SSL Support Team
The quantum threat is a significant concern as quantum computing grows in popularity and profoundly alters the digital landscape. Quantum computing used to be an
Read More »
How to publish your S/MIME certificate to a Global Address List (GAL)
What is a Global Address List (GAL)? A Global Address List (GAL) is a centralized directory of email addresses and contact information within an organization’s
Read More »
LDAP Integration with S/MIME Certificates
LDAP (Lightweight Directory Access Protocol) is an industry-standard protocol for accessing and managing directory information services. It is commonly used for storing and retrieving information
Read More »
Automatically Generate Unique IoT Device Certificates Using Prevalidated Domains
Introduction: SSL.com provides a domain prevalidation capability that speeds up the process to issue certificates. The process is extended to all subdomains to the left
Read More »
Bulk Enrollment of Basic S/MIME and NAESB Certificates
SSL.com provides bulk ordering and enrollment of Basic S/MIME and NAESB certificates through our bulk order tool. This guide will walk you through the enrollment
Read More »
How to eseal a Document Using eSigner
Esealing is an option for users who want to quickly sign their documents on esigner.com using SSL.com’s self-issued document signing certificate. With esealing, there is
Read More »
Create a Signing Workflow using eSigner
eSigner is an innovative browser-based app that allows users worldwide to secure their electronic documents by applying trusted digital signatures using a cloud-based document signing
Read More »
Sign an Electronic Document using eSigner
eSigner is an innovative browser-based app that allows users worldwide to secure their electronic documents by applying trusted digital signatures using a cloud-based document signing
Read More »
What Is a Certificate Authority (CA)?
Certificate authorities (CAs) are critical in securing online communications and identities. But what exactly does a CA do? And how do they establish trust online?
Read More »
How to Choose the Right Digital Signature Solution for Your Business
The widespread adoption of remote work and paperless workflows has accelerated the need for secure digital document signing. Implementing the right e-signature solution can significantly
Read More »
eSigner Signing Credential Guide
What is an eSigner Signing Credential A signing credential is like an “ID” or a unique identifier that can be assigned to a person or
Read More »
Automatically Generate Unique IoT Device Certificates Using Pre-validated Domains
Step 1 Create an account at SSL.com through this link: https://secure.ssl.com/users/new Step 2 Pre-validate a domain. Using your SSL.com account portal, it is possible to pre-validate
Read More »
eSigner App Guide
eSigner is an innovative browser-based app that allows users worldwide to secure their electronic documents by applying trusted digital signatures using a cloud-based document signing
Read More »
Verified Mark Certificates: A Powerful Tool for Enterprise Email Security and Brand Reputation
Email remains the predominant communication channel for businesses worldwide. However, serious threats like phishing, spoofing, and brand impersonation continue to plague enterprise email inboxes. That’s
Read More »
What Is Certificate Pinning?
Certificate pinning is a security mechanism used in the context of authenticating client-server connections, particularly in the context of secure communication over HTTPS (Hypertext Transfer
Read More »
PKI and IoT: A Comprehensive Guide to Internet of Things Device Security
The Internet of Things (IoT) has rapidly evolved over the past decade, with billions of connected devices now deployed in homes, vehicles, utilities, factories, and
Read More »
Certificate Authority Security Best Practices Guide for Branded Resellers: Comprehensive Security Measures
Introduction As a leading Certificate Authority (CA) and a trust services company, we prioritize the security and trustworthiness of our digital certificates and our identity
Read More »
Minimizing Cyber Risk with Tools and Compliance
Imagine waking up one morning to the news that your company’s data had been compromised. Millions of users’ information was exposed. Your worst nightmare realized.
Read More »
SSL Certificates and SEO: How to Optimize for Search Engine Visibility
Search engine optimization is a moving target – Google’s algorithms change constantly. However, one constant for boosting your SEO is adopting HTTPS and SSL certificates
Read More »
On-Premises vs. Cloud HSMs: A Comparison
Organizations rely on Hardware Security Modules (HSMs) to safeguard cryptographic keys and accelerate cryptographic operations for critical applications. HSMs come in two primary deployment models:
Read More »
Best practices on enabling LTV signatures for document signing using self-managed HSMs
SSL.com provides turn-key remote cloud signing services through our eSigner signing operations API which includes the storage and management of private keys. However, many users
Read More »
SSL.com Legacy Cross-Signed Root Certificate Expiring on September 11, 2023
What is a cross-signed root certificate? A cross-signed root certificate is a digital certificate issued by one Certificate Authority (CA) that is used to establish
Read More »
The importance of migrating to SHA2 for your Private PKI
The IT sector has seen a trend in recent years toward replacing less safe cryptographic algorithms like SHA-1 with more secure ones like SHA-2. This
Read More »
A Guide to S/MIME Email Encryption Selection
Email continues to be the primary means of business communication and growing even with the ascendance of other popular productivity messengers. The security risks affecting
Read More »
How to Order an Individual Validation (IV) S/MIME Certificate
This how-to will walk you through ordering, submitting validation requirements, generating, and installing an Individual Validation (IV) S/MIME certificate from SSL.com. This affordable certificate offers S/MIME
Read More »