Insights and Outlooks from the Digital Identity Market Leader

Oct 26, 2018 10:45:13 AM
This article originally appeared in Healthcare Analytics News. Click the link below for the full version. The U.S. Food and Drug Administration’s recently released guidelines on medical device security serve as a framework for hea [...]
Oct 24, 2018 11:00:19 PM
Without always thinking about it, patients willingly share Personally Identifiable Information (PII) destined to live in electronic health records (EHRs) with their trusted healthcare providers. Maintaining this data is an immense [...]
Oct 5, 2018 9:51:51 AM
  As the Internet of Things (IoT) continues to grow and expand into new industries, there remains a gap between device manufacturing and security. Security is often an afterthought, and viewed as something that can be added to the [...]
Oct 5, 2018 9:48:16 AM
With cyber crime damage costs estimated to hit $6 trillion annually by 2021, there’s no doubt that cybersecurity continues to be one of the top concerns for IT departments in every industry. They’re constantly in search of more ro [...]
Sep 21, 2018 12:10:20 PM
Companies of every size have been tending to digital security for decades. What at one time may have been thought of as comprehensive coverage, is now just enough to keep the lights on. As the number of connected people, applicati [...]
Aug 17, 2018 1:15:41 PM
Public Key Infrastructure (PKI) supports digital certificates and their associated keys to verify the identity of users and devices to other users, devices and applications. As such, PKI is paramount to network and Internet securi [...]
Aug 13, 2018 4:05:25 PM
There are many benefits to the automation of container deployment, but these benefits do not come without their complications. The DevOps efforts have made hard coding credentials into cloud-init scripts common practice, but this [...]
Aug 13, 2018 3:42:07 PM
Clients commonly ask us how to use our PKI and digital certificate operations management platform, CMS, to manage application certificates in a DevOps environment. They are “containerizing” their applications with Docker and want [...]
Aug 6, 2018 3:20:50 PM
 In an evolving cyber security landscape, defenses must continually evolve. Static systems are not only inherently insecure, they are less so with each passing day. This principle applies to cryptography as much as to other types [...]
Jul 30, 2018 9:49:15 AM
Something is wrong in the broader Enterprise cyber security landscape. As a whole, organizations are devoting growing sums of cash to thwart cyber criminals. In 2018, international cyber security spending could reach $96 billion, [...]
Jun 14, 2018 3:17:40 PM
There are clear parallels between home ownership and cyber security. Locked windows and doors as well as household alarms have cyber-analogs, of course, and are often used to help illustrate the importance of technologies such as [...]
Jun 4, 2018 3:42:44 PM
Gambling means being prepared to lose everything. When working with an out of control, unmanaged digital certificate count and public key infrastructure (PKI), the risks of facing issues with financial and productivity losses are [...]
May 8, 2018 11:17:54 AM
Of all of the connected devices blackhat hackers could go after, why would they target medical devices? While there are a plethora of motives, most involve financial gain. Cybercriminals targeting medical devices are willing to pu [...]
Apr 25, 2018 3:19:42 PM
Imagine a world with no access controls. A free for all resulting in chaos thanks to broken processes, zero audit trails, and no way to administer rights to the appropriate devices or people. Luckily, today’s IoT driven world is l [...]
Apr 17, 2018 12:00:00 AM
This week, CSS announced the first mass-market implementation of a quantum-resistant Certificate Authority (CA). The result of a fruitful partnership with ISARA, this project possesses a high "coolness factor."  We've been excited [...]
Apr 11, 2018 2:04:16 PM
The General Data Protection Regulation (GDPR) is here.  Enforceable effective May 25, 2018, the GDPR aims to address data protection and privacy rights for citizens of the European Union.  GDPR addresses two primary areas of conce [...]
Apr 6, 2018 11:33:57 AM
The demand for trust in today's uber-connected digital society is unprecedented. Consumers of software require guaranteed proof that the application they are using is legitimate. Secure code signing validates the author of the sof [...]
Apr 3, 2018 9:04:15 AM
Death, Taxes, and Weakening Cryptography "Nothing is certain except death and taxes." Ben Franklin is often credited with coining this phrase; however, the first known appearance of "death and taxes" in this usage came from a play [...]
Mar 30, 2018 2:40:07 PM
Overwhelmed by manual Public Key Infrastructure (PKI) & certificate management processes? Burdened with worry of rogue certificates or certificate-related outages? Worried you've lost all control of your PKI? Stop losing and start [...]
Mar 23, 2018 10:05:44 AM
What is a Managed PKI? - Your PKI, Our Management and Service CMS Sapphire™ professionally managed Public Key Infrastructure (PKI) from Certified Security Solutions (CSS) allows you to maintain complete control over the use of you [...]
Mar 1, 2018 4:52:41 PM
Chrome 58 Patch Stirs up Controversy and Commotion A few short months ago Google released a patch (v.58) on its widely used Chrome browser. This patch being released forced us all to question the way we are doing certificate issua [...]
Feb 23, 2018 10:47:23 AM
A good API makes the difference between a software application and a software platform. Without an API, a software product is a special-purpose tool for a pre-defined set of specific operations. With a good API, though, it can bec [...]
Feb 16, 2018 4:22:58 PM
We Can All Move IoT Security Forward Industry groups such as the National Institute of Standards and Technology (NIST), the Industrial Internet Consortium (IIC), and the IoT Security Foundation (IoTSF), are developing security fra [...]
Feb 16, 2018 3:40:58 PM
Reporting requests can go on forever, and most software provides the ability to create and deliver reports via an integrated reporting tool. While making reporting easy for third-party vendors, usually this limits customer flexibi [...]
Feb 13, 2018 4:10:59 PM
With CMS 5.0, modernizing the user interface (UI) and improving the user experience was a top priority. The UI pre-5.0 was effective, however CSS has grown as a company and product since, and our UI now reflects our growth in this [...]
Feb 8, 2018 10:47:39 PM
At CSS we are all about helping clients manage their Public Key Infrastructure (PKI). We always recommend that customers store their important private keys using Hardware Security Modules (HSMs) because without an HSM it is hard t [...]
Jan 5, 2018 11:32:34 AM
As with any new year, there are with plenty of expectations and predictions.  There is nothing different about this year.  Especially as it relates to the Internet of Things (IoT). With over 20 billion current “connected” devices [...]
Jan 3, 2018 9:28:16 PM
At CSS we are all about helping our customers manage their Public Key Infrastructure (PKI). We always recommend that customers store their important private keys using Hardware Security Modules (HSMs) because without an HSM it is [...]
Dec 7, 2017 9:39:19 AM
When it comes to connected devices, how big should your "Circle of Trust" be?  Who should you trust, and why? As told by Jack Byrnes ("Meet the Parents"), who should you trust and why?
Oct 26, 2017 10:31:28 PM
Do You Really Need an On-Prem Public Key Infrastructure (PKI) for Better Security? While conventional wisdom of those who don't trust the cloud has been that on premises is more secure, the important reality is that on premises is [...]
