Welcome!

Industrial IoT Authors: Elizabeth White, Stackify Blog, Yeshim Deniz, SmartBear Blog, Liz McMillan

Related Topics: Industrial IoT

Industrial IoT: Press Release

Comodo 2048-bit Certificates Most Trusted in Industry

Longer Root Keys Enhance Security, Extend Back to Older Browsers

Jersey City, NJ, July 21, 2009 - "Comodo's 2048-bit digital certificates are now the most trusted on the market," said Melih Abdulhayoglu, CEO of Comodo. "We've turned the tables. Comodo's 2048-bit root is now more ubiquitous, even than Verisign's. And, Comodo's 2048-bit certificates operate with major browsers, even when our competition's do not."

Digital certificates provide two factors to build trust online: the strength of the encryption and the visual assurance of authentication. Stronger encryption enhances protection because it's harder to break. The National Institute of Standards and Technology (NIST), a federal agency within the U.S. Department of Commerce, recommends that site owners upgrade to 2048-bit digital certificates. (2007 NIST standards)

"But for a 2048-bit key length to operate seamlessly within an Internet browser, the Certificate Authority must include the "root key" within the browser. Certificate Authorities provide Internet browsers with their root keys. If a root key is not available, the browser sends a warning message to the user. The warning message makes it appear that either the user, or whoever he or she is communicating with, has done something wrong."

"Comodo anticipated the need for longer root keys at the beginning of the millennium," said Abdulhayoglu. "We incorporated the 2048-bit root key into browsers when very few other Certificate Authorities were doing so. The advantage now , is that even Internet users with very old browsers can use Comodo 2048-bit certificates with no error messages. We're proud of that ubiquity."

A root key included in as many browsers as possible is known as "ubiquitous." A digital certificate generated with that root key give the smoothest possible performance to its user.

This is especially important in e-commerce. Merchants who use the Extended Validation (EV) SSL certificate must employ 2048-bit cryptography by the end of 2010, as mandated by the CA/B Forum. Many merchants already use the stronger encryption.

Browsers change. Generally, newer versions of browsers interact seamlessly with all the digital certificates available to their predecessors. Very infrequently, however, the browser fails to recognize digital certificates. When that happens, it sends alarming warning messages to the user, eroding the user's trust.

A recent example of such erosion of trust occurred when Firefox 3.5 failed to recognize EV SSL certificates from many of Comodo's competitors. Instead of seeing the green address bar warranted by the EV status, Firefox displayed a blue bar, connoting ordinary encryption. "Firefox 3.5 users continued to see the verifiable trust of the green address bar from Comodo EV SSL certificates," Abdulhayoglu said.

Comodo issues more high-assurance digital certificates than any other brand, offering and supporting a full complement of 2048-bit certificates, including outdated browser versions. The advantage of such near-ubiquity is that it enables more Internet users to enjoy the security advantages of 2048-bit key lengths.

When ordering or re-ordering digital certificates through Comodo or a Comodo reseller, customers may request 2048-bit key lengths in their certificate signing requests.

"Comodo led the industry in anticipating the need for longer key lengths, by including the necessary root significantly before the other Certificate Authorities did. Even today, not all certificate authorities offer 2048-bit encryption. At Comodo, we know that online trust dynamics have changed. We offer 2048-bit encryption, and it costs no extra," said Abdulhayoglu. "You just have to know to ask for it."

"Comodo's 2048-bit certificates provide strong protection for years to come. But what makes them more trusted today is the combination of a near-ubiquitous root key and smooth operation with major browsers, such as Firefox 3.5."

"This is one example of how Comodo is creating trust online."

COMODO CA
Comodo CA, Ltd., is the world's second-largest issuer of high-assurance digital certificates, providing online communications unreadable to anyone but the sender and the recipient.

Comodo CA, Ltd., provides cost-effective solutions that protect online information. Digital certificates enable secure sockets layer (SSL) communications, unreadable to anyone but the sender and the recipient. Code-signing certificates ensure that software is not tampered with.

Patent-pending Comodo CA technology enables Internet users to send encrypted emails without exchanging public keys beforehand,

Continual innovation, a core competence in digital encryption, and a commitment to halting Internet crime distinguish the Comodo companies. The Comodo companies secure and authenticate online transactions and communications for over 200,000 business customers, and it has over 15,000,000 installations of desktop security products.

Comodo CA, Ltd., -- Creating Trust OnlineTM. For more information, visit Comodo's website.

More Stories By Katharine Hadow

Katharine Hadow is a marketing communications professional in New Jersey, USA

IoT & Smart Cities Stories
CloudEXPO | DevOpsSUMMIT | DXWorldEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.
DXWorldEXPO LLC announced today that Big Data Federation to Exhibit at the 22nd International CloudEXPO, colocated with DevOpsSUMMIT and DXWorldEXPO, November 12-13, 2018 in New York City. Big Data Federation, Inc. develops and applies artificial intelligence to predict financial and economic events that matter. The company uncovers patterns and precise drivers of performance and outcomes with the aid of machine-learning algorithms, big data, and fundamental analysis. Their products are deployed...
All in Mobile is a place where we continually maximize their impact by fostering understanding, empathy, insights, creativity and joy. They believe that a truly useful and desirable mobile app doesn't need the brightest idea or the most advanced technology. A great product begins with understanding people. It's easy to think that customers will love your app, but can you justify it? They make sure your final app is something that users truly want and need. The only way to do this is by ...
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more busine...
The challenges of aggregating data from consumer-oriented devices, such as wearable technologies and smart thermostats, are fairly well-understood. However, there are a new set of challenges for IoT devices that generate megabytes or gigabytes of data per second. Certainly, the infrastructure will have to change, as those volumes of data will likely overwhelm the available bandwidth for aggregating the data into a central repository. Ochandarena discusses a whole new way to think about your next...
Cell networks have the advantage of long-range communications, reaching an estimated 90% of the world. But cell networks such as 2G, 3G and LTE consume lots of power and were designed for connecting people. They are not optimized for low- or battery-powered devices or for IoT applications with infrequently transmitted data. Cell IoT modules that support narrow-band IoT and 4G cell networks will enable cell connectivity, device management, and app enablement for low-power wide-area network IoT. B...
The hierarchical architecture that distributes "compute" within the network specially at the edge can enable new services by harnessing emerging technologies. But Edge-Compute comes at increased cost that needs to be managed and potentially augmented by creative architecture solutions as there will always a catching-up with the capacity demands. Processing power in smartphones has enhanced YoY and there is increasingly spare compute capacity that can be potentially pooled. Uber has successfully ...
SYS-CON Events announced today that CrowdReviews.com has been named “Media Sponsor” of SYS-CON's 22nd International Cloud Expo, which will take place on June 5–7, 2018, at the Javits Center in New York City, NY. CrowdReviews.com is a transparent online platform for determining which products and services are the best based on the opinion of the crowd. The crowd consists of Internet users that have experienced products and services first-hand and have an interest in letting other potential buye...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...