© GlobalSign. A GMO Internet Inc group company. Authentication. Security. Trust. Code Signing Distributing trustworthy software over the Internet.

Slides:



Advertisements
Similar presentations
Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely P J Human Resources Pte Ltd presents:
Advertisements

Chapter 17: WEB COMPONENTS
Public Key Infrastructure Alex Bardas. What is Cryptography ? Cryptography is a mathematical method of protecting information –Cryptography is part of,
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Microsoft Confidential Solution Overview: Foxit Software Corporation’s PDF Security Suite.
© GlobalSign. A GMO Internet Inc group company. Authentication. Security. Trust. A tutorial on how you can host multiple SSL Certificates on a single IP.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Online Security Tuesday April 8, 2003 Maxence Crossley.
Using Internet Information Server And Microsoft ® Internet Explorer To Implement Security On The Intranet HTTP.
Copyright, 1996 © Dale Carnegie & Associates, Inc. Digital Certificates Presented by Sunit Chauhan.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
1 Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. by Mary Anne Poatsy, Keith Mulbery, Eric Cameron, Jason Davidson, Rebecca Lawson,
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Page 1 Sandboxing & Signed Software Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
Cryptography 101 Frank Hecker
Course 201 – Administration, Content Inspection and SSL VPN
© 2008 The McGraw-Hill Companies, Inc. All rights reserved. M I C R O S O F T ® Preparing for Electronic Distribution Lesson 14.
Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely John Deere presents:
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
1 Modular Software/ Component Software 2 Modular Software Code developed in modules. Modules can then be linked together to produce finished product/program.
Masud Hasan Secue VS Hushmail Project 2.
Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely presents:
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
PowerPoint Lesson 10 Sharing and Delivering Presentations Microsoft Office 2010 Advanced Cable / Morrison 1.
Configuring Directory Certificate Services Lesson 13.
Word Lesson 13 Sharing Documents Microsoft Office 2010 Advanced Cable / Morrison 1.
Compatibility and Interoperability Requirements
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
The Microsoft Services Provider License Program (SPLA)
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
Java Security Session 19. Java Security / 2 of 23 Objectives Discuss Java cryptography Explain the Java Security Model Discuss each of the components.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Creating and Managing Digital Certificates Chapter Eleven.
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
Web Services Security Patterns Alex Mackman CM Group Ltd
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
1 Session 4 Module 6: Digital signatures. Digital Signatures / Session4 / 2 of 18 Module 4, 5 - Review (1)  Java 2 security model provides a consistent.
Flight is a SaaS Solution that Accelerates the Secure Transfer of Large Files and Data Sets Into and Out of Microsoft Azure Blob Storage MICROSOFT AZURE.
Built atop SharePoint Online, WorkPoint 365 Offers a Project and Case Management Solution to Boost Business Productivity and Deliver Governance OFFICE.
Saasabi’s Analytical Processing Engine in the Cloud Makes Business Intelligence Affordable for Everyone COMPANY PROFILE: Saasabi Saasabi is a BizSpark.
LAB#8 PKI & DIGITAL CERTIFICATE CPIT 425. Public Key Infrastructure PKI 2  Public key infrastructure is the term used to describe the laws, policies,
Active X and Signed Applets Chad Bollard. Overview ActiveX  Security Features  Hidden Problems Signed Applets  Security Features  Security Problems.
Vulnerabilities in Operating Systems Michael Gaydeski COSC December 2008.
Digital Disruption, Alfresco, and Digital Signatures Brian LaPointe VP Sales, Americas CoSign by ARX.
Websms Offers Professional Messaging Solutions via Web, , Gateway or Directly Out of Excel (Online) on the Microsoft Office 365 Platform OFFICE 365.
5/25/2018 2:39 AM © 2006 Microsoft Corporation. All rights reserved.
Symantec Code Signing Certificate
IWRITER 365 Offers Seamless, Easy-to-Use Solution for Using, Designing, Managing, and Sharing All Your Company Templates in Microsoft Office 365 OFFICE.
S/MIME T ANANDHAN.
Nessus Vulnerability Scanning
Exploring Microsoft® Word® 2016 Series Editor Mary Anne Poatsy
Microsoft Services Provider License Agreement Program reference card
Lecture 4 - Cryptography
Microsoft Virtual Academy
Data Quality Matters! Data8 Partner Showcase.
Tyler Technologies presents: What you need to know about upcoming changes to your New World ERP technical environment in Scott Alan Miller MCP,
Scott Miller TSM Team Lead Ray Mah Architect, Foundation
Scott Miller TSM Team Lead Ray Mah Architect, Foundation
Presentation transcript:

© GlobalSign. A GMO Internet Inc group company. Authentication. Security. Trust. Code Signing Distributing trustworthy software over the Internet

