Private Certification Authority Service Solutions Briefs

Private Certification Authority Service

Under a Private CA, enterprises can create their own private root certificates, which can issue private, end-entity certificates to their internal servers and users.
How to Protect Your Data and Defend Your Organizations from Email Attacks Webinar

How to Protect Your Data and Defend Your Organizations from Email Attacks

Jason Soroko joins us again to discuss the basics of what S/MIME is and how it protects our email communications.
Internet of Things 101 Webinar

Internet of Things 101

Jason Soroko discusses the history of "Internet of Things" and why IoT Security is so important now more than ever.
Sectigo's ACME Automation Videos

Sectigo's ACME Automation

Sectigo offers several automation capabilities, including support of the ACME Protocol. Come check out how we make it easier than ever for automated deployments of SSL Certificates.
Sectigo Zero Touch Deployment S/MIME Solution Videos

Sectigo Zero Touch Deployment S/MIME Solution

Sectigo Zero-Touch S/MIME enables both public and private S/MIME certificates to be issued from a single, cloud-based platform.
Uniregistry Partner Case Study Case Study

Uniregistry Partner Case Study

By partnering with Sectigo, Uniregistry expanded their product portfolio to sell SSL products and launched an intuitive online customer experience that quickly increased conversions and product adoption.
Web Host Resellers: How to Get Certificates Issued Faster Videos

Web Host Resellers: How to Get Certificates Issued Faster

Validation Process Overview; differences in processes for Domain Validation (DV), Organization Validation (OV) and Extended Validation (EV) authentication levels, and causes of delayed orders.
Web Host Resellers: How to Add, Manage, and Delete Users Videos

Web Host Resellers: How to Add, Manage, and Delete Users

User Management master admin procedures; add new users, enable or disable purchase, run report and/or deposit funds user permissions, amend user details and/or address, and deactivate users.
Web Host Resellers: Introduction to the Reseller Management Center Videos

Web Host Resellers: Introduction to the Reseller Management Center

Quick tour of the management features; login, deposit additional funds, buy prices, customer order options, user management, report on orders, report on incomplete orders, and support resources.
Zero Touch Email Certificate Deployment White Paper

Zero Touch Email Certificate Deployment

Attacks like Business Email Compromise (BEC) or other spear phishing schemes take advantage of the inherently spoofable nature of email to trick employees into taking action that the spear phishers can take advantage of.