery includes automatic certificate chain validation email alerts

DALLAS — November 28, 2012 — Finding, managing and analyzing SSL and other digital certificates can be time-consuming, complex and expensive. To help automate and simplify these tasks, Entrust Inc. introduces innovative features for the Entrust Discovery service that is designed to help solve three of the industry’s top SSL challenges: avoiding application outages, ensuring compliance and managing multi-source certificate environments.

“Enterprise technical environments are too complex to believe that buying a few SSL certificates is sufficient to satisfy both internal and external security and compliance responsibilities,” said Entrust President and CEO Bill Conner. “From discovery, management and validation, to analysis and reporting, digital certificate management is required on an ongoing basis. This is particularly true for large organizations that may have different types of digital certificates from many different vendors.”

Simplifying these responsibilities, Entrust introduces key service upgrades to directly address the most difficult SSL and digital certificate pitfalls experienced by enterprises, organizations and businesses in various industries and verticals.

Avoid Application Outages — Automatic ‘Certificate Chain Validation’ Alerts

Entrust Discovery includes automatic certificate chain validation email alerts to quickly identify the status of an organization’s applications, sites or server to help confirm they are secure.

While a publically trusted certificate may be installed correctly, intermediate SSL certificates installed improperly will make websites appear unsecure to end-users. This critical feature can help organizations and businesses avoid lost sales, address compliance issues and reduce administrator workloads.

Ensure Compliance, Avoid Breach — ‘Custom Charts, Filtering & Rules’

By providing certificate administrators with relevant information, organizations can better monitor their online environments to verify they are in compliance — a key capability to help avoid breach. Entrust Discovery’s custom charts, filtering and rules provide graphic-based reports to help organizations gain a comprehensive perspective on their certificate environment.

“Developed as a direct result from valued customer feedback, the certificate discovery service now provides some of the most graphical, in-depth certificate reporting and analysis on the market — and it can all be automated and provided directly to a user’s easy-to-understand homepage,” said Conner.

Each organization has unique policies, security standards and compliance requirements. Entrust Discovery now includes report customization, advanced filtering and automatic rules policy that help streamline the day-to-day management of certificate pools.

New advanced rules — established within notice, issuer and certificate rules categories — assist organizations in automating certificate tasks based on established policy or guidelines. This can range from automating bulk actions, assigning management of certificates based on issuer, or deciding management status based on specific information (e.g., organization, location, custom fields) within the certificate.

Organizations may tailor data to create custom, easy-to-read charts for better analysis that can help uncover problems in an environment, simplify decision-making and gain a better understanding of current and future certificate needs.

Complementing that ability, custom data charts add extensive reporting capabilities within the Entrust Discovery dashboard. Certificate administrators may use easy, click-and-drag features to re-order charts, leverage high-resolution capabilities for better viewing or printing, customize dashboard chart views or create unlimited new charts from saved data filters. New detailed filtering options include subject name, public/non-public attributes, serial numbers, CAPI Store components and more.

Entrust Discovery’s comprehensive customization streamlines analysis and enables easier access to critical certificate data. It’s an advanced tool that empowers organizations with unlimited versatility and customization for monitoring a certificate population.

Simplify Management in Delegated Environments — ‘Organization’ Customization

For many organizations, a certificate environment is managed by multiple teams or business units. Entrust Discovery now simplifies management of certificates in multi-organization environments — even from a mix of public, private or Microsoft CAs.

The service’s advanced organization capabilities enable administrators to split data into “organizations” to allow them to delegate control of different certificates pools. This flexibility eases the burden on top-level certificate administrators without losing the ability to control or monitor a complete environment.

True Certificate Discovery

Available as a managed service (cloud model) or a customer-deployed solution, Entrust Discovery simplifies the certificate discovery and inventory process. This can help save the management effort of manually inventorying machines and networks, as well as tracking certificate expiry dates in complicated spreadsheets or tables.

Within an organization’s environment, Entrust Discovery is capable of quickly finding and inventorying certificates. Three separate components — Entrust Discovery Agent, Entrust Discovery CAPI Scanner and Entrust Discovery Manager — collaborate to help organizations discover the risks caused by rogue or expiring certificates, and then subsequently assists in resolving these issues.

For more information about Entrust Discovery, visit entrust.net/discovery.

About Entrust

A trusted provider of identity-based security solutions, Entrust secures enterprises, governments, financial institutions, citizens and websites in more than 5,000 organizations spanning 85 countries. Entrust’s customer-centric focus is the foundation to delivering organizations an unmatched level of security, trust and value. For strong authentication, credentialing, physical and logical access, mobile security, digital certificates, SSL and PKI, call 888-690-2424, email [email protected] or visit www.entrust.com.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-13
Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to unauthenticated remote code execution vulnerability. IPM software does not sanitize the date provided via coverterCheckList action in meta_driver_srv.js class. Attackers can send a specially crafted packet to make IPM connect to ro...
PUBLISHED: 2021-04-13
SAP NetWeaver AS JAVA (Customer Usage Provisioning Servlet), versions - 7.31, 7.40, 7.50, allows an attacker to read some statistical data like product version, traffic, timestamp etc. because of missing authorization check in the servlet.
PUBLISHED: 2021-04-13
SAP Manufacturing Execution (System Rules), versions - 15.1, 15.2, 15.3, 15.4, allows an authorized attacker to embed malicious code into HTTP parameter and send it to the server because SAP Manufacturing Execution (System Rules) tab does not sufficiently encode some parameters, resulting in Stored ...
PUBLISHED: 2021-04-13
SAP NetWeaver AS Java (Applications based on HTMLB for Java) allows a basic-level authorized attacker to store a malicious file on the server. When a victim tries to open this file, it results in a Cross-Site Scripting (XSS) vulnerability and the attacker can read and modify data. However, the attac...
PUBLISHED: 2021-04-13
SAP Commerce, versions - 1808, 1811, 1905, 2005, 2011, Backoffice application allows certain authorized users to create source rules which are translated to drools rule when published to certain modules within the application. An attacker with this authorization can inject malicious code in the sour...