(ISC)2 Uses PGP
The International Information Systems Security Certification Consortium [(ISC)2] has standardized on the PGP Encryption Platform
PALO ALTO, Calif. -- PGP Corporation, a global leader in enterprise data security and encryption solutions, today announced that the International Information Systems Security Certification Consortium [(ISC)2(R)] has standardized on the PGP(R) Encryption Platform. (ISC)2 is using PGP Universal(TM) for gateway email encryption and PGP(R) Desktop for digital signatures on email communications, helping ensure secure email communications from (ISC)2 to its more than 45,000 certified members worldwide.
(ISC)2 is the non-profit global leader in educating and certifying information security professionals throughout their careers. Since (ISC)2's inception in 1989, it has certified information security professionals from government agencies and companies throughout the world. Several (ISC)2 credentials meet the stringent requirements of ANSI/ISO/IEC Standard 17024, a global benchmark for assessing and certifying security professionals.
"(ISC)2 is committed to information security best practices," commented Stephen Doukas, chief operating officer for (ISC)2. "Our members expect secure communications from (ISC)2. We are pleased to offer them the functionality they demand and the peace of mind secure communications provide." With the first PGP application deployed, organizations like (ISC)2 immediately begin to realize the benefits of the PGP Encryption Platform. Additional PGP solutions leverage this common platform, providing lower operational cost and faster implementation compared to point solutions.
"Security professionals around the world benefit from knowing that messages from (ISC)2 are authentic and secure," said Phillip Dunkelberger, president and CEO, PGP Corporation. "Having one of the most well-respected security organizations use PGP encryption technology reflects growing recognition of the strength of our solutions."
Read more about:
2006About the Author
You May Also Like
Unleashing AI to Assess Cyber Security Risk
Nov 12, 2024Securing Tomorrow, Today: How to Navigate Zero Trust
Nov 13, 2024The State of Attack Surface Management (ASM), Featuring Forrester
Nov 15, 2024Applying the Principle of Least Privilege to the Cloud
Nov 18, 2024The Right Way to Use Artificial Intelligence and Machine Learning in Incident Response
Nov 20, 2024