Licensing Symantec Certificates
|
|
|
- Madeline Harrison
- 10 years ago
- Views:
Transcription
1 WHITE PAPER: LICENSING SYMANTEC CERTIFICATES White Paper Licensing Symantec Certificates Securing Multiple Web Server and Domain Configurations
2 Licensing Symantec Certificates Securing Multiple Web Server and Domain Configurations CONTENTS Introduction Symantec Licensing Certificate Mismatch Error Message Shared-Certificate Licensing Scenarios in Multi-Server Configurations Conclusion
3 Introduction To fully leverage the potential of the Internet as an efficient, far-reaching medium for electronic communications, business, and commerce, enterprises and service providers need a commonly accepted framework for securing online applications that can build a consistent expectation of trust for the user or consumer. Today, most enterprises rely on Secure Sockets Layer (SSL) certificates for that framework. SSL certificates enable users to authenticate websites, digitally sign documents, and encrypt sensitive data. To reliably provide these functions, SSL certificates must be used in technically sound configurations that adhere to basic principles of trust. As enterprises and service providers enhance their websites and extranets with new technology to reach larger audiences, server configurations have become increasingly complex. Enterprises and service providers must not only support SSL certificates for authentication and encryption capabilities, but also accommodate multiple domains and sub-domains, load balancing, and SSL acceleration requirements. NetSure Protection Plan Symantec offers its customers the NetSure Protection Plan with each SSL certificate. NetSure is an extended warranty program that protects Symantec SSL Certificate customers against economic loss resulting from the theft, corruption, impersonation, or loss of use of a Symantec SSL Certificate. NetSure is backed by Lloyd s of London, one of the world s largest A-rated insurance companies. Symantec Certificates come with up to $1,500,000 of NetSure protection. As the leading supplier of trust services for the Internet, Symantec has successfully issued SSL certificates to secure hundreds of thousands of websites using a wide range of network configurations. Symantec best practices and licensing requirements protect the use of its products and services to ensure a common, high-level standard of security across all types of configurations. This document explains the licensing and proper use of Symantec SSL Certificates for securing multiple Web servers and/or multiple domains and sub- domains in the following network configurations: Redundant server backups Multiple servers supporting multiple site names Multiple servers supporting a single site name Networks using SSL acceleration Virtual and shared hosting configurations Symantec Licensing To provide a reliable, scalable infrastructure that enables secure communications, transactions, and document exchange across the Internet, many enterprises rely on Symantec SSL Certificates to secure multiple domains and Web servers. Proper licensing and use of Symantec SSL Certificates ensure that certificates reliably provide their intended function uniformly across all types of deployments, allow subscribers to legitimately use Symantec products, and entitle them to the NetSure Protection Plan (see NetSure Protection Plan sidebar). Symantec has published its licensing requirements in the following legal documents, which are all located on Symantec.com/about/profile/ repository.jsp. Refer to these documents for the most up-to- date and authoritative licensing language: 3
4 Certification Practice Statement (CPS) The CPS is the basis of practices and procedures for which Symantec is responsible as a Certificate Authority (CA). Digital Certificate Subscriber Agreement This agreement must be agreed to in order to use a Symantec SSL Certificate. SSL Partner Center Agreement This agreement contains specific information for resellers of Symantec SSL Certificates. Norton Secured Seal Agreement This agreement governs the use of the Norton Secured Seal and other Symantec branding tools on customer websites. SSL-Certificate Use Restrictions One key requirement of the license is that subscribers retain control of the private key and take reasonable precautions to prevent its loss, disclosure, modification, or unauthorized use. Failure to do so can weaken or even jeopardize any certificatebased security measure, as possession of the private key allows a user to decrypt data and authenticate servers or users on behalf of the key s owner. Norton Secured Seal Be sure to post the Norton Secured Seal on your homepage or other pages where confidential information exchange takes place. The Norton Secured Seal lets your site visitors know that you have chosen leading services to help protect them. SSL certificates are designed for use only by the organization authenticated within the certificate: To use their SSL certificate on more than one server or multiple domains at a time, subscribers must have purchased the specific licensing option that permits the use of an SSL certificate on multiple servers, for example, Wildcard or Subject Alternative Name - certificates (SSL certificates are designed for use on one server at a time.) If not executed according to Symantec licensing agreements, certificate sharing can interfere with site authentication, diminish customer trust, and disqualify subscribers from NetSure protection. Improper use of certificate sharing across multiple instances or organizations may even expose an organization to software piracy issues. As an example, an ISP charged end-user merchants or other subscribers for use of Symantec SSL certificates and the SSL capabilities enabled by its deployment as shared certificates offering. This practice allowed the SSL partner to profit from the Symantec service (the SSL certificate) without paying the required Symantec fee, but is considered as software piracy. Symantec strictly prohibits this and similar practices and will pursue violators to the full extent of the law. Note: Although certain key requirements of Symantec licensing are discussed here, This document should not be considered a substitute for carefully reading the entire contents of the license agreements. Symantec considers any misuse of its licensing requirements a breach of contract and will revoke the certificates of violators or pursue other appropriate legal measures. In addition, failure to comply with these agreements automatically disqualifies subscribers from coverage under the NetSure Protection Plan, which leaves the customer liable for damages in the event of any compromised situation. 4
