Resource Library

We encourage you to use the search feature and filters on the left side of the screen to locate specific resources of interest (search by organization, author, keyword, etc.).
Lighthouse Global Case Study Case Studies

Lighthouse Global Case Study

In 2018, Lighthouse enlisted Sectigo to supply, discover, and manage high volumes of digital certificates across servers, devices, internal applications, clients, and website—from a single pane of glass.
Sectigo Private CA Product Videos

Sectigo Private CA

Check out this animated video and learn the basics of what it means to host a Private CA.
Supporting Microsoft CA with Sectigo Certificate Manager Private CA White Papers

Supporting Microsoft CA with Sectigo Certificate Manager Private CA

Sectigo Certificate Manager provides enterprises with a Private Certificate Authority (CA) solution, delivering a complete, managed public key infrastructure (PKI) platform.
Sectigo Product Guide White Papers

Sectigo Product Guide

Whether implementing a single solution or a multi-layered approach, Sectigo’s diverse range of web security products complement each other to deliver a full spectrum of protection.
Root Causes 1-16: PKI for DevOps Environments Podcast

Root Causes 1-16: PKI for DevOps Environments

DevOps as a software development and deployment methodology has radically transformed enterprise computing. This approach brings with it new architectures and tools such as containerization, Kubernetes, and multi-cloud.
Root Causes 1-15: Architecture for Enterprise Certificate Automation Podcast

Root Causes 1-15: Architecture for Enterprise Certificate Automation

Automation of certificate deployment and management is a must for today's enterprise. Complexity, changing environments, fast time to market, and simply scale all dictate that the old manual management methodology is dying away.
Root Causes 1-14: P2P Vulnerability in IoT Devices Podcast

Root Causes 1-14: P2P Vulnerability in IoT Devices

Recent research reveals millions of consumer IoT devices that lack any level of authentication or encryption at all. Join our hosts as we discuss the nature of IoT-based botnets.
Root Causes 1-13: PKI for IoT Podcast

Root Causes 1-13: PKI for IoT

The proliferation of Internet of Things (IoT) devices in many cases has outpaced security for those devices, leaving enterprises, end users, and the general public exposed.
Root Causes 1-09: 63-bit Serial Numbers Podcast

Root Causes 1-09: 63-bit Serial Numbers

A recently discovered flaw in common practices reveals that potentially millions of active SSL certificates fall short of cryptographic requirements. Learn how it's that 64-bit certificate serial numbers might offer only 63 bits of entropy.
Root Causes 1-02: O2 Outage and Equifax Breach Podcast

Root Causes 1-02: O2 Outage and Equifax Breach

In December users of O2, Softbank, and other mobile services experienced a day-long data outage affecting as many as 40 million people. In the summer of 2017 148 million Americans lost their personal data in the Equifax breach.