Transport Layer Security

Versa Networks Achieves NSS Labs NGFW Recommended Rating

Retrieved on: 
Tuesday, July 23, 2019

SAN JOSE, California, July 23, 2019 /PRNewswire/ --Versa Networks innovator of the Secure Cloud IP platform announced that it has achieved a highly coveted Recommended rating for the second consecutive year in the NSS Labs Next Generation Firewall (NGFW) Group Test.

Key Points: 
  • SAN JOSE, California, July 23, 2019 /PRNewswire/ --Versa Networks innovator of the Secure Cloud IP platform announced that it has achieved a highly coveted Recommended rating for the second consecutive year in the NSS Labs Next Generation Firewall (NGFW) Group Test.
  • Versa Networks' flagship software product, FlexVNF, garnered a 99% Exploit Block Rate, and strong scores for Performance, SSL/TLS Functionality and TCO (total cost of ownership), marking the second consecutive year that Versa achieved a Recommended NGFW rating by NSS Labs.
  • Versa Networks is one of only two vendors with security enabled to achieve a Recommended rating in the recent 2019 NSS Labs SD-WAN test.
  • To download the NGFW 9.0 Test Report conducted by NSS Labs, visit: NGFW 2019 Test Report: Versa Networks FlexVNF V16.1R2-S7 .

Engage Black Validates BlackVault HSM Interoperability with Red Hat Certificate System 9.4

Retrieved on: 
Monday, July 22, 2019

The Red Hat Certificate System 9.4 is now an NSA CSfC approved CA with NIAP certification for compliance with the Common Criteria Protection Profile for Certification Authorities (v2.1).

Key Points: 
  • The Red Hat Certificate System 9.4 is now an NSA CSfC approved CA with NIAP certification for compliance with the Common Criteria Protection Profile for Certification Authorities (v2.1).
  • X.509 certificate issuance for individuals, routers, webservers, VPNs, and internet phones.
  • "Validation with Red Hat's Certificate System provides CSfC integrators with a Made in America HSM that also fits in Tactical kits."
  • Red Hat specializes in the design and development of standards-conforming conventional and public key encryption and authentication software.

OAIC releases new beta website for user feedback

Retrieved on: 
Thursday, June 27, 2019

We’re refreshing our website to make it easier for the community, business and other users to find the information they need.

Key Points: 
  • A beta version of the website has been released at https://beta.oaic.gov.au and were inviting feedback on the changes before we launch the new site in mid-July.
  • Beta website security upgrade

    The new site also has enhanced security settings and does not support TLS 1.0 and 1.1.

  • If visitors do experience issues loading our beta site we recommend updating the browser or installing an alternative browser.
  • Website security is important to us and some older browsers are no longer able to provide the security we need to operate safely.

Forty Percent of the Largest Banks in North America Do Not Use Best-Practice Security Measures to Protect Against Phishing

Retrieved on: 
Thursday, June 27, 2019

The study found that a notable percentage of banks left customers vulnerable to phishing scams, but that all banks do use some form of SSL certificates.

Key Points: 
  • The study found that a notable percentage of banks left customers vulnerable to phishing scams, but that all banks do use some form of SSL certificates.
  • View the full release here: https://www.businesswire.com/news/home/20190627005150/en/
    Sectigo found that 40% of the largest banks in North America do not have Extended Validation (EV) on their online banking home and/or login pages.
  • In North America, 40% of banks studied did not receive the highest rating, awarded in part for the use Extended Validation (EV) certificates to demonstrate the websites true, authenticated identity.
  • EV shows customers that the website employs best-of-breed security measures to protect transactions and ensure compliance with standards and regulations.

$3.6 Bn Public Key Infrastructure Market by Component, Deployment Type, Organization Size, Vertical, and Region - Global Forecast to 2024 - ResearchAndMarkets.com

Retrieved on: 
Tuesday, June 25, 2019

The "Public Key Infrastructure Market by Component (Solution and Services (Professional and Managed)), Deployment Type, Organization Size, Vertical (BFSI, Telecom and IT, Healthcare and Life Sciences), and Region - Global Forecast to 2024" report has been added to ResearchAndMarkets.com's offering.

Key Points: 
  • The "Public Key Infrastructure Market by Component (Solution and Services (Professional and Managed)), Deployment Type, Organization Size, Vertical (BFSI, Telecom and IT, Healthcare and Life Sciences), and Region - Global Forecast to 2024" report has been added to ResearchAndMarkets.com's offering.
  • However, lack of awareness among organizations about the importance of PKI certificates may restrain market growth.
  • The solution segment is expected to hold a larger market size in the PKI market during the forecast period.
  • Owing to these factors, organizations are adopting the cloud-based deployment type for deploying PKI solutions on a large scale.

