Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

11/17/2009
04:23 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

GlobalSign Announces Multi-Year Secure Email Certificate

PersonalSign range allow users to digitally sign and encrypt email messages

Portsmouth, NH " 16 November 2009 " GlobalSign Inc (www.globalsign.com), the global online security specialist has announced the launch of its new multi-year Secure Email Certificate, branded PersonalSign " a cryptographic Digital Certificate that will secure email content and identify to recipients the true email identity of the sender. Offering multi-year Secure Email Certificates versus one year Certificates allows users to renew less frequently, avoid the common pitfalls of an expiring Certificate, and take advantage of generous multi-year pricing discounts. The launch comes at the time when fellow Certification Authority Thawte (owned by VeriSign), announced the discontinuation and upcoming revocation of its Secure Email Certificates.

Secure Email Certificates (sometimes also known in the industry as Digital IDs) can be installed in all popular email clients such as Microsoft Outlook, and allow email users to digitally sign and encrypt email; ensuring it is tamper proof and protected from prying eyes. Encrypting an email renders its content and attachments unreadable by anyone except the intended recipient. Additionally, digitally signing an email protects message integrity by ensuring the message has not been altered, either accidentally or maliciously. GlobalSign PersonalSign Certificates also allow users to digitally sign Microsoft Word, Excel, PowerPoint, and Access documents directly from Microsoft Office to prevent tampering of content and prove authorship.

Prior to the pioneering introduction of multi-year Email Security Certificates by GlobalSign, customers using similar S/MIME compliant Certificates from other providers would have to re-order/renew Certificates each year. Besides the annual risk of forgetting to re-apply before expiration, users can run into the problem of not being able to open messages encrypted with previous (or lost) Certificates. This occurs when users do not realize that even expired Certificates must be retained or exported, especially if there is a change of computers. By using a three-year validity PersonalSign Certificate, users have fewer Certificates to maintain over prolonged periods, and will not need to complete the annual renewal process required by providers of other solutions.

GlobalSign also offers varying trust levels (incorporating more comprehensive identity verification) for Certificates aimed specifically at enterprises. Such enterprise solutions include Certificates for individuals e.g. Sally Jones of Company ABC and also Certificates issued to entire departments e.g. Marketing Department of Company ABC. For organizations managing multiple Certificates, GlobalSign has a managed PKI solution (ePKI) that allows enterprises to issue high identity assurance Certificates to numerous employees, suppliers, and extranet users for authentication, secure email, and document security services. Certificates are instantly issued against a pre-vetted Organization Profile. Such enterprise level Certificates strengthen corporate brand, reduce support requirements, and tie electronic documents to both the individual and organization. By using ePKI, issuing, reissuing, renewing, and revoking certificates can be completed instantly from the ePKI web portal giving enterprises 24/7 access and control to their Certificates.

GlobalSign is now offering the PersonalSign 1 product with a validity period of three years for only $49. GlobalSign also offers a free 30 day trial of its Secure Email Certificate allowing users to test out features and usability before purchasing.

To learn more about GlobalSign's Secure Email Solutions, please visit http://www.globalsign.com/authentication-secure-email/

For more information on GlobalSign's Enterprise PKI, please visit:

http://www.globalsign.com/authentication-secure-email/enterprise-pki/

About GlobalSign

Established in 1996 and as a WebTrust accredited public certificate authority, GlobalSign offers publicly trusted SSL, including EV SSL Certificates, S/MIME and Code Signing Certificates for use on all platforms including mobile devices. Its Trusted Root solution uses the widely distributed GlobalSign Root CA certificates to provide immediate PKI trust for Microsoft CA and enterprise CAs, eliminating the costs associated with using untrusted Root Certificates. Its partnership with Adobe to provide Certified Document Services (CDS) enables secure digitally signed PDF e-documents. These core Digital Certificate solutions allow its thousands of customers to conduct secure online transactions and data transfer, distribute tamper-proof code, and bind identities to client certificates for email security and remote two factor authentication. The company has a history of innovation within the online security market and has offices in the US, UK, Belgium, Japan, and China.

About GMO Internet Group

GMO Internet Group, headquartered in Japan, is a leading force in the Internet industry offering one of the most comprehensive ranges of Internet services worldwide. The group holds top domestic market share in domain registration, web hosting, and payment processing and provides a host of other Internet services including global online security services, e-commerce solutions, and Internet advertising to both businesses and individuals. At the centre of the group is GMO Internet, Inc. a company listed on the prestigious first section of the Tokyo Stock Exchange (TSE: 9449). Please visit www.gmo.jp/en for further details.

For further details please contact:

Steve Waite GlobalSign, Inc

+1-603-570-7060 [email protected]

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31618
PUBLISHED: 2021-06-15
Apache HTTP Server protocol handler for the HTTP/2 protocol checks received request headers against the size limitations as configured for the server and used for the HTTP/1 protocol as well. On violation of these restrictions and HTTP response is sent to the client with a status code indicating why...
CVE-2021-20027
PUBLISHED: 2021-06-14
A buffer overflow vulnerability in SonicOS allows a remote attacker to cause a Denial of Service (DoS) by sending a specially crafted request. This vulnerability affects SonicOS Gen5, Gen6, Gen7 platforms, and SonicOSv virtual firewalls.
CVE-2021-32684
PUBLISHED: 2021-06-14
magento-scripts contains scripts and configuration used by Create Magento App, a zero-configuration tool-chain which allows one to deploy Magento 2. In versions 1.5.1 and 1.5.2, after changing the function from synchronous to asynchronous there wasn't implemented handler in the start, stop, exec, an...
CVE-2021-34693
PUBLISHED: 2021-06-14
net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.
CVE-2021-27887
PUBLISHED: 2021-06-14
Cross-site Scripting (XSS) vulnerability in the main dashboard of Ellipse APM versions allows an authenticated user or integrated application to inject malicious data into the application that can then be executed in a victim’s browser. This issue affects: Hitachi ABB Power Grids ...