Solved

what is the differance between the different type of SSL certificates availble

Posted on 2008-06-13
2
289 Views
Last Modified: 2010-03-05
i have been trying to work this out for a while but really dont understand what the differance between a low cost SSL and some of the more expensive ones is.

like geo trust have their Quick SSL
SSL premium
True business ID
and lots more

the pricing can vary from $10 upwards why??
0
Comment
Question by:ctbhost
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 18

Accepted Solution

by:
PowerIT earned 500 total points
ID: 21784695
The difference is not in the certificate itself, but in the processes and services around it:
- The validation and verification process can be verify diferent and have a different value, e.g. a telephone verification process is cheaper but has less value (because it is easier to spoof) then the more rigid procedures.
- The given warranties differ.
- With or without the ability to show site seals (with or without company logo) makes a difference in price.
- Possibility to have multi year certificates, compared to yearly renewal.
- AICPA compliance or not (http://infotech.aicpa.org/Resources/System+Security+and+Reliability/System+Reliability/Trust+Services/)
- ...

J.
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Samsung dvr sdr-5102n2t not working 7 57
endpoint protection and patch status - SCCM 3 66
Database (Access Table) Security Access 8 54
Problem to setting 16 43
Many businesses neglect disaster recovery and treat it as an after-thought. I can tell you first hand that data will be lost, hard drives die, servers will be hacked, and careless (or malicious) employees can ruin your data.
I was prompted to write this article after the recent World-Wide Ransomware outbreak. For years now, System Administrators around the world have used the excuse of "Waiting a Bit" before applying Security Patch Updates. This type of reasoning to me …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question