SSL Support Team
eSigner is an innovative browser-based app that allows users worldwide to secure their electronic documents by applying trusted digital signatures using a cloud-based document signing
Read More »
What Is a Certificate Authority (CA)?
Certificate authorities (CAs) are critical in securing online communications and identities. But what exactly does a CA do? And how do they establish trust online?
Read More »
How to Choose the Right Digital Signature Solution for Your Business
The widespread adoption of remote work and paperless workflows has accelerated the need for secure digital document signing. Implementing the right e-signature solution can significantly
Read More »
eSigner Signing Credential Guide
What is an eSigner Signing Credential A signing credential is like an “ID” or a unique identifier that can be assigned to a person or
Read More »
Automatically Generate Unique IoT Device Certificates Using Pre-validated Domains
Step 1 Create an account at SSL.com through this link: https://secure.ssl.com/users/new Step 2 Pre-validate a domain. Using your SSL.com account portal, it is possible to pre-validate
Read More »
eSigner App Guide
eSigner is an innovative browser-based app that allows users worldwide to secure their electronic documents by applying trusted digital signatures using a cloud-based document signing
Read More »
Verified Mark Certificates: A Powerful Tool for Enterprise Email Security and Brand Reputation
Email remains the predominant communication channel for businesses worldwide. However, serious threats like phishing, spoofing, and brand impersonation continue to plague enterprise email inboxes. That’s
Read More »
What Is Certificate Pinning?
Certificate pinning is a security mechanism used in the context of authenticating client-server connections, particularly in the context of secure communication over HTTPS (Hypertext Transfer
Read More »
PKI and IoT: A Comprehensive Guide to Internet of Things Device Security
The Internet of Things (IoT) has rapidly evolved over the past decade, with billions of connected devices now deployed in homes, vehicles, utilities, factories, and
Read More »
Certificate Authority Security Best Practices Guide for Branded Resellers: Comprehensive Security Measures
Introduction As a leading Certificate Authority (CA) and a trust services company, we prioritize the security and trustworthiness of our digital certificates and our identity
Read More »
Minimizing Cyber Risk with Tools and Compliance
Imagine waking up one morning to the news that your company’s data had been compromised. Millions of users’ information was exposed. Your worst nightmare realized.
Read More »
SSL Certificates and SEO: How to Optimize for Search Engine Visibility
Search engine optimization is a moving target – Google’s algorithms change constantly. However, one constant for boosting your SEO is adopting HTTPS and SSL certificates
Read More »
On-Premises vs. Cloud HSMs: A Comparison
Organizations rely on Hardware Security Modules (HSMs) to safeguard cryptographic keys and accelerate cryptographic operations for critical applications. HSMs come in two primary deployment models:
Read More »
Best practices on enabling LTV signatures for document signing using self-managed HSMs
SSL.com provides turn-key remote cloud signing services through our eSigner signing operations API which includes the storage and management of private keys. However, many users
Read More »
SSL.com Legacy Cross-Signed Root Certificate Expiring on September 11, 2023
What is a cross-signed root certificate? A cross-signed root certificate is a digital certificate issued by one Certificate Authority (CA) that is used to establish
Read More »
The importance of migrating to SHA2 for your Private PKI
The IT sector has seen a trend in recent years toward replacing less safe cryptographic algorithms like SHA-1 with more secure ones like SHA-2. This
Read More »
A Guide to S/MIME Email Encryption Selection
Email continues to be the primary means of business communication and growing even with the ascendance of other popular productivity messengers. The security risks affecting
Read More »
How to Order an Individual Validation (IV) S/MIME Certificate
This how-to will walk you through ordering, submitting validation requirements, generating, and installing an Individual Validation (IV) S/MIME certificate from SSL.com. This affordable certificate offers S/MIME
Read More »
Code Signing Nuget Packages with eSigner
A NuGet package is a standardized format for distributing software libraries, tools, and assets in the .NET ecosystem. It allows developers to easily share and
Read More »
Enroll with eSigner for Remote Document and Code Signing
This guide will show you how to enroll a Document Signing , OV Code Signing, IV Code Signing, or EV Code Signing certificate in eSigner,
Read More »
Ordering Process for Code and Document Signing Certificates
Both code signing and document signing certificates have similar options when it comes to storage of the private keys and options for signing. All code
Read More »
Bulk Enrollment of Personal ID+Organization S/MIME Certificates
SSL.com provides bulk ordering and enrollment of Personal ID+Organization S/MIME certificates (also known as IV+OV S/MIME), through our bulk order tool. This guide will walk you
Read More »
How to Apply Digital Signatures to PDF Documents using eSigner with Adobe Acrobat Sign Integration
This guide demonstrates how to integrate SSL.com eSigner remote cloud signing service with Adobe Acrobat Sign and use it to digitally sign an electronic document such as
Read More »
How to Request Digital Signatures from Multiple Recipients using Adobe Acrobat Sign with eSigner Integration
Adobe Acrobat Sign enables the user to send PDFs and request digital signatures of other users. Follow these steps to create a signing flow on
Read More »
How to Use Pre-Signing Malware Scan with SSL.com eSigner
What is SSL.com Malware Scan? Malware Scan is a new service offered by SSL.com to software developers utilizing code signing certificates to assure that code
Read More »