New features, upcoming releases & everything else you need to know

What is OCSP and how does it work?

Posted by Mike Hathaway on Feb 19, 2020 8:49:19 AM

OCSP stands for Online Certificate Status Protocol and is used by Certificate Authorities to check the revocation status of an X.509 digital certificate.

Read More

Ascertia appoints Mike Hathaway as CTO

Posted by Victoria Allen on Oct 9, 2019 10:01:19 AM

Following a period of rapid growth, Mike Hathaway's appointment strengthens Ascertia’s seasoned executive team and is one of many recent strategic hires across the organisation. This appointment enhances Ascertia’s technical expertise, its global partner network and cements the company’s commitment to producing innovative high-trust PKI and digital signature products.

Read More

Ascertia expands relationship with Entrust

Posted by Sam Crook on Jan 10, 2019 3:41:16 PM

We are pleased to announce that we have signed a global distribution agreement with Entrust Datacard, a leading provider of trusted identity and secure issuance technology solutions.

The agreement cements a long-standing relationship between Ascertia and Entrust Datacard after winning numerous business deals together worldwide. The global agreement covers Ascertia's ADSS Server and includes the server modules for digital signing, OCSP validation, SCVP validation and timestamping.

Read More

Interesting statistics from the 2017 Global PKI Trends Study

Posted by Liaquat Khan on Jan 8, 2018 11:56:40 AM

Last year’s IoT Solutions World Congress was an opportunity for the industry to focus on the increasing influence of the Internet of Things in PKI planning. We attended the event with our technology partner Thales e-Security, which has just published the 2017 Global PKI Trends report with the Ponemon Institute looking at trends across 11 countries.

Read More

Importance of certificate whitelist checking

Posted by Liaquat Khan on Aug 3, 2013 2:24:00 PM

Certificate whitelist checking is a must. Usage of PKI-based digital certificates has become a widely accepted means of electronic identity authentication for all kinds of purposes, from logical and physical access control to document signing, server authentication for ecommerce sites and software code authentication.

Read More

Recent Posts

Popular Reads

Download this essential eBook

Download your eBook

Choosing the right type of e-signature
for your business