Oct 25, 2017 8:50:36 AM
  There are always questions in regard to why an organization should care about their digital certificate lifecycle management (CLM) with their existing public key infrastructure (PKI).  Our sales team constantly hears the same re [...]
Oct 11, 2017 11:47:25 AM
Although Halloween happens once a year, evil lurks in the digital IoT world all year round.  Systems must be protected 24/7/365 to ensure that the ‘Demogorgon’ does not make it’s way through the portal into the system.  One concer [...]
Oct 6, 2017 10:28:43 AM
If you're not watching your PKI...who is?  As ominous as the title sounds, this blog will actually focus on the parties that should have eyes on your public key infrastructure (PKI), rather than the “bad actors” who shouldn’t.  Th [...]
Oct 2, 2017 10:59:00 PM
Last week, a bipartisan group from the US Senate Cybersecurity Caucus proposed a new piece of legislation called the “Internet of Things Cybersecurity Improvement Act of 2017.”  While the bill has yet to be ratified, it places mor [...]
Sep 13, 2017 10:35:59 AM
Why do I care about cryptography as an IoT architect? What is the deal with cryptography? Why does cryptography matter in the IoT world? Currently, it is estimated that there are about 8.4 billion devices online.  Within the next [...]
Sep 7, 2017 11:40:56 AM
Symantec SSL Customers, do you know where your certificates are located? In March, Google announced they discovered a problem with Symantec issued SSL certificates. Google identified roughly 30,000 SSL certificates that violated i [...]
Aug 16, 2017 11:26:40 AM
Do you remember the movie E.T, where E.T is essentially stranded on Earth until he assembles a makeshift communication device which sends a message to his spaceship to return to earth to retrieve him?
Aug 15, 2017 12:46:02 PM
CMS Enterprise now provides exclusive, real time policy control at the Certificate Authority (CA), providing the most comprehensive security compliance for certificate issuance available today. The CMS Custom Policy Modules interc [...]
Aug 10, 2017 3:41:43 PM
The quandary in buying a solution to any business problem is am I making the best choice and will our company derive value from that selection? In representing a variety of solutions to customers over more than 35 years, I have fo [...]
Aug 7, 2017 3:34:16 PM
Last week, a bipartisan group from the US Senate Cybersecurity Caucus proposed a new piece of legislation called the “Internet of Things Cybersecurity Improvement Act of 2017.”  While the bill has yet to be ratified, it places mor [...]
Jun 27, 2017 9:24:02 AM
My alarm signals like an acoustic guitar. I really need to change that sound – it’s starting to get on my nerves. A quick email scan before I begin my morning routine. Justin was finally able to get the domain joined machines in t [...]
Jun 22, 2017 1:03:04 PM
The average global 5,000 company spends about $15 million to recover from a certificate outage. These estimates are based on a Ponemon survey of about 2,400 global respondents which include remediation costs, loss of productivity, [...]
Jun 14, 2017 11:04:00 PM
As CTO at Certified Security Solutions, I’ve been asked the question more and more lately, “how will Blockchain impact PKI?”   There’s so much mysticism around Blockchain technology today that it can become difficult to separate t [...]
Jun 2, 2017 1:40:54 PM
Trends in Encryption and Data Security Include Major Implications for the IoT Key Trends of the 2017 Thales Data Threat Report The Global Edition of the 2017 Thales Data Threat Report featured a number of trends in the data set wh [...]
May 19, 2017 1:59:29 PM
Congratulations, you’ve chosen ThingWorx to launch and manage your IoT devices, applications and data. Your goals are clear, your code has been tested and the connections are ready to engage. Unfortunately, you’ve forgotten a crit [...]
May 18, 2017 8:49:05 AM
As CTO at Certified Security Solutions, I’ve been asked the question more and more lately, “how will Blockchain impact PKI?”   There’s so much mysticism around Blockchain technology today that it can become difficult to separate t [...]
May 5, 2017 2:02:23 PM
With Google’s recent Chrome 58 version update, your Public Key Infrastructure (PKI) may suddenly be impacted. Your formerly-compliant HTTPS certificates may no longer be working. CSS is here to explain what has changed, why has it [...]
Mar 27, 2017 4:17:51 PM
Despite the documented shortcomings of the Simple Certificate Enrollment Protocol (SCEP), it is still in widespread use today. This is in large part due to the lack of better options when it comes to certificate enrollment – espec [...]
Mar 22, 2017 11:41:01 AM
SHA-1 has been in the news (again). We’ve all known that the SHA-1 hash function is cryptographically weak. In fact, CSS has been pointing out the weaknesses of SHA-1 for years now. Time's Up for SHA-1, CSS' Suggested Migration Pa [...]
Feb 9, 2017 3:06:59 PM
Planning on attending RSA 2017? Connect with CSS! Are You Attending RSA 2017? Connect with the Cyber Security Experts at Certified Security Solutions Certified Security Solutions (CSS) will be attending the 2017 RSA Conference in [...]
Feb 3, 2017 10:25:33 AM
Cyber Threats to Aerospace and Defense  Cyber Threat Conditions in Aerospace and Defense   As one can imagine, the aerospace and defense industry is full of highly sensitive data. When you consider their primary customers, namely [...]
Feb 1, 2017 10:52:00 PM
The healthcare sector continues to build some of the largest, lucrative and vulnerable stores of data, making them attractive targets for cyber criminals. Further, malicious actors are more prevalent, organized and creative in the [...]
Jan 26, 2017 7:17:12 PM
Evolving Challenges of Cyber Security in Telecommunications The Telecom Threat Environment For the telecommunications sector, staying up-to-speed with information security challenges is a constant battle. Telecom organizations are [...]
Jan 12, 2017 4:14:29 PM
Manufacturing is Contending with a Changing Risk Environment An Overview of Cyber Threats to Manufacturing Manufacturing is a widespread industry with a lot of components. Mass production, purchasing, selling, and the information [...]
Jan 5, 2017 4:01:19 PM
CSS Presents Cyber Security Survey Results   A National Digital Identity Insights Survey In Q4 2016, CSS Research surveyed information security professionals on their current and anticipated public key infrastructure (PKI) usage, [...]
Dec 22, 2016 3:52:35 PM
How Properly Managing Digital Certificates Enhances Your Security Posture Digital Certificate Management and Cyber Security Today Cryptography itself has been around for a while; what’s interesting is how it’s evolved over time. T [...]
Dec 16, 2016 1:41:13 PM
Facing the Cybersecurity Challenges of the Retail Sector Retail’s Cyber Threat Environment: Debit Cards, Credit Cards, and Surviving as a Popular Target The Internet, technological evolution, and the “always on, always connected” [...]
Dec 12, 2016 11:40:51 AM
CSS Presents PKI Promises for the Security of Next Year Making 2017 Your Business’ Most Secure Year 2016 was an eventful year for cyber security, from beginning to end. While longstanding security problems remained challenging, ma [...]
