Entrust Datacard

Learn about SSL/TLS from the BEST

Entrust’s SSL/TLS Best Practices Guide is a key resource for those charged with SSL (Secure Sockets Layer) and TLS (Transport Layer Security) deployment. In our guide, you’ll find expert advice from the thought leaders at Entrust on SSL/TLS certificate installation, and tips for managing security for optimal performance.

Included in the SSL/TLS Best Practices Guide:

  • Certificates and Private Keys
  • Server Configuration
  • Application Protection
  • Enhanced Server Security
  • Domain Protection
  • Advanced Certificates
  • Always-On SSL

Our guide is designed to help make SSL/TLS certificate installation easier, so you can use SSL expertly and with confidence.

Get your FREE SSL/TLS Best Practices Guide Today!

** Version 3 Now Available! **

We will never sell your information to a third party.

About the Author

Bruce Morton — Director, Certificate Technology & Standards

Bruce Morton has worked in the public key infrastructure and digital certificate industry for more than 15 years and has focused on SSL and other publicly trusted certificates since 2005. He has been an active member of the CA/Browser Forum that released guidelines for extended validation (EV) certificates and Baseline Requirements for SSL/TLS certificates. Bruce oversees the governance and compliance of Entrust’s publicly trusted PKI.

Best Practices Webinar Series Abstracts

#1: Vulnerabilities Overview

Websites are under attack. In the last year, new vulnerabilities have been uncovered that allow malicious attackers to undermine security that organizations put in place to protect themselves and their end users sensitive information. SSL/TLS is a cornerstone for organizations doing business online, ensuring data confidentiality and trusted identification of websites. The good news is that there are quick and easy was to mitigate these new threats that have recently been identified. There are many aspects to implementing SSL/TLS according to best practices, one of which is related to Application Protection or Website Security.

Key Benefits:

  • Learn about potential vulnerabilities in the area of application protection, such as malware, cross site scripting, and SQL Injection
  • Learn about some of the practical attacks that can be used to penetrate web based applications
  • Find out more about the latest techniques used to mitigate attacks on web based applications

#2: Always-On SSL

Always-On SSL is an approach to securing your website to mitigate attacks against your users. The goal is to extend SSL hardening beyond your own server and to your user’s browser so that you can both be assured of the security that SSL/TLS is supposed to provide.

Key Benefits:

  • Learn how you can provide visitors with a positive user experience while providing better security.
  • Discuss the vulnerabilities that can be exploited if you do not implement Always-On SSL including session hijacking, side-jacking, and similarly, man-in-the-middle attacks.
  • Learn how good server configuration, HSTS and EV SSL Certificates are key to the successful deployment of Always-On SSL.

View Recording

Technologies Referenced During the Session:

#3: Server Configuration

The best way to mitigate security vulnerabilities on your web server is to configure that server in the most reliable way. Join us for our SSL Best Practices webinar and learn to stop threats from the start. This complimentary webinar will explore server configuration and server enhancement. We will discuss how secure server configuration for SSL protects your sites from online threats and:

Key Benefits:

  • Implement the Proper Configuration: Learn which SSL server configuration options mitigate against known problems
  • Enhanced Security Features: Discuss enhanced security features and the benefits they provide
  • Tools For Configuration: Get a demonstration of available services that will help administrators assess the security configuration of their SSL web server
View Recording

Technologies Referenced During the Session:

#4: Domain Protection

Phishing attacks are dangerous to your customers and could be detrimental to your brand. Securing your website and protecting your business are the cornerstone of Entrust SSL Best Practices. Join us for a complimentary webinar that covers key best practices for protecting your domain from phishing attacks against your customers and unsuspecting internet users. We will discuss:

  • The Definition of a Trusted CA: Learn what controls a trusted Certificate Authority (CA) has in place to ensure that an unauthorized administrator cannot acquire a certificate for your organization’s brand name.
  • Domain Protection: Discuss how you can prevent another CA from issuing certificates for your domain and detect previously issued certificates.
  • Domain and Brand Reputation: Explore subjects such as certificate transparency, Microsoft’s certificate reputation, HTTP public key pinning and certification authority authorization.
View Recording

Technologies Referenced During the Session:

#5: Keys, Certificates and Advanced Certificates

SSL certificates secure ecommerce, communications and private information passed from browser to Web server and between servers. Join us for a complimentary webinar that covers key best practices for securely deploying SSL certificates for your specific environment. We will discuss:

  • Private Keys For Quality Protection: Learn how to use private keys, a key factor in determining the quality of protection provided by SSL.
  • Tailor SSL For Your Environment: Discuss the importance of selecting the appropriate Certification Authority (CA) and certificate type.
  • Troubleshoot Your SSL Problems: Explore how advanced certificates can be used to help solve problems in your SSL applications.
View Recording

Technologies Referenced During the Session:

#6: How a Reliable CA Can Help with the Certificate Lifecycle

Managing your SSL certificates doesn’t have to be difficult. Join us for a complimentary webinar that covers, in-depth, how a reliable CA helps with the certificate lifecycle.

  • Learn how you can provide visitors with a positive user experience while providing better security.
  • Discuss the vulnerabilities that can be exploited if you do not implement Always-On SSL including session hijacking, side-jacking, and similarly, man-in-the-middle attacks.
  • Learn how good server configuration, HSTS and EV SSL Certificates are key to the successful deployment of Always-On SSL.
View Recording

Technologies Referenced During the Session: