Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


01:26 PM
Dark Reading
Dark Reading
Products and Releases

Entrust Solves 3 Major SSL Compliance Challenges With Certificate Discovery Service

Entrust Discovery includes automatic certificate chain validation email alerts

DALLAS — November 28, 2012 — Finding, managing and analyzing SSL and other digital certificates can be time-consuming, complex and expensive. To help automate and simplify these tasks, Entrust Inc. introduces innovative features for the Entrust Discovery service that is designed to help solve three of the industry’s top SSL challenges: avoiding application outages, ensuring compliance and managing multi-source certificate environments.

“Enterprise technical environments are too complex to believe that buying a few SSL certificates is sufficient to satisfy both internal and external security and compliance responsibilities,” said Entrust President and CEO Bill Conner. “From discovery, management and validation, to analysis and reporting, digital certificate management is required on an ongoing basis. This is particularly true for large organizations that may have different types of digital certificates from many different vendors.”

Simplifying these responsibilities, Entrust introduces key service upgrades to directly address the most difficult SSL and digital certificate pitfalls experienced by enterprises, organizations and businesses in various industries and verticals.

Avoid Application Outages — Automatic ‘Certificate Chain Validation’ Alerts

Entrust Discovery includes automatic certificate chain validation email alerts to quickly identify the status of an organization’s applications, sites or server to help confirm they are secure.

While a publically trusted certificate may be installed correctly, intermediate SSL certificates installed improperly will make websites appear unsecure to end-users. This critical feature can help organizations and businesses avoid lost sales, address compliance issues and reduce administrator workloads.

Ensure Compliance, Avoid Breach — ‘Custom Charts, Filtering & Rules’

By providing certificate administrators with relevant information, organizations can better monitor their online environments to verify they are in compliance — a key capability to help avoid breach. Entrust Discovery’s custom charts, filtering and rules provide graphic-based reports to help organizations gain a comprehensive perspective on their certificate environment.

“Developed as a direct result from valued customer feedback, the certificate discovery service now provides some of the most graphical, in-depth certificate reporting and analysis on the market — and it can all be automated and provided directly to a user’s easy-to-understand homepage,” said Conner.

Each organization has unique policies, security standards and compliance requirements. Entrust Discovery now includes report customization, advanced filtering and automatic rules policy that help streamline the day-to-day management of certificate pools.

New advanced rules — established within notice, issuer and certificate rules categories — assist organizations in automating certificate tasks based on established policy or guidelines. This can range from automating bulk actions, assigning management of certificates based on issuer, or deciding management status based on specific information (e.g., organization, location, custom fields) within the certificate.

Organizations may tailor data to create custom, easy-to-read charts for better analysis that can help uncover problems in an environment, simplify decision-making and gain a better understanding of current and future certificate needs.

Complementing that ability, custom data charts add extensive reporting capabilities within the Entrust Discovery dashboard. Certificate administrators may use easy, click-and-drag features to re-order charts, leverage high-resolution capabilities for better viewing or printing, customize dashboard chart views or create unlimited new charts from saved data filters. New detailed filtering options include subject name, public/non-public attributes, serial numbers, CAPI Store components and more.

Entrust Discovery’s comprehensive customization streamlines analysis and enables easier access to critical certificate data. It’s an advanced tool that empowers organizations with unlimited versatility and customization for monitoring a certificate population.

Simplify Management in Delegated Environments — ‘Organization’ Customization

For many organizations, a certificate environment is managed by multiple teams or business units. Entrust Discovery now simplifies management of certificates in multi-organization environments — even from a mix of public, private or Microsoft CAs.

The service’s advanced organization capabilities enable administrators to split data into “organizations” to allow them to delegate control of different certificates pools. This flexibility eases the burden on top-level certificate administrators without losing the ability to control or monitor a complete environment.

True Certificate Discovery

Available as a managed service (cloud model) or a customer-deployed solution, Entrust Discovery simplifies the certificate discovery and inventory process. This can help save the management effort of manually inventorying machines and networks, as well as tracking certificate expiry dates in complicated spreadsheets or tables.

Within an organization’s environment, Entrust Discovery is capable of quickly finding and inventorying certificates. Three separate components — Entrust Discovery Agent, Entrust Discovery CAPI Scanner and Entrust Discovery Manager — collaborate to help organizations discover the risks caused by rogue or expiring certificates, and then subsequently assists in resolving these issues.

For more information about Entrust Discovery, visit entrust.net/discovery.

About Entrust

A trusted provider of identity-based security solutions, Entrust secures enterprises, governments, financial institutions, citizens and websites in more than 5,000 organizations spanning 85 countries. Entrust’s customer-centric focus is the foundation to delivering organizations an unmatched level of security, trust and value. For strong authentication, credentialing, physical and logical access, mobile security, digital certificates, SSL and PKI, call 888-690-2424, email [email protected] or visit www.entrust.com.

Comment  | 
Print  | 
More Insights
Threaded  |  Newest First  |  Oldest First
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-08-03
Hardcoded default root credentials exist on the ecobee3 lite device. This allows a threat actor to gain access to the password-protected bootloader environment through the serial console.
PUBLISHED: 2021-08-03
A NULL pointer dereference vulnerability exists on the ecobee3 lite device in the HomeKit Wireless Access Control setup process. A threat actor can exploit this vulnerability to cause a denial of service, forcing the device to reboot via a crafted HTTP request.
PUBLISHED: 2021-08-03
A heap-based buffer overflow vulnerability exists on the ecobee3 lite device in the HKProcessConfig function of the HomeKit Wireless Access Control setup process. A threat actor can exploit this vulnerability to force the device to connect to a SSID or cause a denial of service.
PUBLISHED: 2021-08-03
Command Injection in Open PLC Webserver v3 allows remote attackers to execute arbitrary code via the "Hardware Layer Code Box" component on the "/hardware" page of the application.
PUBLISHED: 2021-08-03
Poddycast is a podcast app made with Electron. Prior to version 0.8.1, an attacker can create a podcast or episode with malicious characters and execute commands on the client machine. The application does not clean the HTML characters of the podcast information obtained from the Feed, which allows ...