Dec 5, 2016 3:29:01 PM
How Are Achieving Cyber Security Compliance and a Truly Secure State Different? Achieving Compliance is Not Equivalent to Achieving an Actual Secure State The backdrop of today’s information security landscape is riddled with dema [...]
Nov 28, 2016 2:06:17 PM
Fog Computing: When the Cloud is Not Enough How Do We Manage the Massive Amounts of Data Generated by the IoT? The Internet of Things (IoT) market and its exponential growth are bringing many improvements and considerable revenue [...]
Nov 20, 2016 10:19:13 PM
Cloud-based Services and the Internet of Things (IoT) Driving PKI The Explosion of Cloud-based Apps and the IoT are Creating the Need to Reinforce PKI Environments  The takeover of the cloud has brought countless businesses to pur [...]
Nov 17, 2016 2:19:26 PM
The World of PKI and IoT in 2017 In 2017, Public Key Infrastructure (PKI) will continue to solidify its place as a fundamental digital identification, authentication and encryption standard—especially as the Internet of Things (Io [...]
Nov 11, 2016 2:33:40 PM
PKI and Digital Certificates as a Solution for PCI Compliance Cyber Threats of the Financial Sector Financial services is navigating an interesting time: eight years have passed since the crash of 2008, allowing enough time for ma [...]
Oct 31, 2016 11:26:53 AM
Health checks are critical to maintaining Public Key Infrastructures (PKI) and a strong overall security posture, but they’re overlooked too often.   Public Key Infrastructure (PKI) is Not a “Set and Forget” Scenario It’s common k [...]
Oct 28, 2016 8:56:44 AM
Blockchain Unblocked - What it is and what it is not Blockchain technology has become a topic of major discussion in the past year or two.  There’s no question that the technology holds significant promise for the future… and it’s [...]
Oct 25, 2016 12:00:36 PM
IT and Compliance Departments Working Together With Greater Frequency The Integration between IT and Compliance Presently, a marked shift from the silos of IT and compliance teams is resulting in a departmental convergence for man [...]
Oct 20, 2016 1:24:39 PM
How Can the Energy Sector Protect Itself From Cyber Threats? The Takeover of Network-Connected Sensors in the Energy Industry The problems of the energy sector, including increasing conservation efforts, greater emphasis on altern [...]
Oct 18, 2016 8:50:41 AM
Are You Ready for the Move to SHA-2? Is your business ready for SHA-1 deprecation? The timelines for the move to SHA-2 are looming, and deprecation is fast-approaching. Explained by InfoWorld, SHA-1 was once considered secure, but [...]
Oct 14, 2016 12:39:36 PM
Yesterday (October 13, 2016), certain segments of the Public Key Infrastructue (PKI) world were spun into a frenzy, when a GlobalSign CA certificate appeared to have been revoked.  Clearly, revoking a CA certificate is a significa [...]
Oct 11, 2016 3:28:25 PM
The healthcare sector continues to build some of the largest, lucrative and vulnerable stores of data, making them attractive targets for cyber criminals. Further, malicious actors are more prevalent, organized and creative in the [...]
Oct 11, 2016 3:27:20 PM
The healthcare sector continues to build some of the largest, lucrative and vulnerable stores of data, making them attractive targets for cyber criminals. Further, malicious actors are more prevalent, organized and creative in the [...]
Sep 27, 2016 4:29:04 PM
Your PKI Implementation—What’s Involved? Public key infrastructure (PKI) strict implementation management is not optional—it’s necessary. Whether your organization is in the wireless space, implementing a BYOD initiative, or tackl [...]
Sep 22, 2016 1:55:14 PM
Cybersecurity Today Ever-evolving security challenges are dominating today’s IT landscape. Malicious actors are using every avenue possible to access sensitive and valuable data, from social engineering and DDoS to brute force met [...]
Sep 16, 2016 12:23:53 PM
Those of us in the information security field are all too familiar with the effectiveness of social engineering, and while there are still those who readily send money off to strangers from a simple phone call or email, people are [...]
Sep 8, 2016 9:36:06 AM
Featuring a lesson from the Death Star PKI is an entire infrastructure supporting trusted certificates As more enterprises implement their own internal Public Key Infrastructure (PKI) to save money on purchasing an increasing volu [...]
Aug 31, 2016 9:03:30 AM
Trust, as it pertains to most components within a Public Key Infrastruture (PKI) is earned. It’s established as the result of some sort of evaluation. An evaluation that often involves a revocation check or policy check. In the ca [...]
Aug 1, 2016 3:59:21 PM
In 2016 digital identity cyber crimes have grown exponentially. As businesses continue to brace against cyber adversaries and look to secure the Internet of Things (IoT), Public Key Infrastructure (PKI) is continuing to prove that [...]
Jul 14, 2016 2:32:31 PM
The newly released Pokemon Go by Niantic for mobile devices is all the craze right now. With over 15 million downloads, and 1.6M in daily revenue in the US alone, it has become the most downloaded app of all time. To summarize, th [...]
Jun 21, 2016 3:39:55 PM
In 2016 CSS Research surveyed information security professionals on their current and anticipated digital certificate usage related to enterprise and Internet of Things (IoT) use cases. This infographic outlines key findings from [...]
Jun 15, 2016 11:46:34 AM
Why are we talking about assurance? ‘Assurance’ in the realm of PKI, tends to be one of those topics that is almost guaranteed to send a PKI design meeting down a rabbit hole. And unfortunately, many customers prefer the blue pill [...]
Jun 9, 2016 1:56:24 PM
Jay Thoden van Velzen from SAP recently published a very interesting blog describing the use of certificate metadata as a mechanism to enhance IoT authentication.  We wholeheartedly agree with the approach.  CSS’ VerdeTTo solution [...]
Jun 1, 2016 10:20:24 AM
Having the privilege to work with some of the best, if not the best PKI and security professionals in the field, I have learned the extreme importance of the practices used in securing the root certification authority (CA) platfor [...]
May 11, 2016 9:22:58 AM
Digital identity management (DIM) is the process for managing and securing digital identities through authentication, encryption, and signing. The end goal is to protect your organization’s reputation by preventing breach and/or d [...]
Apr 26, 2016 11:25:11 AM
Healthcare Devices: Then and Now Healthcare devices through the ages: what was once a cumbersome trip to the doctor for testing, followed by a series of manual documentation steps, is now a convenient, internet-connected wearable [...]
Apr 15, 2016 10:51:18 AM
As a Public Key Infrastructure (PKI) best practice, Certificate Policies are associated with a PKI by reserving and incorporating unique object identifiers (OID) into all or portions of your PKI.  OIDs are used to assign one or mo [...]
Apr 6, 2016 9:46:39 AM
This blog is a continuation in a series of blogs, relating to the perils of adding Subject Alternate Name (SAN) information to a certificate signing request (CSR).
Mar 18, 2016 11:12:22 AM
IoT Security: the area of the information security industry aimed at securing devices, data, people and applications within the Internet of things (IoT). What makes IoT Security so important? The growth of internet-connected data, [...]
Feb 19, 2016 12:11:59 PM
  If your organization is managing a significant volume of digital certificates (over 100), and expects continued rapid growth, your security team should consider an automated certificate lifecycle management solution. When facing [...]
Feb 5, 2016 2:36:48 PM
Building custom activities in Forefront Identity Manager (now Microsoft Identity Manager) required an understanding of programming in C# or VB.Net and how Windows Workflow Foundation functions.
Jan 21, 2016 10:59:45 AM
In 2016, the need for trusted digital identities will become paramount to the overall security within the global Internet.  As businesses continue to brace against cyber-adversaries and look to secure the Internet of Things (IoT), [...]
Jan 7, 2016 2:47:31 PM
Few companies have the luxury of a dedicated full time professional PKI staff. More typical are those companies that assign this duty as an adjunct to someone with a separate primary function, such as AD engineering.  As such, I f [...]
Dec 30, 2015 11:49:33 AM
In 2016, the need for trusted digital identities will become paramount to the overall security within the global Internet.  As businesses continue to brace against cyber-adversaries and look to secure the Internet of Things (IoT), [...]
Dec 18, 2015 4:32:22 PM
Left in the Dark: When the Sun Sets Too Early The Internet security landscape is constantly changing.  Data drives the decisions that organizations make about their security posture; when that data is incomplete, forecasting the c [...]
Dec 7, 2015 5:00:00 PM
Digital identity authentication and data encryption are expanding exponentially with our growing reliance on the Internet of Things (IoT). Companies are looking to technology to minimize risk, protect assets, and reduce operationa [...]
Dec 7, 2015 4:59:00 PM
Digital identity authentication and data encryption are expanding exponentially with our growing reliance on the Internet of Things (IoT). Companies are looking to technology to minimize risk, protect assets, and reduce operationa [...]
Oct 9, 2015 12:45:15 PM
Many of you know that the cryptographic hash algorithm SHA-1 is in the process of being deprecated, due primarily to the hashing algorithm’s susceptibility to collision attacks. I first wrote about this back in 2011: http://blog.c [...]
Sep 11, 2015 2:15:00 PM
The proliferation of Internet-connected consumer devices is leading to an exponential rise in unsecured remote access. While it’s commonplace for companies to implement authentication technologies that verify the digital identitie [...]
Jun 30, 2015 2:12:53 PM
The Internet of Things (IoT), from a security perspective, ultimately equates to an ever increasing need to more securely authenticate people, services, computers and devices across a wide spectrum of platforms. This means that Pu [...]
Jun 8, 2015 8:48:30 AM
A Public Key Infrastructure (PKI) is a set of hardware, software, people, policies and procedures needed to create, manage, distribute, store and revoke digital certificates and manage public key encryption. It is often said (espe [...]
Jun 2, 2015 3:42:58 PM
In this blog, we'll explore taking business enablement to the next level by integrating two security technologies, PKI and Identity Federation.
Apr 28, 2015 1:30:00 PM
The Internet of Things (IoT), from a security perspective, ultimately equates to an ever increasing need to more securely authenticate people, services, computers and devices across a wide spectrum of platforms. This means that Pu [...]
Apr 11, 2015 11:03:00 AM
We recently did an implementation of our Certificate Management System (CMS) version 4.0 product for a customer and ran into a bizarre problem with Microsoft's implementation of SCEP--the Microsoft Network Device Enrollment Servic [...]
Apr 2, 2015 11:52:00 AM
Data breaches have become part of our daily news. We only have to mention Anthem, Sony, Staples, UPS, Kmart, Target, Neiman Marcus, eBay, Home Depot, Apple iCloud, J.P. Morgan Chase and most of us know that those company names are [...]
Apr 1, 2015 1:49:00 PM
Change Management is one of the most important processes of Service Transition because it allows us to: Reduce Costs Lower Overhead Add to bottom line Improve Productivity Improve Quality Improve Services The RFC (Request for Chan [...]
Mar 12, 2015 10:52:32 PM
Recently, a customer wanted to allow its users to select specific alternate SMTP addresses for removal via the FIM portal.  
Mar 11, 2015 3:56:32 PM
It’s a normal Wednesday at Company XYZ  Inc., where you’ve been a System Engineer since 2007. Your typical day starts with a multitude of issues – some large and some small. A group of workstations in Legal missed the most recent [...]
Mar 2, 2015 8:00:00 AM
The Internet of Things (IoT) or the Internet of Everything (IoE) is coming. Ok, so it's already here.  A snowball rolling down a slope gaining momentum and size, IoT is dominating trade show floors and executive agendas.  As the w [...]
Feb 25, 2015 9:58:00 AM
The goal of this article is to provide a checklist for validating Microsoft's Forefront Identity Manager's (FIM) configuration for optimal performance. As there are many different technologies involved in a FIM deployment, I thoug [...]
Jan 29, 2015 3:43:00 PM
In today's corporate environment, enterprise companies are choosing to secure intellectual property and customer data to not only protect against the damage associated with data breaches but also to comply with privacy and regulat [...]
Sep 17, 2014 11:11:00 AM
Recently I worked on a customized self-service password reset (SSPR) solution leveraging FIM 2010 R2. The SSPR functionality provided out of the box by FIM 2010 R2 is quite comprehensive. In the design sessions with the customer, [...]
Sep 8, 2014 9:45:53 AM
Last week a user reported having reset his password, but it hadn’t changed in the connected HR system. As this is an indication that the Password Change Notification Service (PCNS) wasn't working, I checked the Event Viewer on the [...]
Jul 3, 2014 7:22:19 AM
An ITIL implementation in your organization can be confusing. This section explains exactly why we implement ITIL for our services and processes. In Continual Service Improvement (CSI), we have a couple of different models that we [...]
Jun 25, 2014 11:56:00 AM
A client recently requested the ability to use data in an externally-generated file to perform batch attribute updates for Users in the FIM Service. What made this more complicated than expected was that some of the user attribute [...]
Jun 20, 2014 7:06:26 AM
CSS receives patent for highly secure PKI certificate issuance. Delivers enhanced level of secure identity for devices outside of corporate firewall.
Jun 18, 2014 6:27:00 AM
At first, this question might initially seem like an apples vs. oranges situation. We’ll find out that in some cases it’s not, and that making the best strategic choice for your needs depends on a number of factors.
Jun 9, 2014 10:24:18 AM
A leader in the educational software market was developing a custom MDM solution enabling a Bring Your Own Device (BYOD) initiative for the classroom when their developers realized their need for an underlying security and Public [...]
May 20, 2014 9:35:00 AM
I’ve often been asked by customers, "How does auto-enrollment work and under what circumstances will renewals, replacement, revocation, and updates happen?"
May 12, 2014 9:56:15 AM
With Windows AAD (Azure Active Directory), ADFS 3.0 (Active Directory Federation Service), and OWIN (Open Web Interface for .NET), you will find your corporate individual core identity, making connections between your corporation [...]
May 5, 2014 6:47:15 AM
Recently we started using a custom script to install and configure FIM in a consistent manner. During more than a few manual installs, I’ve been asked to install FIM into a drive or directory other than “C:\Program Files\Microsoft [...]
Apr 30, 2014 2:57:26 PM
If you have spent time with FIM you know, and if you have not, you will soon learn that migrating a FIM Service configuration from one environment to another can be very difficult.
Apr 24, 2014 8:06:29 AM
This blog covers the key knowledge areas of Incident Management.
Apr 14, 2014 9:57:45 AM
Awhile back, I wrote a post (Shocked by an Android) singing the praises of Samsung for supporting RMS in their native Microsoft Exchange ActiveSync email client for Android. Today, however, I'm here to report on a security flaw we [...]
Apr 11, 2014 10:52:23 AM
In the wake of the Heartbleed bug, many are faced with the daunting (and expensive) prospect of replacing the SSL certificates on those vulnerable systems. This is due to the possibility that the private keys of exposed SSL certif [...]
Apr 9, 2014 10:56:36 AM
On April 7, 2014 a severe vulnerability called “Heartbleed” was announced. Heartbleed is a vulnerability within the OpenSSL 1.0.1 series software that is described in the NIST CVE-2014-0160 announcement. In short, this vulnerabili [...]
Apr 7, 2014 7:01:07 AM
Certified Security Solutions redefines the price point for the adoption and operation of Private/Public Key Infrastructure (PKI) for Global 2000 clients with the Certificate Management System (CMS) and the enterprise scalable PKI [...]
Apr 4, 2014 3:20:46 AM
In the 12+ years that CSS has been helping organizations deploy Public Key Infrastructures, we frequently run into situations where PKI components are already present in the environment. Often it’s an older PKI that someone new to [...]
Mar 11, 2014 6:38:34 AM
What is ITIL? Why is it important for a company to implement it?
Dec 10, 2013 4:47:24 AM
By now, you may have already heard that Microsoft will start deprecating trust in certificates with SHA-1 signatures in 2016. In our view, this is a prudent move by Microsoft. We've long known that SHA-1 was weakening, and showing [...]
Nov 13, 2013 4:42:02 AM
Identity Federation is all about trusts. As the diagram shows below, all participants within such identity federation form a cycle of trusts. One can easily extend federated authentication for Windows Azure Service Bus to external [...]
Sep 24, 2013 11:58:24 AM
Cleveland, OH - September 24, 2013 - Certified Security Solutions' Certificate Management System (CMS) is featured in the AirWatch Marketplace as a fully integrated mobile certificate solution. Developed to give AirWatch customers [...]
Aug 5, 2013 12:36:41 PM
Based on Microsoft online article http://www.windowsazure.com/en-us/services/identity/, Windows Azure empowers with secure, enterprise ready identity and access management for the cloud.
Aug 2, 2013 6:46:44 AM
Cleveland, OH – August 2, 2013 – Certified Security Solutions (CSS), a leading provider of certificate and Public Key Infrastructure (PKI) services and products, was recently honored at the Microsoft Worldwide Partner Conference ( [...]
Jul 11, 2013 6:02:26 AM
So you have created a Forefront Unified Access Gateway 2010 (UAG) array but you don't see any array settings for your trunks.
Jul 9, 2013 6:49:48 AM
In December of 2011, the CA/Browser Forum, comprised of representatives from the major Certification Authorities such as Symantec, Comodo, GoDaddy, and DigiCert, as well as browser vendors such as Microsoft, Apple, Mozilla, and Op [...]
Jul 9, 2013 5:29:48 AM
There are times when you might find yourself needing to migrate a relying party (RP) from one AD FS implementation to another. Unfortunately, at the moment there do not seem to be existing tools to do this. So, we offer the follow [...]
Jun 19, 2013 5:52:51 AM
I recently worked on a project where the client had some users who may not be logging into their accounts for 6 months or more, but their corporate policy was to disable accounts that had been dormant for more than 3 months.
Jun 3, 2013 8:06:31 AM
You may have heard of the ability back in Windows Server 2008 R2 to use the File Classification Infrastructure (FCI) feature (part of the File Services role) together with the AD RMS Bulk Protection Tool (a command-line tool) to a [...]
May 29, 2013 11:08:08 AM
CSS experiences rapid software growth, doubling down on investments with the release of the Certificate Management System (CMS) 3.0 and European expansion with reseller CertSecurity. Cleveland, OH – May 29, 2013 – Certified Securi [...]
May 2, 2013 9:06:08 AM
Recently I encountered an odd authorization error while trying to enable Active Directory Rights Management Services (AD RMS) for an on premise Exchange 2010 server and thought the world might benefit from my experience in resolvi [...]
Apr 10, 2013 4:39:00 AM
I still have a Tandy laptop. It’s not a tablet. It’s not a notebook. It is a LAPtop as in you can sit it on your lap. It runs on four AA batteries, and if I want to upgrade the ram to a screaming 256K I have to find something that [...]
Apr 2, 2013 7:36:45 AM
Join us for a discussion and technical demonstration of:
Mar 20, 2013 4:54:00 AM
When implementing a federation solution, or replacing an existing legacy solution, let’s consider how “thinking about the problem differently” can improve things.
Mar 11, 2013 7:03:08 AM
There are many ways to create self-signed certificates; some require additional tools that are not typically available on a Windows server or use cryptic commands. This PowerShell script offers an easy way to create SSL certificat [...]
Feb 8, 2013 3:49:00 AM
Ever wonder why documents always say use module protect when using FIM CM and Thales HSM together? Why use the HSM in a less secure mode when it is designed to be a K of N device?
Jan 29, 2013 9:54:53 AM
Recently I was engaged with a customer who decided to source certificates from a service provider rather than build a PKI. In this case the customer was limited in resources and an evaluation of build vs. buy showed this to be the [...]
Jan 24, 2013 10:17:31 AM
As a consultant, one of the primary responsibilities is to deal with strange problems or issues that arise. And inevitably some obscure issue will come to the surface during a demo… Since I specialize in Microsoft’s Forefront Iden [...]
Jan 21, 2013 9:02:07 AM
A lot of technical notes and web articles talk about different aspects for claims-based federation between ADFS 2.0 and SharePoint 2010. In this blog, we will primarily focus on claims mapping, setting for authentication and autho [...]
Jan 8, 2013 5:23:21 AM
Sets and groups are different object types in FIM, but often people would like to have sets based on group membership. We figured out a way to do that with some custom attributes.
Dec 19, 2012 4:55:00 AM
Marley was dead, of that we can be certain. The poor man had died tragically at his desk going over the security auditing logs trying to ascertain if the laptop that had been stolen from their young clerk had been secure or not. T [...]
Nov 20, 2012 3:57:00 AM
With the new features of FIM 2010 R2 such as external SSPR, reporting, and BHold (not to mention all of the other extras - like the the gains in performance, new connectors, etc.), folks are of course interested in updating their [...]
Oct 30, 2012 7:13:15 AM
Microsoft Windows Azure Active Directory opens opportunities for people and organizations to use applications anywhere based on cloud ubiquitous connectivity and open standard protocols such as OAuth, SAML-P, WS-Federation and RES [...]
Oct 23, 2012 5:01:00 AM
Since time draws ever closer to the season of the witch, allow me to start out with an excerpt from a timeless techie classic, the poem titled, “The Ramen.” I know not from whom it came but kudos to them:
Oct 4, 2012 8:16:30 AM
As many know, the cryptographic hash function known as Secure Hash Algorithm 1 (SHA-1) has been deemed weak by NIST, and is no longer recommended. The NSA addressed the weaknesses in SHA-1 by publishing the SHA-2 hash function sta [...]
Oct 2, 2012 6:54:08 AM
FIM requires several service accounts and groups, each with their own configuration requirements. However, there isn’t a single document that I’ve found that lists out all the accounts and the access they need. This is a compilati [...]
Sep 5, 2012 5:16:46 AM
“Can we install the FIM 2010 R2 Add-ins and Extensions on our desktops before we upgrade the rest of the FIM environment?” While this may be an obvious, self-answering question, I had a client ask me about it recently, and while I [...]
Aug 16, 2012 12:27:00 PM
CSS recently discovered and published information on a potential privilege escalation attack in SCEP-based Certificate Issuance Systems. After this discovery, CSS created the SCEP Validation Service, which aims to close this attac [...]
Aug 16, 2012 11:58:49 AM
CLEVELAND, OH – August 16, 2012. Certified Security Solutions (CSS) is making its SCEP Validation Service™ – a solution that prevents the attack described in US-CERT vulnerability report VU#970135 – available for integration and O [...]
Aug 6, 2012 6:44:00 AM
With System Center Configuration Manager 2012, customers have the ability to use Endpoint Protection capabilities to provide anti-malware services and security to servers and clients. However, to reduce administrator touch points [...]
Jul 25, 2012 5:15:44 AM
The Certificate Management System (CMS), formerly known as the Certificate Reporting Tool (CRT), as referenced below, provides reporting and notification capabilities to an existing Public Key Infrastructure (PKI). The reports and [...]
Jul 20, 2012 5:32:00 AM
Oh the times they are a’changin. It seems like it was only yesterday that I loaded up Windows 7 and had my nice comfortable Internet Explorer 8, but alas, they grow up so fast and now it is time to bid a fond farewell to IE 8 and [...]
Jul 11, 2012 5:51:39 AM
Why PKI Procedures are so important to your business Most people who are familiar with Public Key Infrastructure have been aware of the unfortunate events that happened to the Dutch Public CA DigiNotar. As a both a Dutch native an [...]
Jul 7, 2012 5:55:35 AM
If you’re reading this, there’s a good chance you’ve already seen the reports about the security ramifications of issuing certificates to mobile devices using the Simple Certificate Enrollment Protocol (more information on our sit [...]
Jun 28, 2012 7:22:00 AM
Vulnerability Note VU#971035- Simple Certificate Enrollment Protocol (SCEP) does not strongly authenticate certificate requests CLEVELAND, OH – June 28, 2012. Researchers at Certified Security Solutions, Inc. (CSS), a leading info [...]
Jun 19, 2012 4:38:04 AM
During the typical sales cycle, a key success factor is getting the end customer to accept the "pain points" or challenges that exist in his or her organization at that point in time. Hopefully the flip side of these challenges ar [...]
Jun 13, 2012 10:25:00 AM
My name is Jamie Smith and I’m a Consultant for Certified Security Solutions Secure Infrastructure Management team. I would like to introduce you to the next segment of our ‘Windows 7 Accelerate with System Center’ marketing campa [...]
Jun 6, 2012 6:46:35 AM
Recently, CSS was requested by a client to implement an AD FS 2.0 (ADFS) federation solution to meet a very unique security requirement associated with scenarios of external access to internally hosted services.
May 23, 2012 8:08:50 AM
Stunned is the word for it. There I was getting to know my new Samsung Galaxy Tab 2, a tablet running Android 4.0 (Ice Cream Sandwich). I configured the built-in Exchange ActiveSync client (using certificate-based authentication, [...]
May 16, 2012 8:13:00 AM
In Part 1 we discussed the requirements overview on preparing for a migration and in Part 2 we covered the types of objects that are available for migration and the exclusions. In this final write up in the series we will go throu [...]
May 16, 2012 8:02:00 AM
The following is an excerpt from my book Microsoft System Center 2012 Endpoint Protection Cookbook, https://www.packtpub.com/virtualization-and-cloud/microsoft-system-center-2012-endpoint-protection-cookbook 
May 16, 2012 5:14:00 AM
Continuous Integration (CI) is a process where software under development is continuously compiled and tested as changes are submitted to a revision control system. The goal is to identify issues such as code changes that break th [...]
May 14, 2012 4:43:32 AM
A recent requirement for a project was to have users and groups provisioned from Domain B to Domain A. Simple enough, but a catch was that, as applications were migrated to Domain A, their groups would be “owned” by Domain A, whic [...]
Apr 12, 2012 10:38:00 AM
Let's say you’ve found yourself working against the clock to get Windows 7 rolled out before Windows XP hits end of life, and during the planning phase you realize your current AV solution won’t work on Windows 7 without an upgrad [...]
Apr 12, 2012 5:00:00 AM
Some things were just meant to be… It’s been a long road getting to here I’m sure. You’ve got a perfectly tuned SCCM 2007 infrastructure, you’ve upgraded to R2, and that installation of service pack 2 is now nothing but a quaint m [...]
Apr 10, 2012 9:16:00 AM
There are number of organizations out there who are discussing or currently testing implementations of Microsoft’s BitLocker Administration and Monitoring (MBAM). There are a number of things that the recently released enterprise [...]
Mar 15, 2012 6:39:29 AM
Certified Security Solutions sent a team to the 2012 RSA Security Conference in San Francisco where one of the underlying themes was mobile security. Located in the Microsoft Pavilion, team CSS boasted a 'Got PKI?' theme centered [...]
Feb 27, 2012 8:00:25 PM
The major challenge in an AD RMS implementation is not getting the infrastructure up and running or getting the client settings, files and application deployed to all users. It's not making RMS available through your firewall or g [...]
Feb 21, 2012 6:00:32 AM
Recently, while working on a Microsoft Network Device Enrollment Services (NDES) deployment, a client asked a simple-enough question about the thumbprint for the Certificate Authority (CA) certificate that was displayed on the NDE [...]
Feb 14, 2012 4:00:11 AM
One of the things we often run into while working on AD RMS deployments is customers who want to protect documents in formats other than those that are natively supported by AD RMS--Outlook, Word, Excel, PowerPoint, InfoPath and X [...]
Feb 9, 2012 4:00:13 AM
The popularity of Apple’s iPads and iPhones among consumers are well documented, but recent findings from Forrester Research shows that these devices are gaining steam in the corporate world. The “Consumerization of IT” or BYOD (B [...]
Feb 8, 2012 4:00:56 AM
Very often as sales engineers we are tasked to help the customer with assistance during a proof of concept engagement, however, these types of projects can present different types of challenges. Ultimately, every SE’s goal should [...]
Jan 31, 2012 4:00:00 AM
One of the best features of Forefront Endpoint Protection (FEP) 2010 was its easy to use server policy templates. In a nutshell, server policy templates let you quickly choose an optimized, preconfigured FEP policy for every- just [...]
Jan 24, 2012 4:00:49 AM
I was recently helping someone new to FIM come to grips with the multivalued attribute (MVA) table. The MVA table can be used to populate a multi-valued attribute—in a common scenario, this would be the member attributes of a grou [...]
Jan 17, 2012 4:00:00 AM
In Part 1 of this blog series I presented an overview of the requirements for preparing a migration from Configuration Manager 2007 to 2012. With that information in hand I believe that you should have a general understanding of t [...]
Jan 12, 2012 4:24:00 AM
Office365 is a cloud based solution that provides hosted email, collaboration, and IM solution, enabling organizations to quickly implement these capabilities without needing to implement large, in-house infrastructures to support [...]
Nov 18, 2011 7:19:57 AM
This week we’ve seen the latest chapter in the Microsoft/Apple love/hate relationship… and it would seem that love is conquering all… at least for the time being. As CRN reports, Apple is reaching out to Microsoft partners that ca [...]
Nov 8, 2011 4:08:49 AM
In most corporate environments, when you roll out RMS to the client machines you're talking about domain-joined machines that you are configuring via group policy, SCCM and similar desktop deployment tools. But what if you have a [...]
Nov 3, 2011 5:00:00 AM
As we all wait in anticipation for Configuration Manger 2012, there are a number of concerns that present themselves from an administrator’s perspective. One of those primary concerns, and the topic of this post, is the lack of up [...]
Nov 2, 2011 10:18:58 AM
So one of your users has received an error from AD FS 2.0, and you need to determine what the problem is. Unfortunately, sometimes the error message doesn't give much of a clue—for example the web page shown below.
Oct 18, 2011 5:05:00 AM
In my previous blog, I talked about the necessity of a Time Stamping Authority (TSA) in regards to non-repudiation. In this blog we are going to have a closer look at time itself, talk about why accurate time is important, and how [...]
Oct 12, 2011 5:07:11 AM
CSS Senior Consultant and Microsoft Operations Manager MVP, Jeremy D. Pavleck, finished presenting CSS' "System Center in the Real World" a four-part live webinar series centered around Microsoft System Center solutions on Thursda [...]
Sep 15, 2011 9:50:12 AM
iOS 5, Apple’s new operating system for iPad, iPhone, and iPod Touch, will be released “soon” – Apple officially says “this Fall,” and many prognosticators are pointing to sometime in October. While the new release has hundreds of [...]
Sep 6, 2011 5:39:40 AM
So you want to make some of your applications available using federation but you have multiple forests. What can you do? Well, if you have two-way trusts between your forests, you’re in luck, because AD FS works very well if you h [...]
Aug 31, 2011 6:40:00 AM
We are all familiar with how Configuration Manager 2007 handled software updates and, without speaking for everyone who was using SMS 2003, we can probably agree that 2007 made multiple strides forward in making the update process [...]
Aug 22, 2011 10:01:17 AM
Recently, I have been involved in several client projects that involve the distribution and synchronization of user accounts between multiple organizations. This is a little different than the standard synchronization scenario, wh [...]
Aug 3, 2011 5:00:33 AM
In this blog, I will describe how to send an email message when a group is changed from static membership to criteria (dynamic) membership. The email notification contains the display and account name of the group, the person maki [...]
Aug 3, 2011 5:00:13 AM
In this blog, I will describe how to send an email message when a dynamic group's criteria (filter) changes. The email notification contains the display and account name of the group, the person making the change and both the old [...]
Jul 28, 2011 10:10:13 AM
Microsoft again recognizes CSS for quality, comprehensive security services and outstanding customer satisfaction.
Jul 21, 2011 5:00:05 AM
New configuration established to better align sales resources with clients’ and prospects’ needs as well as drive growth  
Jul 19, 2011 5:04:29 AM
Most ILM/FIM implementations require some custom code extensions, and debugging these extensions is an important part of the development process. When developing code extensions for ILM and FIM, one of the configurable options is [...]
Jul 8, 2011 6:21:59 AM
Annual Study Conducted by Microsoft Results in scores twenty percent higher than the composite scores of all global partners.
Jul 6, 2011 5:00:32 AM
With the recent sting of very public and highly publicized IT compromises, many IT security stake holders are re-evaluating their overall security strategy. It is inevitable that at some point in that evaluation, the idea of imple [...]
Jun 28, 2011 8:52:00 AM
The release of Configuration Manager 2012 will provide a significant increase in productivity and efficiency in the world of systems management. As many of us in the Systems Management realm have often dreaded configuring limited [...]
Jun 23, 2011 12:57:03 PM
So you’ve been hacked… what now? Other than of course contacting CSS so we can reduce your vulnerabilities and close security holes. According to the Wall Street Journal this week (Firms Adjust to Hacks), more and more firms are d [...]
Jun 6, 2011 11:30:05 AM
As with many quests, the one I embarked on to figure out how to create criteria based sets and groups where membership was based on an attribute in the FIM portal being “empty” turned out to be more complex than first thought. We [...]
Jun 3, 2011 5:00:04 AM
SCVMM with SP1 introduces multiple benefits for managing a virtual environment. Business leaders and product acquisition teams might be looking at this product to help their organizations manage both Hyper-V and ESX platforms. It’ [...]
Jun 2, 2011 5:00:11 AM
It is safe to say that everything has gone digital. In an age where people are farming virtual farms and tending to online fish tanks, why wouldn't the need for a "virtual signature" become apparent? When it comes to replacing you [...]
May 31, 2011 11:55:35 AM
CIOs, CSOs and IT Security personnel are confronted with the realization that the RSA SecurID breach may have impacts that extend well beyond RSA itself, and into its customer base. While the admission of a breach at RSA this past [...]
May 26, 2011 11:37:16 AM
As organizations invest more in datacenter virtualization solutions, CSS has heard the need from customers to be able to provide robust management, especially around heterogeneous management of multiple virtualization technologies [...]
May 19, 2011 7:01:31 AM
“Trust is the foundation of total quality, and trust is made up of both character (what a person is) and competence (what a person does).” -Stephen Covey, Author, 7 Habits of Highly Successful People "Everyone is probably equally [...]
May 11, 2011 12:51:54 PM
The FEP dashboard located on the SCCM console has a wealth of information. It provides FEP admins with a snapshot of the overall health of your FEP deployment and various statistics including recent malware activity, definition st [...]
May 4, 2011 9:00:00 AM
In addition to 3 definition update mechanisms defined in the FEP policy (WSUS,UNC and Windows Update), there is actually a little known 4th update mechanism built into the client. This 4th definition update channel is designed to [...]
May 2, 2011 5:00:55 AM
When deploying Forefront Endpoint Protection, making a few simple changes to your existing Antivirus Software before installing FEP can increase the success of your deployment. Below is a list of tasks:
Apr 28, 2011 10:26:09 AM
Determining a comprehensive view of access rights in a Microsoft network can be a difficult task – as anyone that has undergone a recent audit can attest. The collection and organization of security data into detailed reports can [...]
Apr 25, 2011 11:06:00 AM
Recently, one of our clients had a scenario that required them to keep track of the proxyAddresses attribute history between two Microsoft Active Directory (AD) domains. Since FIM Sync Service doesn’t retain any history of attribu [...]
Apr 21, 2011 4:00:03 AM
Did you miss our FEP Webinar series? A recording is now available in our Media Library
Apr 20, 2011 5:00:58 AM
When undertaking desktop deployment using SCCM, the first task begins after your SCCM Operating System Deployment (OSD) environment is configured and initial planning has been completed. This determines what your baseline image wi [...]
Apr 18, 2011 5:00:16 AM
SHA-1 is a widely adopted hash algorithm that can no longer be considered trustworthy. Current PKI design analysts must weigh the benefits of implementing SHA-2 verses the compatibility problems associated with its adoption. This [...]
Apr 14, 2011 3:20:42 PM
iOS devices such as iPads and iPhones are quickly becoming a part of the enterprise IT landscape, in a trend sometimes referred to as “the consumerization of IT.” From a security practitioner’s standpoint, there are a number of fa [...]
Apr 12, 2011 10:17:00 AM
If you should ever need to administer a local FEP client through CLI you’re going to need to make use of MpCmdRun.exe. This program can be found in the “C:\Program Files\Microsoft Security Client\Antimalware” directory. MpCmdRun h [...]
Apr 7, 2011 4:00:47 AM
I thought I would kick off my entries in our new company blog with a description of the project that lead to CSS winning Microsoft’s prestigious “2010 Core Infrastructure Solutions, Identity & Security Partner of the Year.” The pr [...]
Apr 1, 2011 4:30:00 PM
Out of the box FEP provides several channels for delivering definition updates to clients. The three basic options are, updates through WSUS/SUP, UNC file shares and connecting to Microsoft Updates. The procedure in this video pre [...]
Mar 31, 2011 2:54:14 PM
The Wall Street Journal Reported Monday that one more manufacturer of mobile phones is upping their game when it comes to going after the lucrative business market.
Mar 25, 2011 1:41:00 PM
While FEP has great reporting features available in the SCCM console and through SQL Reporting Services it’s completely possible that you might find yourself attempting to troubleshoot a malware issue without access to either reso [...]
Mar 15, 2011 5:52:40 PM
Certified Security Solutions Achieves Microsoft Gold for Three Competencies; Desktop, Identity & Security, and Virtualization in the Microsoft Partner Network
Feb 18, 2011 4:34:03 PM
Welcome to the new CSS website - more than a facelift, the new site includes our new blog - creating a community and discussion around the IT security issues of the day.
Feb 16, 2011 8:53:12 PM
Microsoft Identity & Security Partner of the Year introduces solution set designed to help drive identity management projects significantly faster and more affordably than previously possible
Jul 23, 2010 2:27:31 PM
Cleveland, Ohio - Today, Certified Security Solutions, Inc., a leading provider of information security services, proudly announced it is a Microsoft Partner Awards winner of Core Infrastructure Solutions, Identity & Security Part [...]
Jul 8, 2010 2:25:01 PM
Cleveland, Ohio - Certified Security Solutions, Inc (CSS), a leading provider of information security services, announces the appointment of Ted Shorter as Chief Technology Officer (CTO). Shorter will be responsible for CSS' Intel [...]
Jun 26, 2009 2:29:53 PM
Today, Certified Security Solutions (CSS) announces it has been selected as a 2009 Microsoft Worldwide Partner Conference Awards finalist for the Security Solutions, Identity and Secure Access category.
Apr 6, 2009 2:30:56 PM
Certified Security Solutions, Inc. (CSS), a leading provider of information security consulting services, unveils the release of a new software offering called the Certificate Management System (CMS). CMS allows organizations to e [...]
Dec 22, 2008 1:31:44 PM
Certified Security Solutions, Inc. (CSS) proudly announced that its board of directors has elected Brian Boruff, currently Vice President of Cloud Computing for Computer Science Corporation (CSC) to join the company's board. Mr. B [...]
Jul 2, 2008 2:32:56 PM
On July 2, 2008, Certified Security Solutions, Inc. (CSS) appointed Kevin von Keyserling, former SVP of Operations, to the position of President and CEO. While in this new role, he will oversee North American Operations for the co [...]
Jun 16, 2008 2:33:36 PM
Today, Certified Security Solutions (CSS) announced it has been selected as a finalist for the Microsoft Partner of the Year award in Security Solutions, Identity and Secure Access.
Apr 9, 2008 2:34:35 PM
Certified Security Solutions, Inc. (CSS), a leading provider of information security consulting services, released another solution pack—a fixed-price rights management application-integration solution for Windows Rights Managemen [...]
Dec 1, 2007 1:35:56 PM
Certified Security Solutions, Inc. (CSS), a leading provider of information security consulting services, marks their expansion along the eastern seaboard with a new office in Boston, MA to promote IT security, compliance and iden [...]
Oct 19, 2007 2:36:23 PM
Certified Security Solutions, Inc. (CSS), a leading provider of Information Security Consulting Services, has been recognized for a third consecutive year by Puget Sound Business Journal as one of the 100 Fastest-Growing Private C [...]
Oct 2, 2007 2:37:13 PM
Certified Security Solutions, Inc. (CSS), a leading provider of information security consulting services, released its fourth Solution Pack today, a fixed-price corporate security application-integration solution for smart cards, [...]
Jul 17, 2007 2:37:53 PM
Certified Security Solutions, Inc. (CSS) proudly announced it has won the Partner of the Year Award for Security Solutions, Infrastructure Security at the 2007 Microsoft Worldwide Partner Program Awards. The company was chosen out [...]
Jun 13, 2007 2:40:43 PM
Expanding Security Services and Market Share in the Pacific Northwest
Dec 20, 2006 1:41:42 PM
Certified Security Solutions, Inc. (CSS), a leading provider of Information Security Consulting Services, was the recipient of two prestigious Microsoft® (MSFT) awards in 2006. As a Microsoft Gold Certified Partner, CSS was recogn [...]
Oct 22, 2006 2:42:26 PM
Certified Security Solutions, Inc. (CSS), a leading provider of Information Security Consulting Services, was recently recognized by Puget Sound Business Journal as one of the 100 Fastest-Growing Private Companies in Washington. T [...]
Jan 24, 2006 1:43:16 PM
ertified Security Solutions, Inc. (CSS), a leading provider of Information Security Consulting Services, has been awarded Microsoft® Gold Certified Partner status, the highest level within the Microsoft Certified Partners Program. [...]