5 Best Practices for Ensuring Trust with SSL Certificates A number of practices related to SSL certificates and licensing play an important role in ensuring the security of websites. These practices site and enterprise authentication, private key protection, and prudent certificate use often become more complex when deploying multi-server configurations, and if they are not followed, security may be compromised. Site Authentication (URL-to-Certificate Name Matching) Client applications, such as Web browsers, must be able to verify that the site the user is visiting is the site that has been certified. In practice, this means that the URL of the site matches the common name of the certificate that the site presents to the client application (usually, the site s fully qualified domain name, such as This task is performed by the browser during authentication and is a fundamental feature of browsers using SSL. When the client performs URL-to-certificate name matching, it will detect that the URL of the site it is visiting is different from the common name in the certificate. Most browsers are programmed to alert users of this potential security risk and will present a dialog box similar to the one shown in the following figure. Certificate Mismatch Error Message This dialog box may create the impression that the site is not secure and dissuade prospective customers from doing business with the site. Norton Secured Seal Branding Requirements Besides protecting private keys and sharing certificates according to Norton requirements, subscribers must ensure the proper use of the Norton Secured Seal. This seal provides third-party verification of a site s identity when the customer clicks on it, and it is an important component of customer trust in Web transactions. To ensure reliable authentication, enterprises must install and display the Norton Secured Seal (if used) in accordance with the Norton Secured Seal Licensing Agreement ( symantec.com/about/profile/ policies/repository.jsp). This situation can also occur in configurations where multiple hostnames resolve to the same machine, such as and Enterprise Authentication (Site Name-to-Certificate Name Matching) The organization listed in the certificate must be tightly bound to the organization running the site. In practice, this means that the organization listed in the certificate should have the right to use the domain name in the common name of the SSL certificate and should be the entity with which the client is ultimately communicating or conducting business. It also means that the organization must have authorized the issuance of the certificate for a particular site. To meet these requirements, before issuing the SSL certificate, Symantec strongly validates the identity of the business and that the applicant is authorized to request the certificate. The browser then performs site name-to-certificate name matching during the authentication step of an SSL session with the SSL certificate. Many online retailers, banks, brokerage houses, healthcare organizations, 5
6 insurance companies, and other online businesses choose Symantec SSL Certificates to protect the sensitive information of their customers. These organizations understand the vital role business identity verification (or authentication ) plays in maintaining trust in online transactions. Symantec uses extensive authentication procedures that set the standard for the CA industry. Private Key Protection Private key protection is fundamental to ensuring security with SSL certificates. In an SSL session, the client uses the certificate s public key to send confidential information to the server. Because any information encrypted with the server s public key can be decrypted using the server s private key, whoever possesses the private key or a copy of the key can access the information. When a private key is created and stored in a single server, or preferably in a FIPS-140 Hardware Security Module (HSM), the key is reasonably well contained and auditable. The enterprise must carefully safeguard the certificate s private key as well as avoid any network configuration that compromises it. To ensure the highest level of security, Symantec recommends using a unique private key on each server in a multi-server deployment and having the hosting server generate the private keys. Dedicated Certificates One of the most common violations related to private key protection and also one that is most likely to seriously compromise security is certificate sharing, in which the same certificate and private key are copied to multiple machines or enabled for multiple users. Using the same certificate on multiple physical servers requires generating multiple copies of the same private key and storing that key in multiple locations. When private keys are moved among servers, either by network or disk. The chance of problems increases significantly in relation to the number of servers or users sharing a given certificate. Shared-Certificate Licensing Scenarios in Multi-Server Configurations Symantec recommends following best practices by not copying or sharing certificates (and private keys) among servers. However, due to redundancy, load balancing, and other performance and availability considerations, some customers have unique Web infrastructure configurations that require sharing certificates among multiple servers or other devices. The Symantec licensing policy contains provisions for sharing certificates in the following configurations: Redundant server backups Server load balancing SSL acceleration Shared hosting The following sections provide a detailed discussion of these shared certificate configurations and the Symantec licensing policies that apply to each of them. 6
7 Redundant Server Backups To maximize revenue and increase customer satisfaction, the Web servers running e-commerce and other business-critical applications must maintain high availability. To accomplish this goal, customers commonly use a redundant or standby server to back up their primary Web servers. The standby server typically has the same configuration and contains identical files as the primary server. If the primary server fails for any reason, the customer quickly deploys the standby server in its place, avoiding extended Web server downtime. If a customer has a standby server offline and brings it online only when the primary server fails, it is a cold standby server. If a customer has a standby server online and ready to receive traffic when the primary server fails, it is a hot standby or failover server. Symantec encourages customers to make one backup copy of the certificate and associated private key and store them both in a secure location. Although not recommended by Symantec (due to the increased risk of private key compromise described herein), it is also permissible for the customer to maintain the backup copies of the certificate and associated private key on one cold standby server. Server Load Balancing To improve website performance and availability, it is becoming increasingly common for customers to distribute website traffic across multiple servers using load balancing devices. Those servers may reside at one location or in geographically diverse locations. Load balancers can be configured to distribute website traffic to available servers based on several factors, including load or operational state of the servers, load or operational state of the network, and client browser location. There are two basic load balancing configurations: Dynamic Hostname Identical Hostname Licensed Certificate Option The Symantec subscriber agreement prohibits the customer from using a certificate on more than one physical server or device at a time, unless the customer has purchased the Licensed Certificate Option. However, customers with multiple server configurations may have a requirement to share