Symantec this week introduced what it calls the Symantec Certificate Intelligence Center, a cloud-based service that works with an on-premises software component to keep track of SSL server certificates used by an organization.HP’s “Secure Boardroom” gives execs online view of organization’s security posture“Every SSL certificate comes with a shelf life, as they expire in one, two or three years,” says Amar Doshi, Symantec senior manager, product management. Symantec Certificate Intelligence Center lets IT managers track both public Web-facing and internally-used certificates in order to act before these certificates expire. The service is similar to one offered by competitor Venafi, he says.In addition, Symantec’s cloud-based service, working in conjunction with the on-premises component, which is available based on Red Hat Linux or VMware-based virtual appliance, can scan to detect so-called “rogue certificates,” Doshi says. Rogue certificates have been discovered in corporate networks because someone at a company went and got them from a certificate authority that was not the usual source, or sometimes this has even been done maliciously. The bottom line is the certificate isn’t officially recorded as in use by the business. The certificate-scanning service would be able to seek them out and report back on them, he says.Symantec last year acquired the VeriSign trust services group for over $1 billion. The Symantec Certificate Intelligence Center service, now in beta, is the first new major product/service roll-out since the time of the acquisition. Read more about wide area network in Network World’s Wide Area Network section. Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe