Download PDF version Contact company

DigiCert, a global provider of digital trust announced its next-generation Discovery, a set of key capabilities in DigiCert® Trust Lifecycle Manager that enable customers to build a centralised book of record of their cryptographic keys and certificates.

This centralised view, when coupled with management and automated provisioning and renewal, improves crypto agility, reducing the time and resources needed to update algorithms, rotate keys and certificates, and remediate threats.

Quantum-safe standards

The majority of organisations have not yet implemented a centralised crypto-management solution,” said DigiCert Chief Product Officer Deepika Chauhan.

This is becoming critical now, as IT pioneers consider how to transition their cryptographic algorithms and certificates to quantum-safe standards to protect their organisations against ‘harvest now, decrypt later’ strategies.”

Evolving cryptographic technologies

Trust Lifecycle Manager Discovery employs a broad set of methods for finding certificates within an organisation

In a recent Gartner® report, Senior Director Analyst Brian Lowans wrote, “All cryptographic technologies will need to evolve to cope with the future threat of quantum computing, which is increasing the need for innovative technologies such as crypto-agility, postquantum cryptography, and quantum key distribution.”

Trust Lifecycle Manager Discovery employs a broad set of methods for finding certificates within an organisation, including integration with private CAs, such as AWS Private CA and Microsoft CA, integration with vulnerability management solutions such as Qualys and Tenable, integrations with web servers and load balancers, and port-based scanning.

Manage and automate cryptographic assets

The integration of Qualys Vulnerability Management, Discovery and Response (VMDR) and DigiCert products enables our customers to manage and automate the cryptographic assets that they discover in their vulnerability scans,” said Pinkesh Shah, Chief Product Officer, Qualys.

This seamless integration enables companies to tightly couple their vulnerability management and crypto agility strategies, improving their security posture and agility while reducing their cyber risk.”

Download PDF version Download PDF version

In case you missed it

Guarding the jackpot: Intelligent perimeter detection for casinos
Guarding the jackpot: Intelligent perimeter detection for casinos

Casinos face multiple security issues caused by potential bad actors, everything from cheating to vandalism, from theft to vagrancy. A new intelligent technology can monitor for sp...

Explore Axis Intelligent Surveillance at Fort Lauderdale
Explore Axis Intelligent Surveillance at Fort Lauderdale

Axis Communications celebrated the grand re-opening of its Axis Experience Centre (AEC) in Fort Lauderdale, Florida. 9,000 sq ft. facility With beautiful views of the water and a...

i-PRO security solutions for public safety contracts
i-PRO security solutions for public safety contracts

i-PRO Americas Inc. (formerly Panasonic Security), a global pioneer in professional security solutions for security and public safety announced that it has been awarded a new procu...

Quick poll
What's the primary benefit of integrating access control with video surveillance?