certificates among servers or other devices. The Licensed Certificate Option allows the customer to obtain additional licenses to use the certificate on multiple servers with the identical Common Name. Due to the increased risk of private key compromise associated with copying certificates and private keys from server to server, this option is less secure than deploying unique certificates per server. For this reason, Symantec offers only $10,000 in NetSure warranty protection for each additional license purchased under the Licensed Certificate Option. Dynamic Hostname Configuration In this configuration, the website has multiple physical servers, each of which hosts a virtual server with a slightly different hostname (for example, ww1. mycompanycom, ww2.mycompany.com, and ww3.mycompany.com). Sharing a certificate between servers in a configuration where there are multiple physical servers with different hostnames should be avoided. During the SSL handshake, the client browser will detect that the URL of the website ww2.mycompany.com is different from the common name of the certificate ww1.mycompany.com and display a warning to the end user. Symantec recommends either unique certificates or wildcard certificates for dynamic hostname configurations: Unique Certificates Symantec recommends customers purchase individual certificates for dynamic hostname configurations. If the configuration contains more than five physical servers, Symantec recommends Symantec Trust Center 7
8 for Enterprise Account for quick and simple management of SSL certificates. Managed PKI for SSL is recommended for configuration that contains more than 25 physical servers. Managed PKI for SSL provides customers a robust, cloudbased service to centralize and manage multiple SSL certificates across the enterprise. For more information, visit Wildcard Certificates If individual certificates are not an option, Symantec offers wildcard certificates. A wildcard certificate is a special form of certificate that contains an asterisk in the hostname portion of the certificate s common name (for example, *.mycompany.com). This allows the certificate to secure multiple physical servers with different hostnames. Customers must purchase wildcard certificate licenses based on the number of unique hostnames in their dynamic hostname configurations. To request a wildcard certificate price quote, please send an request to [email protected]. For a discussion of wildcard compatibility issues, see the Wildcard Certificates sidebar. Identical Hostname Configuration In this configuration, the website has multiple physical servers, all of which share the same hostname (for example, three servers all named Symantec recommends either unique certificates or the Licensed Certificate option for configurations where there are multiple physical servers, all of which share the same hostname: Unique Certificates Create a different certificate for each different server. Because good PKI practices (and Symantec internal policies) prohibit the issuance of two certificates with exactly the same name, Symantec recommends that each certificate have the same common name and the same organizational name, but a different organizational unit, as illustrated in the following table. Certificate 1 Certificate 2 Certificate 3 Hostname www www www Common Name com com com Organization Mycompany, Inc Mycompany, Inc Mycompany, Inc Organizational Unit Server 1 Server 2 Server 3 For server farms containing more than five servers, Symantec recommends Managed PKI for SSL ( Licensed Certificate Option (see the sidebar on page 7) The Symantec subscriber agreement prohibits the customer from using a certificate on more than one physical server or device at a time, unless the customer has purchased the Licensed Certificate Option. However, customers with multiple server configurations may have a requirement to share certificates among servers or other devices. The Licensed Certificate Option allows the customer to obtain additional licenses to use the certificate on multiple servers with the identical Common Name. Due to the increased risk of private key compromise Wildcard Certificates Wildcard certificates are special certificates that are issued with an asterisk in the form of CN=*.symantec.com that are used to secure environments that feature dynamic hostnames. When adopting a wildcard certificate solution, keep in mind the following compatibility issues: Netscape browsers work with wildcards, but not with Microsoft IIS servers. Microsoft IIS uses Unicode as the character set for the common name field of wildcard certificates, and Netscape browsers do not support Unicode characters in certificates. For more information on wildcard compatibility with Microsoft products, visit support.microsoft.com/. Apache Web servers use printable string as the character set for the common name, which violates the X.208 specification. Many deployed versions of Internet Explorer do not work with wildcard certificates, especially if running on a Windows 2000 platform. Internet Explorer will correctly connect to these hosts, but end users will get a warning that the server certificate does not match the hostname to which they are connecting. 8
9 associated with copying certificates and private keys from server to server, this option is less secure than deploying unique certificates per server. For this reason, Symantec offers only $10,000 in NetSure warranty protection for each additional license purchased under the Licensed Certificate Option. SSL Acceleration SSL acceleration devices are becoming an increasingly critical tool for enhancing and optimizing the performance of secure websites. Deployment configurations for these devices vary depending on the topology of the customer s network, server configuration, and the specific SSL acceleration device being deployed. There are two basic SSL accelerator configurations: SSL sessions terminate at the Web server SSL sessions terminate before the Web server SSL Session Terminates at the Web Server Some vendors offer SSL acceleration solutions in which each server has its own accelerator card with a unique certificate. In this case, deployment configurations and associated licensing policies are the same as those described in the Server Load Balancing section on page 7. SSL Session Terminates before the Web Server SSL accelerators that terminate the SSL session before the Web server will either (a) re-encrypt the SSL session data to the server unencrypted. In the latter case, customers should be aware that sending data unencrypted from the point where the SSL session terminates to the server exposes their website visitors to increased security risks (see the SSL Session Terminates Before the Server Farm sidebar at right). SSL Session Terminates Before the Server Farm Using an SSL accelerator can pose a security risk, because in many cases the SSL session is terminated before the server farm, meaning that clear text is sent between the accelerator device and the server farm without encryption. Sending this portion of the client-to-server communications through clear text exposes enterprises to the risk of a security breach behind the firewall. For this reason, The Symantec NetSure Protection Plan is limited when deploying a certificate in an acceleration architecture. SSL accelerators featuring back-end encryption are recommended in all instances. Regardless of whether SSL session data terminates at or before the Web server, if the SSL accelerator contains a certificate pointing to multiple servers, the customer must use the Licensed Certificate Option to purchase additional licenses for each additional server the SSL accelerator is pointing to in the server farm. Licensed Certificate Option (see the sidebar on page 7) The Symantec subscriber agreement prohibits the customer from using a certificate on more than one physical server or device at a time, unless the customer has purchased the Licensed Certificate Option. However, customers with multiple server configurations may have a requirement to share certificates among servers or other devices. The Licensed Certificate Option allows the customer to obtain additional licenses to use the certificate on multiple servers with the identical Common Name. Due to the increased risk of private key compromise associated with copying certificates and private keys from server to server, this option is less secure than deploying unique certificates per server. For this reason, Symantec offers only $10,000 in NetSure warranty protection for each additional license purchased under the Licensed Certificate Option. 9
10 Note: Most SSL accelerator vendors have the built-in capability to support hundreds of certificates. If the configuration contains more than five physical servers, Symantec recommends Managed PKI for SSL. Managed PKI for SSL allows customers to conveniently manage multiple server certificates and provides discounted pricing for volume purchases. For more information, visit Shared Hosting On the Internet, the largest percentage volume of websites are hosted in a shared environment; that is, several sites are hosted on a single server. These shared hosted sites typically belong to entry-level customers who do not need the expanded functionality offered by dedicated hosting plans or to customers who want to start with a less expensive shared hosting option before graduating to a dedicated plan. A number of mechanisms are available for hosting a website in a shared environment. The use of SSL certificates in these environments has been ad hoc for several reasons: Typical shared hosting customers are extremely price sensitive, want ease of use, and are not interested in the technical aspects of their website. An SSL certificate requires a unique IP address/port combination, and available public IP addresses are scarce. Some server software does not provide the functionality to support dedicated certificates for virtual hosted customers. To circumvent the limitations imposed by shared hosting environments, Web hosts may offer Shared SSL plans. In a typical shared SSL plan, the Web host or ISP requests a certificate for its own domain (e.g., and then lets its customers use that certificate for securing their own transactions through a site redirection. This scenario allows other domains to use the encryption capabilities of the Web host s certificate but prevents authentication of individual organizations. Without authentication, online customers do not know to whom they are sending their information, creating the potential for a serious breach in security and exposing Web hosts to liability claims if their certificates are used to legitimize fraudulent transactions. Because this practice violates the basic principles of digital certificate trust, as well as the terms of Symantec Certificate Licensing, enterprises employing this practice automatically forfeit the NetSure protection provided with their certificate. If customers can be issued individual IP addresses, they should apply for individual SSL certificates, which will simplify authentication and encryption. If individual IP addresses cannot be assigned, license the SSL certificate to encrypt information for specific, authenticated customer domains. Symantec s Shared Hosting Security Service (SHSS) program provides the solution for this scenario. 10
11 Specific solutions for each type of hosting environment follow: Directory Based In this configuration, the ISP hosts customer websites under its own domain name, such as and So, if an SSL certificate is issued to there is a single hostname but multiple organizations using the same certificate. The ISP validates the identity of and provides information about each certificate user, and then licenses the certificate for the appropriate number of users/ organizations. Name Based In this scenario, the ISP hosts websites under their own domain names, such as and Obtain a wildcard SSL certificate with a common name such as *.isp.com licensed for use with a specified number of domains. This license allows individual customers to be authenticated and issued seals. For a discussion of wildcard compatibility issues, see the Wildcard Certificates sidebar on page 8. Domain Based In this scenario, the ISP and each customer have their own domain name, such as and but the secure pages for cust1 and cust2 are hosted under In this case, authentication of customer domains is possible and must be performed before encryption. Product Summary For more information about licensing agreements, please refer to the following documents: Certification Practice Statement (CPS) policies/repository.jsp End User Subscriber Agreement Symantec ISP Program Agreement Norton Secured Seal Licensing Agreement Certificates For more information about Symantec products and services, please refer to the following sites: Symantec Managed PKI for SSL Symantec SSL Certificates Secured Seal 11
12 Conclusion SSL certificates form the basis for trust and security in high-value Web applications by providing strong data encryption as well as reliable authentication of the site and the company with which a client is communicating. As the Internet evolves and enterprises and service providers require increasingly complex server configurations to secure their high-volume websites, Symantec is committed to providing solutions that provide a solid trust infrastructure for the Internet, while addressing the specific needs of these new environments. Symantec looks to continued participation from its customers, technology partners, and service provider channels to guide future development of products and services that allow each Internet end user to confidently use the Internet as a secure medium for highvalue online business, communications, and commerce. Visit us at 12
13 More Information Visit our website To speak with a Product Specialist in the U.S. Call 1 (866) or 1 (650) To speak with a Product Specialist outside the U.S. For specific country offices and contact numbers, please visit our website. About Symantec Symantec is a global leader in providing security, storage, and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. Symantec Corporation World Headquarters 350 Ellis Street Mountain View, CA USA 1 (866) Copyright 2012 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. VeriSign and other related marks are the trademarks or registered trademarks of VeriSign, Inc. or its affiliates or subsidiaries in the U.S. and other countries and licensed to Symantec Corporation. Other names may be trademarks of their respective owners.
Licensing VeriSign Certificates
Licensing VeriSign Certificates Securing Multiple Web Server and Domain Configurations CONTENTS + Introduction 3 + VeriSign Licensing 3 SSL-Certificate Use Restrictions 4 Best Practices for Ensuring Trust
WHITE PAPER. Licensing VeriSign Certificates: Securing Multiple Web Server and Domain Configurations
WHITE PAPER Licensing VeriSign Certificates: Securing Multiple Web Server and Domain Configurations CONTENTS Introduction 2 VeriSign Licensing 3 A. Server IDs Use Restrictions 3 B. Best Practices for Ensuring
Securing Microsoft Exchange 2010 with Symantec SSL Certificates
BUSINESS GUIDE: SECURING MICROSOFT EXCHANGE 2010 WITH SYMANTEC SSL CERTIFICATES Symantec Business Guide Securing Microsoft Exchange 2010 with Symantec SSL Certificates Best Practices for Securing Your
Securing Microsoft Exchange 2010 With VeriSign Authentication Services
BUSINESS GUIDE: SECURING MICROSOFT EXCHANGE 2010 WITH VERISIGN AUTHENTICATION SERVICES Symantec Business Guide Securing Microsoft Exchange 2010 With VeriSign Authentication Services Best Practices for
Symantec Managed PKI for SSL Support Overview. How to get quick and convenient customer support
WHITE PAPER: SYMANTEC MANAGED PKI FOR SSL SUPPORT OVERVIEW Symantec Managed PKI for SSL Support Overview How to get quick and convenient customer support Symantec Managed PKI for SSL Support Overview CONTENTS
Beginner s Guide to SSL Certificates
WHITE PAPER: BEGINNER S GUIDE TO SSL CERTIFICATES White Paper Beginner s Guide to SSL Certificates Making the Best Choice When Considering Your Online Security Options Beginner s Guide to SSL Certificates
Simplify SSL Certificate Management Across the Enterprise
WHITE PAPER White Paper Simplify SSL Certificate Management Across the Enterprise Simplify SSL Certificate Management Across the Enterprise Contents introduction 1 A Platform for Single-Point Control and
Managing SSL Security in Multi-Server Environments
Managing SSL Security in Multi-Server Environments VeriSign s Easy-to-Use Web-Based Services Speed SSL Certificate Management and Cuts Total Cost of Security CONTENTS + A Smart Strategy for Managing SSL
White Paper. Enhancing Website Security with Algorithm Agility
ENHANCING WEBSITE SECURITY WITH ALGORITHM AGILITY White Paper Enhancing Website Security with Algorithm Agility Enhancing Website Security with Algorithm Agility Contents Introduction 3 Encryption Today
Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical to Today s Enterprise
Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical to Today s Enterprise White Paper Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical
Wildcard and SAN: Understanding multi-use SSL Certificates
WHITE PAPER: WILDCARD AND SAN: UNDERSTANDING MULTI-USE SSL CERTIFICATES White paper Wildcard and SAN: Understanding multi-use SSL Certificates Leveraging multi-use digital certificates to simplify certificate
White paper. Implications of digital certificates on trusted e-business.
White paper Implications of digital certificates on trusted e-business. Abstract: To remain ahead of e-business competition, companies must first transform traditional business processes using security
Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software
WHITE PAPER: COMPARING TCO: SYMANTEC MANAGED PKI SERVICE........ VS..... ON-PREMISE........... SOFTWARE................. Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software
Realize Greater Profits As An Authorized Reseller Of Network Solutions nsprotect Secure SSL Certificates
Network Solutions Secure Services Realize Greater Profits As An Authorized Reseller Of Network Solutions nsprotect Secure s The Federal Trade Commission (FTC) estimates that 3.2 million US citizens every
Wildcard and SAN: Understanding Multi-Use SSL Certificates
Wildcard and SAN: Understanding Multi-Use SSL Certificates LEVERAGING MULTI-USE DIGITAL CERTIFICATES TO SIMPLIFY CERTIFICATE MANAGEMENT AND REDUCE COSTS Wildcard and SAN: Understanding Multi-Use SSL Certificates
White Paper. Business Continuity and Breach Protection: Why SSL Certificate Management is Critical to Today s Enterprise
WHITE PAPER: BUSINESS CONTINUITY AND BREACH PROTECTION White Paper Business Continuity and Breach Protection: Why SSL Certificate Management is Critical to Today s Enterprise Business Continuity and Breach
White Paper. Simplify SSL Certificate Management Across the Enterprise
WHITE PAPER: SIMPLIFY SSL CERTIFICATE MANAGEMENT ACROSS THE ENTERPRISE White Paper Simplify SSL Certificate Management Across the Enterprise Simplify SSL Certificate Management Across the Enterprise Contents
Security and Trust: The Backbone of Doing Business Over the Internet
WHITE PAPER: SECURITY AND TRUST: THE BACKBONE OF DOING BUSINESS OVER THE INTERNET White Paper Security and Trust: The Backbone of Doing Business Over the Internet Security and Trust: The Backbone of Doing
Understanding Digital Certificates & Secure Sockets Layer A Fundamental Requirement for Internet Transactions
A Fundamental Requirement for Internet Transactions May 2007 Copyright 2007 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management
Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data
Symantec Managed PKI Service Deployment Options
WHITE PAPER: SYMANTEC MANAGED PKI SERVICE DEPLOYMENT............. OPTIONS........................... Symantec Managed PKI Service Deployment Options Who should read this paper This whitepaper explains
Enterprise SSL FEATURES & BENEFITS
Enterprise SSL FEATURES & BENEFITS What s included: - Powerful 1024-bit signed RSA certificates - Centralised, web-based administrative portal for certificate management - Dynamically-generated site seal
White paper. How to choose a Certificate Authority for safer web security
White paper How to choose a Certificate Authority for safer web security Executive summary Trust is the cornerstone of the web. Without it, no website or online service can succeed in the competitive online
Using Entrust certificates with VPN
Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
PROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud
PROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud Blue skies ahead? Yes if you are protected when you move to the cloud. Lately, it seems as if every enterprise
Symantec Backup Exec 11d for Windows Servers New Encryption Capabilities
WHITE PAPER: ENTERPRISE SECURITY Symantec Backup Exec 11d for Windows Servers New Encryption Capabilities White Paper: Enterprise Security Symantec Backup Exec 11d for Windows Servers Contents Executive
Frequently Asked Questions. Frequently Asked Questions: Securing the Future of Trust on the Internet
FREQUENTLY ASKED QUESTIONS: SECURING THE FUTURE OF TRUST ON THE INTERNET Frequently Asked Questions Frequently Asked Questions: Securing the Future of Trust on the Internet Securing the Future of Trust
Portal Administration. Administrator Guide
Portal Administration Administrator Guide Portal Administration Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec
Veritas Storage Foundation High Availability for Windows by Symantec
Veritas Storage Foundation High Availability for Windows by Symantec Simple-to-use solution for high availability and disaster recovery of businesscritical Windows applications Data Sheet: High Availability
BEGINNERS GUIDE BEGINNERS GUIDE TO SSL CERTIFICATES: MAKING THE BEST CHOICE WHEN CONSIDERING YOUR ONLINE SECURITY OPTIONS
BEGINNERS GUIDE TO SSL CERTIFICATES: MAKING THE BEST CHOICE WHEN CONSIDERING YOUR ONLINE SECURITY OPTIONS BEGINNERS GUIDE TO SSL CERTIFICATES INTRODUCTION Whether you are an individual or a company, you
SECURING MULTIPLE DOMAINS WITH SSL Subject Alternative Name (SAN) Certificates and Unified Communications Certificates (UCC) WHITE PAPER
SECURING MULTIPLE DOMAINS WITH SSL Subject Alternative Name (SAN) Certificates and Unified Communications Certificates (UCC) WHITE PAPER Securing Multiple Domains with SSL Subject Alternative Name (SAN)
Securing your Online Data Transfer with SSL
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4. What does
White Paper. BD Assurity Linc Software Security. Overview
Contents 1 Overview 2 System Architecture 3 Network Settings 4 Security Configurations 5 Data Privacy and Security Measures 6 Security Recommendations Overview This white paper provides information about
BEGINNERS GUIDE TO SSL CERTIFICATES: Making the BEST choice when considering your online security options
BEGINNERS GUIDE TO SSL CERTIFICATES: Making the BEST choice when considering your online security options BEGINNERS GUIDE TO SSL CERTIFICATES Introduction Whether you are an individual or a company, you
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
Email Security Solutions
TECHNOLOGY REPORT Email Security Solutions 1 TECHNOLOGY REPORT SUPPLEMENT EMAIL SECURITY TECHNOLOGY REPORT IF YOUR EMAIL IS SO CRITICAL, CAN YOU BE SURE IT S REALLY REALLY PRIVATE? FIND THE FULL RESULTS
TOP SECRETS OF CLOUD SECURITY
TOP SECRETS OF CLOUD SECURITY Protect Your Organization s Valuable Content Table of Contents Does the Cloud Pose Special Security Challenges?...2 Client Authentication...3 User Security Management...3
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application INDEX 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4.
RSA Digital Certificate Solution
RSA Digital Certificate Solution Create and strengthen layered security Trust is a vital component of modern computing, whether it is between users, devices or applications in today s organizations, strong
A Symantec Connect Document. A Total Cost of Ownership Viewpoint
A Symantec Connect Document Two-Factor Authentication A Total Cost of Ownership Viewpoint White Paper: Two-Factor Authentication: A TCO Viewpoint Two-Factor Authentication Contents Introduction............................................................................................
NetSure Certificate means any of the types of Certificates that are subject to this Plan, as listed in Appendix A, List of Covered Services.
THIS EXTENDED WARRANTY PROTECTION PLAN ( Plan ) is provided by Symantec Corporation ( Symantec ) to NetSure Subscribers identified below. NetSure Subscribers holding Symantec Trust Network, Thawte, GeoTrust,
Symantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
How To Install A Citrix Netscaler On A Pc Or Mac Or Ipad (For A Web Browser) With A Certificate Certificate (For An Ipad) On A Netscaler (For Windows) With An Ipro (For
Deployment Guide Deployment Guide VeriSign Certificate Authority Citrix NetScaler SSL Deployment Guide Notice: The information in this publication is subject to change without notice. THIS PUBLICATION
Managing SSL Certificates with Ease
WHITE PAPER: MANAGING SSL CERTIFICATES WITH EASE White Paper Managing SSL Certificates with Ease Best Practices for Maintaining the Security of Sensitive Enterprise Transactions Managing SSL Certificates
Copyright http://support.oracle.com/
Primavera Portfolio Management 9.0 Security Guide July 2012 Copyright Oracle Primavera Primavera Portfolio Management 9.0 Security Guide Copyright 1997, 2012, Oracle and/or its affiliates. All rights reserved.
BlackShield ID Agent for Remote Web Workplace
Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,
The Impact of HIPAA and HITECH
The Health Insurance Portability & Accountability Act (HIPAA), enacted 8/21/96, was created to protect the use, storage and transmission of patients healthcare information. This protects all forms of patients
Symantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
Symantec Desktop and Laptop Option 7.6
Automated protection for desktops and laptops Data Sheet: Backup and Disaster Recovery Overview With the majority of business-critical information residing outside the data centers or on off corporate
Symantec Mobile Management for Configuration Manager 7.2
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
SSL Certificates and Bomgar
SSL Certificates and Bomgar 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective
Why self-signed certificates are much costlier and riskier than working with a trusted security vendor
The Hidden Costs of Self-Signed SSL Certificates Why self-signed certificates are much costlier and riskier than working with a trusted security vendor Introduction Even when business is booming, smart
thawte Certification Practice Statement
thawte Certification Practice Statement Version 3.7.5 Effective Date: 4 June, 2012 (All CA/Browser Forum-specific requirements are effective on July 1, 2012) thawte Certification Practice Statement 2012
Managed Public Key Infrastructure
WHITE PAPER: MANAGED PUBLIC KEY INFRASTRUCTURE........................................ Managed Public Key Infrastructure Who should read this paper To operate business-critical applications over the Internet,
The Benefits of the thawte ISP Program
The Benefits of the thawte ISP Program Earn additional revenue by reselling thawte digital certificate products... 1. Overview 2. Who Should Join? 3. The ISP Program what are the Benefits? 4. How can you
Privacy Policy & Terms of Use Effective: 12/13/2011. Terms and Conditions. Changes in this Privacy Policy. Internet Privacy & Security
Privacy Policy & Terms of Use Effective: 12/13/2011 Terms and Conditions Schoology (the "Service") provided by Schoology, Inc. ("Schoology") with permission of your local school, local school district,
Athena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
Leveraging Symantec CIC and A10 Thunder ADC to Simplify Certificate Management
Leveraging Symantec CIC and A10 Thunder ADC to Simplify Certificate Management Identify, Monitor and Manage All SSL Certificates Present Datasheet: Leveraging Symantec CIC and A10 Thunder ADC The information
How To Support Bring Your Own Device (Byod)
WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses
Data Sheet: Disaster Recovery Veritas Volume Replicator by Symantec Data replication for disaster recovery
Data replication for disaster recovery Overview Veritas Volume Replicator provides organizations with a world-class foundation for continuous data replication, enabling rapid and reliable recovery of critical
HIPAA Privacy & Security White Paper
HIPAA Privacy & Security White Paper Sabrina Patel, JD +1.718.683.6577 [email protected] Compliance TABLE OF CONTENTS Overview 2 Security Frameworks & Standards 3 Key Security & Privacy Elements
2012 Endpoint Security Best Practices Survey
WHITE PAPER: 2012 ENDPOINT SECURITY BEST PRACTICES SURVEY........................................ 2012 Endpoint Security Best Practices Survey Who should read this paper Small and medium business owners
What is an SSL Certificate?