First Commercial Certificate Authority To Augment Microsoft CA, Sectigo Manages Private and Public Certificates in a Single Platform

Retrieved on: 
Thursday, June 20, 2019
Key Points: 
  • View the full release here: https://www.businesswire.com/news/home/20190620005024/en/
    Sectigo Private PKI service enables issuance and management of dozens of PKI-aware applications from a single platform.
  • Certificates issued from a private CA are trusted only within the controlled environments of the enterprises infrastructure, partners, and customers.
  • The Private PKI solution utilizes an existing Microsoft CA as a root to Sectigo, eliminating the need to provision a new root certificate.
  • Sectigo Private PKI is a capability of Sectigo Certificate Manager , a platform that enables enterprises to productively manage private certificates and adhere to corporate and industry compliance standards.

Gresham Strengthens Cyber-security Posture with PCI DSS 3.2 Accreditation

Retrieved on: 
Thursday, June 20, 2019

The Attestation of Compliance to PCI DSS 3.2 is essential for the firm's retail banking clients aiming to protect their customers' data from malicious cyber and other attacks.

Key Points: 
  • The Attestation of Compliance to PCI DSS 3.2 is essential for the firm's retail banking clients aiming to protect their customers' data from malicious cyber and other attacks.
  • The certification is designed to protect cardholder data from theft and applies to all entities that store, process or transmit cardholder data.
  • Updates to the PCI DSS 3.2 include additional requirements around the use of multi-factor authentication and migration deadlines for removal of Secure Sockets Layer (SSL) /early Transport Layer Security (TLS).
  • We are pleased our processes are being recognised for the PCI DSS certification."

Gresham Strengthens Cyber-security Posture with PCI DSS 3.2 Accreditation

Retrieved on: 
Thursday, June 20, 2019

The Attestation of Compliance to PCI DSS 3.2 is essential for the firm's retail banking clients aiming to protect their customers' data from malicious cyber and other attacks.

Key Points: 
  • The Attestation of Compliance to PCI DSS 3.2 is essential for the firm's retail banking clients aiming to protect their customers' data from malicious cyber and other attacks.
  • The certification is designed to protect cardholder data from theft and applies to all entities that store, process or transmit cardholder data.
  • Updates to the PCI DSS 3.2 include additional requirements around the use of multi-factor authentication and migration deadlines for removal of Secure Sockets Layer (SSL) /early Transport Layer Security (TLS).
  • We are pleased our processes are being recognised for the PCI DSS certification."

LXI Consortium Selects GlobalSign as its Device Identity Provider of Choice to Secure all LXI compliant devices

Retrieved on: 
Monday, June 17, 2019

GlobalSign safeguards the certified equipment and equipment webservers of LXI members, from the manufacturing floor through end-customer deployment.

Key Points: 
  • GlobalSign safeguards the certified equipment and equipment webservers of LXI members, from the manufacturing floor through end-customer deployment.
  • This is accomplished through a device identity provisioning and management system, built on the GlobalSign IoT Identity Platform in partnership with security framework provider beame.io's authentication services.
  • Online Certificate Status Protocol (OCSP) revocation services allow LXI to invalidate specific devices in the event of lost or stolen equipment.
  • The LXI Consortium ( www.lxistandard.org ) is a standard-setting organization in the Test & Measurement industry that develops, maintains, and promotes the open LXI Standard.

Corsa Technology Shifts Strategic Direction to Develop a Winning Approach for Scaling Network Security

Retrieved on: 
Wednesday, May 29, 2019

OTTAWA, Ontario, May 29, 2019 /PRNewswire-PRWeb/ -- Corsa Technology today announced it has developed the winning approach for scaling network security by virtualizing the network security stack, which provides the simplicity, performance and flexibility that large enterprises need.

Key Points: 
  • OTTAWA, Ontario, May 29, 2019 /PRNewswire-PRWeb/ -- Corsa Technology today announced it has developed the winning approach for scaling network security by virtualizing the network security stack, which provides the simplicity, performance and flexibility that large enterprises need.
  • By leveraging unique networking expertise and proven virtualization technologies, Corsa's approach is built on software-defined network security principles and allows large enterprises to scale their network security to achieve 100% SSL/TLS visibility in an economical way.
  • Skilled in Cyber Security, Network Architecture, Wide Area Network (WAN), Managed Services, and Network Design, Amoroso directly served four Presidential Administrations in Cyber Security.
  • For CIOs/CISOs, they can stop buying bigger security appliances by adding physical or virtual security functions horizontally and evolving to software-defined network security.