Sectigo - Experts & Thought Leaders

Latest Sectigo news & announcements

Sectigo launches enhanced SiteLock 2.0 for SMB security

Sectigo, a global pioneer in digital certificates and Certificate Lifecycle Management (CLM) announced SiteLock 2.0, a major upgrade to SiteLock, its website security and protection platform. SiteLock 2.0 SiteLock 2.0 is designed to simplify website protection for small to medium-sized businesses (SMBs). At the core of SiteLock 2.0 is Site Health, a new, innovative feature offering users a clear, concise, and actionable assessment of a website's overall security posture. SMBs are empowered to proactively safeguard their websites and act with confidence when it comes to website security posture.  Website security market SiteLock 2.0 reduces the complexity of understanding and managing website security, minimising the time The website security market is rapidly evolving, valued at $227M in 2023 and forecasted to reach $408M by 2030. Despite this, SMBs still face significant challenges in protecting their digital assets due to limited budgets and technical expertise. SiteLock 2.0 reduces the complexity of understanding and managing website security, minimising the time and effort required to configure and maintain security settings, and eliminating the frustration of navigating fragmented or overly technical security information.  Implement, manage, and understand website security "Website owners often struggle to get a clear, real-time understanding of their security posture across multiple tools, vulnerabilities, and potential risks," said Christopher Bray, senior vice president, of worldwide partner and eCommerce sales, at Sectigo.  "Sectigo is committed to empowering customers of all technical backgrounds to effortlessly implement, manage, and understand robust website security without sacrificing user experience. With the launch of SiteLock 2.0, we're not just updating a product; we're transforming and simplifying how SMBs manage website security in an environment that is getting more complex.”  Site Health Always live, the score changes depending on the specific products and configurations present on a site Site Health, SiteLock 2.0’s key feature, goes beyond traditional vulnerability scanning by consolidating multiple security scans and metrics to generate a single, easy-to-understand score that reflects the overall health of a site. Its sophisticated algorithm calculates a site's health score, incorporating factors such as malware detection, vulnerability scanning, SSL certificate status, and product configuration. Always live, the score changes depending on the specific products and configurations present on a site ensuring SMBs always have access to the most current security information.  Key features of SiteLock 2.0 In addition to Site Health, key features of SiteLock 2.0 include:  Reimagined Dashboard: The redesigned interface prioritises key actions, improves organisation, and delivers a more intuitive and user-friendly experience.   Prioritised Security Action Queue: A ranked list of key security tasks based on urgency makes it simple for users to resolve critical issues first.  Unified Security Scans: All core security scans are consolidated, making it easier to monitor and configure them from one central location.  Faster Setup: A streamlined setup process reduces the steps needed to secure a site, cutting deployment time by 75%.  SiteLock 2.0 is available immediately for both new and existing customers.

