Offers advanced SSL/TLS certificates that provide secure authentication, protecting financial transactions and user data on corporate treasury websites and applications.
Physical devices such as security tokens, smart cards, and biometric readers that provide multi-factor authentication for payment approvals and system access.
More Secure Authentication Hardware
More Treasury Operations ...
Multi-factor Authentication (MFA) Requiring two or more verification methods for user login (e.g., password, token, biometrics). |
DigiCert Secure Site enables Multi-factor Authentication by supporting certificates for device-based authentication, often used as a second (certificate-based) factor. Common integration enables MFA as part of access to treasury applications. | |
Biometric Authentication Support Ability to use fingerprints, facial recognition, or iris scans for identity verification. |
No information available | |
Hardware Token Integration Support for physical authentication devices such as YubiKeys, smart cards, or OTP tokens. |
PKI smart cards and USB tokens often use DigiCert certificates, supporting hardware token integration. | |
Public Key Infrastructure (PKI) Supports authentication using public/private key pairs and digital certificates. |
PKI (Public Key Infrastructure) is the core of DigiCert Secure Site; it is used for authentication using digital certificates. | |
Single Sign-On (SSO) Allows users to access multiple treasury applications with one set of credentials. |
DigiCert Secure Site certificates are compatible with SSO solutions via SAML or certificate-based authentication. | |
Time-based One-Time Passwords (TOTP) Support for authentication using app-based or hardware-generated time-limited codes. |
DigiCert partners and ecosystem support TOTP (e.g., via integration with tools like Azure AD), making this available. | |
Adaptive Authentication Dynamically adjusts authentication based on risk signals (location, device, time, etc.). |
No information available | |
Device Binding Ability to restrict access to specific pre-authorized devices. |
No information available | |
Knowledge-Based Authentication Enables secondary verification through personal or system-generated questions. |
No information available | |
Transaction Signing Users digitally sign transactions with a hardware device as a distinct action. |
Digital certificate-based transaction signing is supported (core PKI function), often required for authorizing treasury operations. |
Tamper-Resistant Design Hardware features that prevent unauthorized physical access or compromise. |
No information available | |
FIPS 140-2/3 Compliance Hardware certified to Federal Information Processing Standards for cryptographic modules. |
No information available | |
Secure Key Storage Encryption keys are stored in secure hardware modules, not software. |
Secure key storage is part of PKI best practices; DigiCert Secure Site works with HSMs for secure private key storage. | |
Remote Wipe Capability Ability to erase or deactivate devices if lost or stolen. |
No information available | |
Physical Lock Mechanisms Locking or anchoring devices to prevent removal or theft. |
No information available | |
Backup Device Support Allows for quick replacement and setup of a backup device. |
No information available | |
Secure Firmware Updates Updates to device software are cryptographically signed and validated. |
DigiCert Secure Site supports secure firmware and software update mechanisms for hardware security modules (HSMs) via cryptographic signing/validation. | |
Environmental Control Features Ability to withstand variations in temperature, humidity, or mechanical shock. |
No information available | |
Audit Logging Capabilities Logs hardware access and usage details for security review. |
No information available | |
Device Lifespan Average number of years hardware devices are expected to remain operational. |
No information available |
Centralized User Provisioning Manage all user credentials and devices from a central dashboard. |
No information available | |
Role-Based Access Control (RBAC) Assign and enforce user roles and permissions aligned to corporate treasury functions. |
Role-based access to certificate management is included in administrative portal features. | |
Bulk User Enrollment Onboard large groups of users/devices at once. |
DigiCert Certificate Management Platform supports bulk user/certificate enrollment. | |
User Self-Service Device Activation Allow users to securely activate and register new devices on their own. |
No information available | |
Automated Deprovisioning Automatic revocation of credentials and hardware when users leave or change roles. |
No information available | |
Delegated Administration Assign user, device, or location-specific administrators. |
No information available | |
Integration with HR Systems Link user lifecycle management with corporate HR or LDAP directories. |
Integration with common LDAP/AD and HR directory tools for user management and access. | |
