SSL Certificates Provider

Secure Sockets Layer (SSL) is a security protocol used by Web browsers and Web servers to help users protect their data during transfer. SSL Certificates are small data files that digitally bind a cryptographic key to an organization’s details. In the case of a Web browser, SSL activates the padlock and https and allows secure connections from a Web server to the browser.

SSL is a security protocol that:
  • Protects user data during transfer.
  • Digitally binds a cryptographic key to organization’s details
  • Secures credit card transactions, data transfers, logon credentials, and more.
  • Provides authentication of the business and/or domain.
How do SSL Certificates work?

When a browser encounters a website with SSL:

  • A browser attempts to connect to a Website secured with SSL.
  • The browser requests that the web server identify itself.
  • The server sends the browser a copy of its SSL Certificate.
  • The browser checks whether it trusts the SSL Certificate. If so, it sends a message to the server.
  • The server sends back a digitally signed acknowledgement to start an SSL encrypted session.
  • Encrypted data is shared between the browser and the server.
Encryption protects data during transmission

Web servers and web browsers rely on the SSL protocol to create a uniquely encrypted channel for private Communications over the public Internet. Each SSL Certificate consists of a public key and a private key . The public key is used to encrypt information and the private key is used to decipher it. When a web browser points to a secured domain, a level of encryption is established based on the type of SSL Certificate as well as the client web browser, operating system and host server’s capabilities. That is why SSL Certificate feature a range of encryption levels up to256-bit.

Strong encryption, at 128 bits, can calculate 288 times as many combinations as 40-bit encryption. That’s over a trillion times stronger . At current computing speeds, a hacker with the time, tools, and motivation to attack using brute force would require a trillion years to break into a session protected by an SGC-enabled Certificate To enable strong encryption for the most site visitors, choose an SSL Certificate that enables 128-bit minimum encryption for 99.9 percent of website visitors.

Credentials establish identity online

Credentials for establishing identity are common: a driver’s license, a passport, a company badge. SSL Certificates are credentials for the online world, uniquely issued to a specific domain and web server and authenticated by the SSL Certificate provider. When a browser connects to a server, the server sends the identification information to the browser.

To view a website’s credentials:
  • Click the closed padlock in a browser window.
  • Click the trust mark (such as a Norton Secured Seal).
  • Look in the green address bar triggered by an Extended Validation (EV) SSL.
Authentication generates trust in credentials

Trust of a credential depends on Certificate in the credential issuer, because the issuer vouches for the credential’s authenticity. Certificate Authorities use a variety of authentication methods to verify information provided by organizations. Symantec, the leading Certificate Authority (CA), is well known and trusted by browser vendors because of our rigorous authentication methods and highly reliable infrastructure. Browsers extend that trust to SSL Certificate issued by Symantec.

Who needs SSL?

Anyone who needs to securely transmit information over the internet requires the use of SSL Certificates SSL is not just for securing credit card transactions and should be used for protecting all levels of sensitive information when communicated over the web. Use SSL for:

  • Securing online credit card transactions.
  • Securing web forms and customer logins.
  • Securing email and webmail applications including Microsoft Outlook Web Access, Exchange and office Communications Server.
  • Securing corporate communications on intranets, extranets, internal Networks file sharing and Microsoft SharePoint.
  • Securing communications on cloud based platforms and virtualized applications.
  • Securing file transfers over https and ftp.
  • Securing hosting control panels logins including Parallels and cPanel.
  • Securing information sent and received via mobile devices.
Scroll to top