Jason Scott joins Sectigo as Chief Information Security Officer

Sectigo®, the industry’s most innovative provider of comprehensive certificate lifecycle management (CLM) announced the newest member of its senior executive team with the appointment of Jason Scott as Chief Information Security Officer (CISO).  Jason Scott Jason Scott will oversee all aspects of cybersecurity at Sectigo including data, infrastructure, network, applications, and products. He joins the company with more than 20 years of experience including leadership roles at top global organisations such as Capgemini, Chevron, and the U.S. Army.  Scalable CLM solutions “It’s exciting to join a company that is expanding into new markets and growing as quickly as Sectigo is,” said Jason Scott, adding “The company’s mission to deliver the simplest, most secure, and most scalable CLM solutions makes cyber hygiene and a strong security posture critical to success. I am proud to be an integral part of that mission.”   Experience with U.S. Army Cyber Command His hands-on approach propelled U.S. Army cyber readiness into the forefront of cybersecurity Jason Scott served most recently as a colonel and principal architect for the U.S. Army Cyber Command, where he was responsible for integrating global defensive cyber operations to protect critical infrastructure, applications, and defence department networks. During his tenure, Jason played a pivotal role in reshaping antiquated formations into agile, resilient teams poised to defend the U.S. against evolving threats in cyberspace.  His strategic vision and hands-on approach propelled U.S. Army cyber readiness into the forefront of cybersecurity preparedness, aligning its operations with modern tactics, techniques, and procedures to protect vital infrastructure from adversaries.  Additional work experience  He also served as an executive director in Washington D.C. and cyber director in Atlanta where he drove organisational efficiency and effectiveness amid complex operational environments. His leadership acumen and dedication to mission success earned him numerous accolades that highlight his contributions to national security. Cybersecurity strategy “We are pleased to welcome Jason to the Sectigo family,” said Sectigo Chief Product and Engineering Officer, Mark Bilger, adding “Jason’s success in managing cyber threats for large enterprises and government entities with a substantial global reach will provide invaluable protection for customers and employees alike." He continues, "His expertise in cybersecurity strategy, threat protection, and risk mitigation will enhance our security posture while we enable customers around the world to become crypto-agile as they invest in emerging quantum-safe technologies.”  Sectigo’s cloud-native, CA-agnostic CLM solutions Sectigo’s cloud-native, CA-agnostic CLM solutions deliver more than 50 leading technology integrations from a single pane of glass and they all carry the full weight and trust of Sectigo’s two decades as a trusted certificate authority (CA). 

Sectigo launches new Secure Partner Program that offers multiple benefits, such as access to the Connect Partner Portal

Sectigo, a globally renowned company in digital identity management and web security solutions, has announced the launch of its new Secure Partner Program, furthering Sectigo’s commitment to the company’s base of more than 1,200 partners worldwide. Partners in the program gain myriad benefits, including access to the new Sectigo Connect Partner Portal, advancing their ability to build new capabilities, deliver more value to customers, drive higher profits, and accelerate growth in today’s dynamic cyber security market. Secure Partner Program In the new Secure Partner Program, partners are tiered based on engagement level In the new Secure Partner Program, partners are tiered based on engagement level, so that organisations’ tier within the program aligns with their own business goals. All partners registered in the new program also receive access to advanced training and accreditation programs to help them improve their sales and support effectiveness. Sectigo has added financial incentives, such as a new partner pricing model and dedicated Marketing Development Funds (MDF), to the new program. Accredited partners who grow their sales with Sectigo are rewarded with more incentives for their business and employees.  “Partners play a crucial role in Sectigo's growth and success. The new Secure Partner Program enables partners to grow with us and to build a rewarding business around our suite of industry-leading web security products. We've designed our program to enable success and provide the opportunity for better profitability,” said Michael Fowler, President of Channel Partners, Sectigo. Sectigo Connect Partner Portal Timed with its Secure Partner Program's debut, the company has introduced the Sectigo Connect Partner Portal. The easy-to-use platform provides quick, direct access to essential tools and resources that enable partners to engage with Sectigo to successfully introduce new Sectigo products to their customers. Central to the Secure Partner Program, the portal provides access to: Marketing Development Funds (MDF) to support the growth of the Sectigo brand, demand generation, training and other relevant activities. Available to certain tiers of partners. Partner Resource Center, a self-serve repository of sales collateral, technical product documents, marketing tools and guides. Sectigo University, with 70+ training courses for earning sales and technical accreditations. Webinars & events hosted by Sectigo experts, exclusively available to Secure Partners. Program onboarding training to guide partners through the first 90 days, ensuring success. Countering rise in cyber-attacks in COVID-19 period Our new Secure Partner Program aims to tackle the obstacles in the world of web security" The COVID-19 global pandemic and increasing number of cyber-attacks has led to a substantial increase in web security issues for our partners’ customers,” said Michele Campbell, Vice President of Global Channel Programs, Sectigo. Michele adds, “Our new Secure Partner Program aims to tackle the obstacles in the world of web security while helping our partners expand their portfolio beyond the CA market and increase their average deal size. Partners can unlock their full potential with Sectigo and the Secure Partner Program benefits when they include Sectigo’s Web Security Platform solutions in their portfolio.” Sectigo University Easily accessed through the Connect Partner Portal, the Sectigo University online learning and enablement platform for Sectigo Secure Partners enables partners to gain new cyber security expertise, learn about Sectigo’s digital identity and website security products, build new capabilities, deliver greater customer value, and accelerate growth. Available on-demand 24/7 to partners worldwide, the platform offers role-based curricula derived from 70 training courses for sales and technical individuals, delivered through interactive learning modules, with testing. Sectigo provides partners with automated tracking of each student’s progress as they work toward accreditation. Sectigo Secure Sales and Technical Accreditations “The free training within Sectigo University provides pathways for partners to earn their Sectigo Secure Sales and Technical Accreditations. By achieving an accreditation, Secure Partners will maximise their investment in Sectigo solutions by standing out as a true web security expert,” added Michael Fowler.