Device Assignment Tracking Monitor which devices are issued to which users. |
Certificate lifecycle management allows associating devices to users, tracking which devices/certificates are assigned to whom. | |
User Behavior Analytics Monitor authentication patterns for anomalies or risky behaviors. |
No information available | |
Customizable Lockout Policies Configure thresholds for failed login/device authentication attempts. |
No information available |
APIs for Integration Availability of REST, SOAP, or proprietary APIs for system integration. |
REST APIs are available for certificate lifecycle management and integration into workflows. | |
Support for SAML/OAuth/OpenID Interoperability with modern authentication standards and single sign-on protocols. |
Supports integration with SAML, OAuth, and OpenID Connect via compatible certificate authentication solutions. | |
ERP/TMS Compatibility Can be paired directly with enterprise resource planning or treasury management systems. |
Compatible with leading ERP/TMS platforms through PKI and/or API integration. | |
Plug-and-Play Installation Requires minimal technical effort for setup and deployment. |
Installation and deployment of SSL/TLS certificates can be done via automated integrations or simple DNS/file-based validation for most platforms. | |
Legacy System Support Ability to interface with older, non-standardized treasury applications. |
Supporting legacy protocols and browsers is a DigiCert Secure Site advertised feature. | |
Cloud Service Integration Works seamlessly with cloud-based treasury systems. |
DigiCert Secure Site supports major cloud platforms' certificate lifecycle (AWS, Azure, GCP), key for treasury system cloud integrations. | |
Mobile App Integration Seamless functioning with treasury mobile apps and devices. |
No information available | |
Custom Integration Tools SDKs, connectors, or middleware available for bespoke system integration. |
SDKs and API connectors for integration into in-house or bespoke systems are part of the DigiCert developer portal. | |
Multi-Platform Compatibility Works across Windows, MacOS, Linux and mobile operating systems. |
Supports all major server and client platforms and browsers including Windows, MacOS, Linux, and mobile platforms. | |
API Request Rate Limit Maximum supported API calls per second. |
No information available |
GDPR Compliance Adherence to regulations on data privacy and user consent. |
DigiCert states GDPR compliance with respect to handling and storage of personal information for certificate holders. | |
SOX Compliance Aligns with Sarbanes-Oxley requirements for financial controls and reporting. |
DigiCert enables SOX-compliant controls through certificate-based authentication and audit trails for financial access. | |
PSD2/SCA Support Meets Payment Services Directive/Strong Customer Authentication mandates. |
No information available | |
Audit Trail Retention Period Length of time audit records are stored and accessible. |
No information available | |
Custom Policy Enforcement Ability to enforce geographic, business unit, or regulatory-specific access policies. |
Custom certificate issuance policies (e.g., by country, group, or unit) may be enforced via certificate policy extensions. | |
Independent Security Certification Certified by an independent authority (e.g., ISO, Common Criteria). |
DigiCert Secure Site SSL/TLS certificates are certified by independent authorities (WebTrust, EV and OV validation). | |
Real-Time Compliance Reporting Instant generation of compliance and access audit reports. |
Compliance and audit reports for certificate status/activity can be generated on demand from DigiCert admin consoles. | |
E-signature Legality Electronic signatures via hardware tokens are legally enforceable. |
E-signatures based on trusted PKI (as offered by DigiCert) are widely legally recognized in US, EU, and APAC for digital transactions. | |
Data Residency Controls Manage where user/device data is physically stored according to regulations. |
No information available | |
Customizable Retention Policies Configurable rules for data and log retention per compliance requirements. |
No information available |
Quick Authentication Time Average time required for user authentication using hardware devices. |
No information available | |
Self-Service Recovery Enables users to recover or reset access in case of lost or damaged devices. |
Lost certificate/device recovery and re-issuance is supported via DigiCert management dashboards and support. | |
Multi-Language Support Interfaces and instructions available in several languages. |
DigiCert support documentation and platform are available in multiple languages to meet global corporate needs. | |
User Training Materials Provision of digital and physical training resources for users. |
Extensive user/admin documentation and training guides are provided and updated online. | |
Accessibility Features Designed to be usable by people with disabilities. |
No information available | |
Minimal User Prompts Low number of required user interactions per authentication. |
No information available | |
Customizable Alerts Configurable notifications for transactions, logins, and policy violations. |
Customizable notification and alerting for expiry, new issuance, and policy events are supported in the admin dashboard. | |
Support for Remote/HQ Users Designed for both on-site and distributed workforce scenarios. |
DigiCert solutions are used by distributed and remote/hybrid corporate workforces globally. | |
Out-of-the-Box Configuration Templates Pre-built configurations for rapid deployment. |
DigiCert provides best practice templates and default certificate policy bundles for rapid onboarding. | |
Clear Error Messaging Descriptive messages and troubleshooting guidance when authentication fails. |
Admin dashboards and user guides provide clear error messages with extensive troubleshooting instructions. |
Backup Authentication Methods Alternative authentication available if hardware is lost/unavailable. |
Multiple factors (device, TOTP, backup codes) can be configured for user authentication if certificates are lost/unavailable. | |
Service Uptime Percentage of time the authentication service is available. |
No information available | |
Disaster Recovery Capabilities Ability to recover full authentication services after critical events. |
Infrastructure and managed service options include disaster recovery for digital certificate services. | |
Redundant Data Centers Multiple geographically dispersed facilities to ensure uninterrupted service. |
DigiCert maintains redundant global data centers to ensure PKI service continuity, as described in their enterprise documentation. | |
Onsite Hardware Replacement Time Typical maximum elapsed time to replace failed hardware. |
No information available | |
Distributed Load Handling Ability to handle authentication loads from multiple locations concurrently. |
PKI services can be accessed and managed from multiple locations simultaneously (e.g., for distributed treasury teams). | |
Periodic Health Checks Regular automatic tests and monitoring of hardware and authentication processes. |
No information available | |
Automatic Failover Processes automatically switch to backup hardware or methods if primary fails. |
Cloud and managed DigiCert PKI solutions can automatically failover in case of site/service failure. | |
Maintenance Notification Automated user alerts about upcoming or ongoing maintenance windows. |
System admins can schedule and notify end-users of maintenance windows via DigiCert's admin/portal. | |
Capacity for Concurrent Authentications Maximum number of concurrent authentication sessions supported. |
No information available |
Maximum Supported Users Largest number of users the solution can handle effectively. |
No information available | |
Maximum Supported Devices Total number of unique hardware authentication devices supported concurrently. |
No information available | |
Elastic Resource Allocation The system resources can automatically scale up or down based on demand. |
DigiCert platforms are cloud-based and can auto-scale authentication and certificate management resources. | |
Load Balancing Support Distributes authentication traffic for optimal performance. |
Load balancing and global distribution are offered through DigiCert cloud PKI infrastructure. | |
Low Latency Authentication Minimal average time for completing authentication transactions, even at scale. |
No information available | |
Concurrent Hardware Update Support Can update firmware/settings across multiple devices simultaneously. |
DigiCert Command or similar tools allow for firmware/certificate updates to hundreds/thousands of devices in parallel. | |
Batch Device Management Ability to manage device settings and permissions in bulk. |
Bulk device/certificate management is native to DigiCert's enterprise solutions. | |
Multi-Site Support Facilitates centralized management across distributed corporate locations. |
Supports certificate/device/account management across multiple distributed corporate locations. | |
Distributed Workforce Scalability Suitable for both centralized headquarters and remote treasury teams. |
Cloud-based DigiCert PKI solutions are designed to support distributed workforce scenarios. | |
Peak Hour Performance Lowest average authentication time during the busiest periods. |
No information available |
Real-Time Authentication Monitoring Ongoing visibility into who is accessing what, when, and how. |
Admin and SIEM integration features allow for real-time monitoring of certificate/device authentication events. | |
Automated Alerting for Suspicious Activity Immediate alerts for anomalous login attempts or policy violations. |
Event logging and SIEM integration support automated alerting for suspicious certificate or access activity. | |
Integration with SOC/SIEM Tools Feeds authentication logs and alerts into security operations centers. |
Authentication and event logs can be exported to SIEM/SOC platforms for central incident management. | |
Automated Threat Response Initiates automated steps (lockouts, alerts, device disable) upon detection of certain threats. |
Some integrations can automatically trigger credential lockouts or alerts if malicious/compromised certificate activity is detected. | |
Forensic Data Collection Collect and retain data for post-incident investigations. |
Certificate event logging and access records allow forensics or post-incident review. | |
Threat Intelligence Integration Leverages real-time feeds to update threat detection criteria. |
No information available | |
Incident Response Playbooks Pre-defined procedures for handling specific authentication threats. |
No information available | |
User Notification on Compromise Notifies users immediately if their credentials or devices are at risk. |
Alerting and notification options are in place to inform certificate owners/users of risk or issuance of suspect certificates. | |
Manual Override Capabilities Allows authorized personnel to override automated locks if needed under strict control. |
No information available | |
Incident Response Time Average time to detect and respond to a security incident. |
No information available |
Transparent Pricing Model Clearly defined fees for hardware, support, and licensing. |
DigiCert pricing and license tiers for enterprise management are clearly published online. | |
Hardware Replenishment Costs Typical per-device cost for replacement or additional units. |
No information available | |
Support and Maintenance Fees Recurring cost for ongoing vendor support and device upkeep. |
No information available | |
Pay-as-You-Go Options Pricing flexibility to scale with actual usage, not fixed licenses. |
No information available | |
Volume Discount Availability Discounts applied for purchasing large numbers of devices. |
Volume discounts are available for DigiCert Secure Site certificates as published in corporate/enterprise pricing. | |
Included Software Updates Software/firmware updates are included in licensing/package fees. |
Standard software/firmware updates are included in Secure Site certificate/service subscription. | |
Trial/Evaluation Hardware Availability of trial devices for hands-on evaluation before purchase. |
Evaluation/trial DigiCert certificates are available for proof-of-concept and initial integration. | |
Flexible Contract Duration Ability to negotiate terms of service, e.g., annual or multi-year. |
Both annual and multi-year certificate terms are available for enterprise customers. | |
Total Cost of Ownership Tools Tools for projecting and understanding all long-term ownership costs. |
No information available | |
Third-Party Hardware Support Supports a variety of vendor devices, not just proprietary options. |
DigiCert can be used with a variety of third-party security hardware, not limited to proprietary HSMs or tokens. |
24/7 Technical Support Round-the-clock assistance from vendor support teams. |
24/7 technical support included with Secure Site enterprise offerings as indicated on DigiCert's support pages. | |
Comprehensive Documentation Extensive user and administrator guides with troubleshooting. |
Comprehensive admin and user documentation and guides are available online and via customer portal. | |
Dedicated Account Manager Named support resource for ongoing partnership and escalation. |
High-tier DigiCert customers have access to a named account manager for escalations and partnership. | |
Custom SLAs Option to negotiate Service Level Agreements for uptime, support speed, etc. |
Custom SLAs (including uptime and issue response) can be negotiated in enterprise contracts. | |
Customer Training Services Provision of onboarding and specialist training for treasury staff. |
Training services are available for DigiCert enterprise/treasury customers as an added service. | |
Local/Regional Technical Presence Access to in-region expertise and hardware support. |
DigiCert lists global and regional technical presence capabilities for enterprise support and on-site services. | |
Community and User Forums Active information-sharing spaces for users and admins. |
User community and guidance forums are available for administrators and corporate customers. | |
Automated Ticketing System Structured, trackable process for raising and resolving issues. |
All support cases are tracked via a ticketing system when submitted through the customer/admin portal. | |
Proactive End-of-Life Notifications Alerts about support and update discontinuation for hardware models. |
DigiCert proactively alerts customers to certificate end-of-life (expiration/renewal) and hardware support deadlines. | |
Onsite Support Availability Ability to request onsite engineer visits for urgent incidents. |
Onsite hardware support for PKI deployments can be requested as part of enterprise/managed solutions. |
This data was generated by an AI system. Please check
with the supplier. While you are talking to them, remind them that they need
to update their entry.