Hi [[ session.user.profile.firstName ]]

Entrust Datacard Certificate Services

  • Date
  • Rating
  • Views
  • The Evolution of SSL_TLS and Browser Compliance Requirements in 2017
    The Evolution of SSL_TLS and Browser Compliance Requirements in 2017 Dathan Demone Recorded: May 17 2017 57 mins
    Description: SSL/TLS Industry requirements are changing at an unprecedented pace. Over the last couple of years, new requirements have been passed down by the CA and browser community to help further solidify the security practices around obtaining and using SSL/TLS and other types of publicly trusted certificates. Over the next 12 months, more important changes are being introduced to continue that trend. Join Dathan Demone, Product Manager at Entrust Datacard, who will discuss both past and future changes that will have a major impact on all certificate subscribers. In this Webinar, we will discuss topics such as:

    • New changes coming to browsers and how they notify end users about the proper use of SSL/TLS on all web pages
    • Changes to certificate lifetime policies and verification rules that are being introduced in 2017
    • New requirements around Certificate Transparency that are being introduced in October, 2017
    • Updates to recommended security best practices and new vulnerabilities in the world of SSL/TLS
    • Certificate Authority Authorization and how this can be used to protect your organization against fraud
  • SSL Best Practices: Keys, Certificates and Advanced Certificates
    SSL Best Practices: Keys, Certificates and Advanced Certificates Mark Giannotti Recorded: May 16 2017 66 mins
    SSL certificates secure ecommerce, communications and private information passed from browser to Web server and between servers. Join us for a complimentary webinar that covers key best practices for securely deploying SSL certificates for your specific environment. We will discuss:
    •Private Keys for Quality Protection: Learn how to use private keys, a key factor in determining the quality of protection provided by SSL.
    •Cater SSL For Your Environment: Discuss importance of selecting the appropriate Certification Authority (CA) and certificate type.
    •Troubleshoot Your SSL Problems: Explore how advanced certificates can be used to help solve problems in your SSL applications.
  • SSL Best Practices: Domain Protection
    SSL Best Practices: Domain Protection Mark Giannotti Recorded: May 16 2017 56 mins
    Phishing attacks are dangerous to your customers and could be detrimental to your brand. Securing your website and protecting your business are the cornerstone of Entrust SSL Best Practices. Join us for a complimentary webinar that covers key best practices for protecting your domain phishing attacks against the customer’s clientele and unsuspecting internet users. We will discuss:
    •The Definition of a Trusted CA: Learn what controls a trusted Certificate Authority (CA) has in place to ensure that unauthorized administrator cannot acquire a certificate for your organization’s brand name.
    •Domain Protection: Discuss how you can prevent another CA from issuing certificates for your domain and detect previously issued certificates.
    •Domain and Brand Reputation: Explore subjects such as certificate transparency, Microsoft’s certificate reputation, HTTP public key pinning and certification authority authorization.
  • SSL Best Practices: Server Configuration & Enhanced Security
    SSL Best Practices: Server Configuration & Enhanced Security Mark Giannotii Recorded: May 16 2017 61 mins
    The best way to mitigate security vulnerabilities on your web server is to configure that server in the most reliable way. Join us for our SSL Best Practices webinar and learn to stop threats from the start. This complimentary webinar will explore server configuration and server enhancement. We will discuss how secure server configuration for SSL protects your sites from online threats and:
    •Implement the Proper Configuration: Learn which SSL server configuration options mitigate against known problems
    •Enhanced Security Features: Discuss enhanced security features and the benefits they provide
    •Tools For Configuration: Get a demonstration of available services that will help administrators assess the security configuration of their SSL web server
  • 5 Ways Security Impacts Website Engagement
    5 Ways Security Impacts Website Engagement Entrust Recorded: May 16 2017 43 mins
    Join cyber security leader SiteLock as they share insider tips on securing your website and web application that you can implement in your business right away.

    In this webinar, you will learn:
    •How to avoid Internet blacklisting
    •The latest technology used against malware
    •How to eliminate browser error messages
    •The importance of encrypting private customer data
    •and more…
  • SHA 1 Deprecation / SHA 2 Migration
    SHA 1 Deprecation / SHA 2 Migration Mark Giannotti Recorded: May 16 2017 59 mins
    Starting January 1, 2017, Chrome will completely stop supporting SHA-1 certificates. At this point, sites that have a SHA-1-based signature as part of the certificate chain (not including the self-signature on the root certificate) will trigger a fatal network error.
    Join us for a complimentary webinar to discuss how the deprecation of SHA-1 will affect your SSL enabled web sites.
    •Discuss the timing of the forthcoming updates to Google Chrome and the impact on certificates signed with SHA-1.
    •Discover which tools are available to identify certificates that are currently issued using SHA-1.
    •Learn how Certificate Authorities are helping SSL subscribers make the transition to SHA-2 signed certificates.
  • How a Reliable CA Can Help with the Certificate Lifecycle
    How a Reliable CA Can Help with the Certificate Lifecycle Mark Giannotti Recorded: May 16 2017 58 mins
    Managing your SSL certificates doesn’t have to be difficult. Join us for a complimentary webinar that covers, in-depth, how a reliable CA helps with the certificate lifecycle.
    •Learn the importance of selecting a reliable Certificate Authority for all your digital certificate needs.
    •Discuss what to look for when choosing your certificate provider.
    •Explore the components of a good certificate management solution and how it implements a Secure Service Lifecycle.
  • Web-based Applications: The Vulnerabilities Overview
    Web-based Applications: The Vulnerabilities Overview Mark Giannotti, Entrust Certificate Services Recorded: Mar 8 2017 56 mins
    Websites are under attack. In the last year, new vulnerabilities have been uncovered that allow malicious attackers to undermine security that organizations put in place to protect themselves and their end users sensitive information. SSL/TLS is a cornerstone for organizations doing business online, ensuring data confidentiality and trusted identification of websites. The good news is that there are quick and easy was to mitigate these new threats that have recently been identified. There are many aspects to implementing SSL/TLS according to best practices, one of which is related to Application Protection or Website Security.

    Key Benefits:

    * Learn about potential vulnerabilities in the area of application protection, such as malware, cross site scripting, and SQL Injection
    * Learn about some of the practical attacks that can be used to penetrate web based applications
    * Find out more about the latest techniques used to mitigate attacks on web based applications
  • Always-on SSL: Securing Your Website to Protect Your Users
    Always-on SSL: Securing Your Website to Protect Your Users Mark Giannotti Recorded: Mar 8 2017 63 mins
    Always-On SSL is an approach to securing your website to mitigate attacks against your users. The goal is to extend SSL hardening beyond your own server and to your user’s browser so that you can both be assured of the security that SSL/TLS is supposed to provide.

    Key Benefits:

    * Learn how you can provide visitors with a positive user experience while providing better security.
    * Discuss the vulnerabilities that can be exploited if you do not implement Always-On SSL including session hijacking, side-jacking, and similarly, man-in-the-middle attacks.
    * Learn how good server configuration, HSTS and EV SSL Certificates are key to the successful deployment of Always-On SSL.

Embed in website or blog