Insights & Opinions from thought leaders at Sectigo

The future of secure identity & access is not using passwords

For many businesses and organisations, the term 'authentication' is synonymous with 'password' or 'multi-factor authentication (MFA)’. However, because today's business ecosystem is complex and stretches across distributed workforces with work from home, BYOD policies, and multiple cloud environments, it is very challenging to efficiently recognise and authenticate identities of people, processes, and devices throughout the enterprise using traditional methods. The problem with passwords For starters, people tend to forget passwords. To make passwords easier to remember, users may store their passwords in a vulnerable file, create passwords using a consistent pattern, or use the same password again and again. If a password is uncovered on one service or from an unprotected spreadsheet, a bad actor could use that same password to access a high-value network, maybe a corporate service or a bank account. Technical problems with password security Not only are passwords easy for today’s hackers to steal, they offer a poor user experience Not only are passwords easy for today’s hackers to steal, they offer a poor user experience and can be a burden to help desks workers. Password security also suffers from a legion of technical problems. For example, if a connected device machine has been infected with screen scraper malware, the malware can gather all visible data, including passwords, and send them back to the bad actor. Captured passwords are commonly sold and purchased in the underground economy, which can lead to a wide range of security problems. The modern way to authenticate - Public Key Infrastructure (PKI) If passwords are too easily intercepted, what is the best certificate authentication approach? The answer is Public Key Infrastructure (PKI)-based authentication, the better option, because it eliminates the password and reduces the time to authenticate. There is no stronger, easier-to-use authentication and encryption solution than the digital identity provided by PKI. Rather than secret-sharing, PKI uses certificates that do all the work behind the scenes, thereby eliminating the burden on users and the human-error accompaniment. PKI works by using an asymmetric cryptographic key pair, consisting of a private key and a public key. These keys function as a pair using incredibly complex cryptographic algorithms to protect identities and data from unauthorised access or use. Public key The public key consists of a long string of apparently random numbers and is used to encrypt a message. This encrypted message can only be decrypted by the associated private key, which is also made of a long string of numbers. This private key is a secret key and is never shared. The key pair is mathematically related, so that whatever is encrypted with a public or private key, can only be decrypted by its corresponding counterpart. Private key The private key is embedded inside the device, on which it sits - on every laptop, phone, IoT device, server and email client The private key is embedded inside the device, on which it sits - on every laptop, phone, IoT device, server and email client. Whenever possible, the private key is stored in a TPM or hardware security module, protecting it from discovery, even if the device is infected with malware or compromised by a hacker. Additionally, the private key would take decades to brute force and the result is that attack attempts fail. The connection between security and usability There is a dynamic relationship between security and usability - the more you try to up the ante on password-based security, the more difficult it becomes to use. The best security investment is one that can be easily deployed and enthusiastically used by employees. Using PKI authentication is both rock solid and seamless to end users. Digital certificates can be easily deployed to every employee device and system using automated tools. Wouldn't it be better and simpler to not have to type in passwords and instead be automatically authenticated and granted proper access? PKI takes us from the stone age of user names and passwords to a better authentication experience.

Quick poll
What is the most significant challenge facing smart building security today?