digital certificate solutions offer interoperable modules for managing digital certificates and creating an environment for authenticated, private and legally binding electronic communications and transactions.

Digital Certificate Technology Applications

Digital Signatures
Secure e-Mail
Web Server SSL
Secure VPN

Digital Signatures

Driven by many factors, including competitive pressures and regulatory requirements, enterprises and government agencies are striving to transform costly and cumbersome paper-based business processes into trusted, end-to-end e-business processes.

In this environment, signatures pose a special challenge. Unless enterprises can provide electronic signature capabilities that are considered binding, they must revert to inefficient manual processes whenever a signature is required. Typically this entails the user printing out an electronic document, hand-signing it and then transmitting the original via mail or courier. This “breakage” in the end-to-end electronic process has serious consequences: delaying revenue recognition, increasing the likelihood of human error, and adding significantly to the cost of sales and administration. With the Digital Signature technology applications, enterprises can add secure and binding digital signature capabilities to electronic documents including web forms and Adobe® Acrobat® PDF files. By eliminating the inefficiencies of handwritten signatures, organizations can benefit from shorter transaction times, faster revenue recognition and reduced business process costs.

Secure Email

Because of the speed and convenience it offers, e-mail has become an instrumental part of day-to-day business processes. Yet as widely as it is used today, e-mail cannot fully serve as a business-commerce platform.

Simply put, e-mail lacks assurance. Messages and attachments traveling across networks and the Internet can be easily opened or altered. This means that the parties cannot be certain that their communication is protected from interception and tampering.

This lack of assurance prevents organizations from using e-mail as a business-commerce platform to conduct negotiations or contractually obligate parties. Rather, businesses must revert to less efficient processes, such as courier service, when communications require a higher level of security and assurance.

Now, as organizations respond to regulatory requirements, customer demands for data privacy and increased competitive pressures, there is a growing demand for secure e-mail. The need is especially strong in key industries, including the insurance, financial services, healthcare, manufacturing and legal sectors.

With the Secure e-Mail technology application, enterprises can help ensure the privacy and integrity of e-mail communications without compromising end-user convenience. In turn, e-mail can be incorporated into trusted e-business processes, helping to shorten transaction times and reduce business process costs.

Web Server SSL

Web server authentication is an essential element of an organization’s trust strategy for e-business. In the same way that an enterprise wants to verify the identities of individuals who transact business on their web site, those visitors want to validate the entity they conduct transactions with. By reliably authenticating web servers to visiting browsers, SSL server certificates help build that trust.

Until recently, enterprises had to rely on an external provider to issue SSL server certificates. For many organizations—especially larger enterprises – this service-based model did not meet their needs. For example, in an environment with hundreds of servers, the annual cost of deploying server certificates quickly escalates. In addition, the speed and flexibility of issuing certificates is constrained by the provider’s business processes and delivery capabilities.

Given these factors, many organizations would prefer to manage web server authentication on their own. Now that is possible with the Web Server SSL technology.

Secure VPN

Virtual Private Networks (VPN) have given the world a new way to communicate. Now employees, business partners and customers can tap into critical information resources they need anytime and anywhere through the Internet.

The ability to enable instantaneous communication and information exchange can boost productivity and sharpen an organization’s competitive edge, but when the doors to the network are opened, how do you keep intruders locked out?

Virtual Private Networks provide a private tunnel through the Internet, but privacy does not equal security. The security of an organization’s network is only as strong as the method utilized to identify the end points of the VPN. VPN access protected by user name and passwords is a weak form of authentication and can easily be broken. Once a password is compromised, organizations no longer know who is at the other end of the VPN tunnel. For organizations to fully realize the benefits of a VPN, it must provide:

  • Strong authentication of users and devices
  • Confidentiality and privacy of information exchanged within the VPN
  • Seamless security that is easy to deploy and has minimal impact on users
  • Rapid and easy deployment for small and large numbers of users
  • Low total cost of ownership over the lifetime of the VPN

With the Secure VPN technology, enterprises can help ensure against unwanted intruders by strongly authenticating users and devices entering into the VPN.