-
Blog Post Jan 07, 2021
An X.509 certificate is a digital certificate based on the widely accepted international X.509 standard. Learn why they’re important, how they work & more.
-
Blog Post Jan 05, 2021
Learn about RSA, DSA, & ECC (Elliptic Curve Cryptography) encryption, their differences, performance similarities & how to know which one you need.
-
Blog Post Jan 05, 2021
View our guide to Passwordless Authentication, including how it works, security benefits, supported methods & more. Learn how Sectigo® can help you today.
-
Blog Post Jan 05, 2021
Learn why email encryption is important for businesses to ensure their online correspondence is secure, and how to set it up for Gmail, Outlook & iOS.
-
Blog Post Dec 17, 2020
Wondering to improve secure connection over traditional VPNs? Here are some common Virtual Private Network alternatives for businesses that could suit you.
-
Webinar Dec 10, 2020
Q4 Sectigo Pulse: Special End of Year Edition
Join us for this special year-end edition to our Pulse webinars as we look back at 2020 and make predictions for 2021.
-
Blog Post Nov 24, 2020
Ask people what their favorite part of Thanksgiving dinner is, and you might get dozens of different responses. But chances are, not many will say “turkey.” It’s strange, in a way. After all, turkey is the centerpiece of the meal, not to mention the symbol of the holiday. Some people even refer to Thanksgiving as “Turkey Day.”
-
Whitepaper Nov 10, 2020
Discover why PKI is the best protection for the identities of your people, devices, and data with our new infographic.
-
Product Video Oct 23, 2020
PKI for DevOps
Find out how you benefit from the scalable Sectigo Certificate Manager, and how it manages large volumes of PKI certificates used in DevOps environments.
-
Webinar Oct 15, 2020
21 PKI Pitfalls to Avoid Webinar
Join Sectigo Senior Fellow Tim Callan and CTO of PKI Jason Soroko as they detail the twenty-one pitfalls so you can be on the lookout for them.
-
Datasheet Oct 02, 2020
Many enterprises now operate their own Private Certificate Authority (CA) to provide tighter control of authentication using Public Key Infrastructure (PKI) certificates that serve that organization only. To ensure the Private CA protects the entire network environment, IT teams need a solution that: Covers all types of certificates used across the enterprise, supports an architecture with any combination of root CA and issuing CA from private and 3rd party authorities, enables issuance, deployment, renewal, and replacement of certificates quickly, reliably, and scalably. Download to learn more about how our Certificate Manager Private CA feature can cut costs, save time, and enhance security. This fully automated feature adheres to corporate and industry compliance standards.
-
Blog Post Sep 24, 2020
SSH keys not only improve security but also enable the automation of connected processes, single sign-on (SSO), and identity and access management at scale that today’s businesses require.