Security is of the utmost importance when doing business on the Web. Your customers want to know that their information is protected when crossing data lines. A Thawte SSL Web Server Certificate or SuperCert
Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions
Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions February 2005 All rights reserved. Page i Entrust is a registered trademark of Entrust,
Endpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments
Endpoint Management and Mobility Solutions from Symantec Adapting traditional IT operations for new end-user environments During the past few years the traditional concept of end-user computing has drastically
NETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
Email Data Protection. Administrator Guide
Email Data Protection Administrator Guide Email Data Protection Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec,
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Applied Technology Abstract The Web-based approach to system management taken by EMC Unisphere
Symantec NetBackup 7.5 What s New and Version Comparison Matrix
Symantec NetBackup 7.5 What s New and Version Comparison Matrix Solution Overview: Data Protection While backup takes many forms, recovery shouldn t. Symantec NetBackup with V-Ray technology is the single
Does your Organization Need a Managed SSL Service?
MSSL Order Guide 1 Ordering Guide for Managed SSL -Product Overview -Ordering Process -Managing your Account Overview of Managed SSL (MSSL) MSSL allows you to manage the complete lifecycle of multiple
Understanding Enterprise Cloud Governance
Understanding Enterprise Cloud Governance Maintaining control while delivering the agility of cloud computing Most large enterprises have a hybrid or multi-cloud environment comprised of a combination
How Drive Encryption Works
WHITE PAPER: HOW DRIVE ENCRYPTION WORKS........................................ How Drive Encryption Works Who should read this paper Security and IT administrators Content Introduction to Drive Encryption.........................................................................................
Two-Factor Authentication
WHITE PAPER: TWO-FACTOR AUTHENTICATION: A TCO VIEWPOINT........................................ Two-Factor Authentication Who should read this paper This whitepaper is directed at IT, Security, and Compliance
Cybersecurity and Secure Authentication with SAP Single Sign-On
Solution in Detail SAP NetWeaver SAP Single Sign-On Cybersecurity and Secure Authentication with SAP Single Sign-On Table of Contents 3 Quick Facts 4 Remember One Password Only 6 Log In Once to Handle
bbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5
bbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5 2008 Adobe Systems Incorporated. All rights reserved. Adobe Flash Media Rights Management Server 1.5 Overview for Microsoft
White Paper: Whole Disk Encryption
How Whole Disk Encryption Works White Paper: Whole Disk Encryption How Whole Disk Encryption Works Contents Introduction to Whole Disk Encryption.....................................................................
Why Digital Certificates Are Essential for Managing Mobile Devices
WHITE PAPER: WHY CERTIFICATES ARE ESSENTIAL FOR MANAGING........... MOBILE....... DEVICES...................... Why Digital Certificates Are Essential for Managing Mobile Devices Who should read this paper
Strong Authentication for Microsoft SharePoint
Strong Authentication for Microsoft SharePoint with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
Veritas Replicator from Symantec
Data replication across multi-vendor storage for cost effective disaster recovery Data Sheet: Disaster Recovery Overviewview provides organizations with a comprehensive solution for heterogeneous data
beginners guide Beginners Guide Certificates the best decision when considering your online security options.
Beginners Guide to Digital SSL Certificates the best decision when considering your online security options. Beginners Guide to Digital SSL Certificates introduction Whether you are an individual or a
Baltimore UniCERT. www.baltimore.com. the world s leading PKI. global e security
TM the world s leading PKI www.baltimore.com global e security Bringing Real Business On-Line The Internet is now forming a key part of organizations operating strategy. Although most companies accept
RED HAT SECURE WEB SERVER 3.0 DEVELOPER EDITION FOR COBALT NETWORKS SERVERS
RED HAT SECURE WEB SERVER 3.0 DEVELOPER EDITION FOR COBALT NETWORKS SERVERS Cobalt Secure Web Server (SSL) Cobalt Networks, Inc Features: 128 bit Encryption* Based on Redhat's Secure Server Apache 1.3.6
Secured email Enterprise eprivacy Suite
EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT Secured email Enterprise eprivacy Suite JANUARY 2007 www.westcoastlabs.org 2 EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT CONTENTS Secured email Enterprise eprivacy
Confidence in the Cloud Five Ways to Capitalize with Symantec
Five Ways to Capitalize with Symantec Solution Brief: Confidence in the Cloud Confidence in the Cloud Contents Overview...............................................................................................
REGULATIONS FOR THE SECURITY OF INTERNET BANKING
REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY
BUSINESS ONLINE BANKING AGREEMENT
BUSINESS ONLINE BANKING AGREEMENT This Business Online Banking Agreement ("Agreement") establishes the terms and conditions for Business Online Banking Services ( Service(s) ) provided by Mechanics Bank
Choosing a Cloud Hosting Provider with Confidence
WHITE PAPER: CHOOSING A CLOUD HOSTING PROVIDER WITH CONFIDENCE White Paper Choosing a Cloud Hosting Provider with Confidence Thawte SSL Certificates Provide a Secure Bridge to Trusted Cloud Hosting Providers
Symantec Enterprise Vault for Microsoft Exchange
Symantec Enterprise Vault for Microsoft Exchange Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving Symantec Enterprise Vault, the industry
Open Data Center Alliance Usage: Provider Assurance Rev. 1.1
sm Open Data Center Alliance Usage: Provider Assurance Rev. 1.1 Legal Notice This Open Data Center Alliance SM Usage:Provider Assurance is proprietary to the Open Data Center Alliance, Inc. NOTICE TO USERS