Authentication. Security. Trust. As operating system and browser vendors move towards higher security models and lock down capabilities on unknown code, it is increasingly important for developers and end users to identify legitimate applications from the masses of badware.  What is Code Signing?  The Benefits of Code Signing  Supported Platforms  Buyer Considerations  Why choose GlobalSign?  Adding Code Signing to your Portfolio Contents

Authentication. Security. Trust. What is Code Signing?  Code Signing is the virtual equivalent of shrink-wrapping CD-based software for distribution.  Software developers digitally sign code or software distributed over the Internet using X.509 v3 digital certificates marked for the specific use of digitally signing code.  The digital certificate binds the identity of a person or entity to a public key which is related to a corresponding private key. The private key is used to apply a digital signature to a shortened version of the code which is run through a hashing algorithm. The public key is used to verify the signature.  Signing the hash of the code with an algorithm like SHA-1 provides a method to validate if the code has changed in any way since signature. Digital Certificate marked for Code Signing (Code Signing Certificate)

Authentication. Security. Trust.  Code Signing using a trusted third party prevents: − Users abandoning the installation of an application that is not easily identified as genuine. − Malicious alteration of legitimate code. − Identity theft or damage to reputation of vendor or code author.  The end user knows the digitally signed software being executed is legitimate, comes from a known software vendor and has not been tampered with since being published.  By digitally signing code, the software vendor enhances customer confidence, increasing the number of downloads. The Benefits of Code Signing Unsigned code The end user is presented with a warning message that may cause them to abandon the install. Signed code The code has been digitally signed by a certificate from a trusted Certification Authority. The end user is presented with the publisher’s identity.

Authentication. Security. Trust.  Different platforms have different requirements and options available for digitally signing code. GlobalSign’s Code Signing Certificates support: Supported Platforms Microsoft Authenticode Windows ActiveX controls can be signed via Authenticode (32 bit and 64 bit.exe,.ocx,.dll or other) and Kernel software for Windows. Windows 7 compatible. GlobalSign is one of the select Certificate Authorities enabled by Microsoft to allow Windows Kernel 64 bit code signing. Adobe AIR applications Adobe AIR only allows digitally signed applications to be run. Java JAR applet files can be signed to allow apps access to client-side resources. Microsoft Office & VBA Digitally sign Microsoft Office macros and Visual Basic Applications (VBA) to avoid Unknown Publisher macro warnings. Apple Mac applications Code Signing was introduced by Apple in MacOS 9 onwards. Mozilla & Netscape Objects Digitally sign Mozilla and legacy Netscape Object files to enable activation in Mozilla browsers.

Authentication. Security. Trust.  There are several elements to consider when choosing the right Code Signing Certificate to sign your application. − Ubiquity Public rooted Code Signing Certificates, as opposed to self-signed certificates, will allow users to verify the authenticity of the publisher and origin of the software, as well as ensuring that the code has not been tampered with. − Timestamping services Timestamping ensures that the signature on your application remains valid after the certificate has expired. − Price and value Am I getting good value for the experience, support and functionality? − Trust A good reputation and credibility of the Authority can inspire additional downloads of your application. − Support for individuals and commercial software publishers Many Authorities only support commercial software publishers and not individuals. Buyer Considerations

Authentication. Security. Trust. Why choose GlobalSign? The benefits of signing code with a GlobalSign Code Signing Certificate  Removes the "Unknown Publisher" popup in Operating Systems and browsers.  Full timestamping service included free of charge – timestamping code ensures the signature does not expire.  Allows an unlimited number of applications to be signed within the lifespan of the certificate.  Supports all developer platforms.  Offers multi-year savings - plus multi-year avoids having to renew annually.  Offers a risk free refund.  Comes with a $100,000 Warranty - underwritten Liability program.  Multi-Language Tech Support - access to expert technical support staff via and telephone.  Issued by an organization that’s been a WebTrust Accredited Certification Authority since 2002.

Authentication. Security. Trust. Adding Code Signing to your Portfolio  Adding Code Signing to your value chain Code Signing is the ideal value-add product for VARs looking to complement core services and existing portfolios, opening up a new revenue stream and ensuring customer satisfaction.  Partner Program GlobalSign has developed specialist partner programs to allow you to resell Digital Certificates cost-effectively and hassle-free. Partners receive instant discounts and the GlobalSign SaaS web portal makes the application of certificates quick and easy. A flexible XML API can also allow the process to be fully automated and integrated into your own workflows. The whole range of GlobalSign Digital Certificate Solutions can be resold using the GlobalSign Partner account, including: DevelopingTestingDeployingDistributing  Security  Code Signing Certificates  SSL Certificates  encryption (S/MIME Digital IDs)  Adobe Certified Document Services (CDS) Digital IDs

Authentication. Security. Trust.  Talk to GlobalSign today about adding Code Signing Certificates to your portfolio.  Learn more about our Partner Program at: −  Read White Paper. − Reselling Code Signing Certificates