Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

11/17/2009
04:23 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

GlobalSign Announces Multi-Year Secure Email Certificate

PersonalSign range allow users to digitally sign and encrypt email messages

Portsmouth, NH " 16 November 2009 " GlobalSign Inc (www.globalsign.com), the global online security specialist has announced the launch of its new multi-year Secure Email Certificate, branded PersonalSign " a cryptographic Digital Certificate that will secure email content and identify to recipients the true email identity of the sender. Offering multi-year Secure Email Certificates versus one year Certificates allows users to renew less frequently, avoid the common pitfalls of an expiring Certificate, and take advantage of generous multi-year pricing discounts. The launch comes at the time when fellow Certification Authority Thawte (owned by VeriSign), announced the discontinuation and upcoming revocation of its Secure Email Certificates.

Secure Email Certificates (sometimes also known in the industry as Digital IDs) can be installed in all popular email clients such as Microsoft Outlook, and allow email users to digitally sign and encrypt email; ensuring it is tamper proof and protected from prying eyes. Encrypting an email renders its content and attachments unreadable by anyone except the intended recipient. Additionally, digitally signing an email protects message integrity by ensuring the message has not been altered, either accidentally or maliciously. GlobalSign PersonalSign Certificates also allow users to digitally sign Microsoft Word, Excel, PowerPoint, and Access documents directly from Microsoft Office to prevent tampering of content and prove authorship.

Prior to the pioneering introduction of multi-year Email Security Certificates by GlobalSign, customers using similar S/MIME compliant Certificates from other providers would have to re-order/renew Certificates each year. Besides the annual risk of forgetting to re-apply before expiration, users can run into the problem of not being able to open messages encrypted with previous (or lost) Certificates. This occurs when users do not realize that even expired Certificates must be retained or exported, especially if there is a change of computers. By using a three-year validity PersonalSign Certificate, users have fewer Certificates to maintain over prolonged periods, and will not need to complete the annual renewal process required by providers of other solutions.

GlobalSign also offers varying trust levels (incorporating more comprehensive identity verification) for Certificates aimed specifically at enterprises. Such enterprise solutions include Certificates for individuals e.g. Sally Jones of Company ABC and also Certificates issued to entire departments e.g. Marketing Department of Company ABC. For organizations managing multiple Certificates, GlobalSign has a managed PKI solution (ePKI) that allows enterprises to issue high identity assurance Certificates to numerous employees, suppliers, and extranet users for authentication, secure email, and document security services. Certificates are instantly issued against a pre-vetted Organization Profile. Such enterprise level Certificates strengthen corporate brand, reduce support requirements, and tie electronic documents to both the individual and organization. By using ePKI, issuing, reissuing, renewing, and revoking certificates can be completed instantly from the ePKI web portal giving enterprises 24/7 access and control to their Certificates.

GlobalSign is now offering the PersonalSign 1 product with a validity period of three years for only $49. GlobalSign also offers a free 30 day trial of its Secure Email Certificate allowing users to test out features and usability before purchasing.

To learn more about GlobalSign's Secure Email Solutions, please visit http://www.globalsign.com/authentication-secure-email/

For more information on GlobalSign's Enterprise PKI, please visit:

http://www.globalsign.com/authentication-secure-email/enterprise-pki/

About GlobalSign

Established in 1996 and as a WebTrust accredited public certificate authority, GlobalSign offers publicly trusted SSL, including EV SSL Certificates, S/MIME and Code Signing Certificates for use on all platforms including mobile devices. Its Trusted Root solution uses the widely distributed GlobalSign Root CA certificates to provide immediate PKI trust for Microsoft CA and enterprise CAs, eliminating the costs associated with using untrusted Root Certificates. Its partnership with Adobe to provide Certified Document Services (CDS) enables secure digitally signed PDF e-documents. These core Digital Certificate solutions allow its thousands of customers to conduct secure online transactions and data transfer, distribute tamper-proof code, and bind identities to client certificates for email security and remote two factor authentication. The company has a history of innovation within the online security market and has offices in the US, UK, Belgium, Japan, and China.

About GMO Internet Group

GMO Internet Group, headquartered in Japan, is a leading force in the Internet industry offering one of the most comprehensive ranges of Internet services worldwide. The group holds top domestic market share in domain registration, web hosting, and payment processing and provides a host of other Internet services including global online security services, e-commerce solutions, and Internet advertising to both businesses and individuals. At the centre of the group is GMO Internet, Inc. a company listed on the prestigious first section of the Tokyo Stock Exchange (TSE: 9449). Please visit www.gmo.jp/en for further details.

For further details please contact:

Steve Waite GlobalSign, Inc

+1-603-570-7060 [email protected]

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
A Startup With NSA Roots Wants Silently Disarming Cyberattacks on the Wire to Become the Norm
Kelly Jackson Higgins, Executive Editor at Dark Reading,  5/11/2021
Edge-DRsplash-10-edge-articles
Cybersecurity: What Is Truly Essential?
Joshua Goldfarb, Director of Product Management at F5,  5/12/2021
Commentary
3 Cybersecurity Myths to Bust
Etay Maor, Sr. Director Security Strategy at Cato Networks,  5/11/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-19924
PUBLISHED: 2021-05-18
In Boostnote 0.12.1, exporting to PDF contains opportunities for XSS attacks.
CVE-2020-20220
PUBLISHED: 2021-05-18
Mikrotik RouterOs prior to stable 6.47 suffers from a memory corruption vulnerability in the /nova/bin/bfd process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference).
CVE-2020-20227
PUBLISHED: 2021-05-18
Mikrotik RouterOs stable 6.47 suffers from a memory corruption vulnerability in the /nova/bin/diskd process. An authenticated remote attacker can cause a Denial of Service due to invalid memory access.
CVE-2020-20245
PUBLISHED: 2021-05-18
Mikrotik RouterOs stable 6.46.3 suffers from a memory corruption vulnerability in the log process. An authenticated remote attacker can cause a Denial of Service due to improper memory access.
CVE-2020-20246
PUBLISHED: 2021-05-18
Mikrotik RouterOs stable 6.46.3 suffers from a memory corruption vulnerability in the mactel process. An authenticated remote attacker can cause a Denial of Service due to improper memory access.