{"id":4142,"date":"2019-06-12T14:33:16","date_gmt":"2019-06-12T14:33:16","guid":{"rendered":"https:\/\/heliview.be\/cyber-security-summit\/?p=4142"},"modified":"2020-02-07T12:03:24","modified_gmt":"2020-02-07T12:03:24","slug":"digital-signatures","status":"publish","type":"post","link":"https:\/\/heliview.com\/cyber-resilience-belgium\/digital-signatures\/","title":{"rendered":"Building Digital Signatures into Document Platforms"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row][vc_column width=&#8221;2\/3&#8243;][vc_column_text]\n<h2>Don\u2019t DIY, Take It to the Cloud<\/h2>\n<p>Regulations like\u00a0<a href=\"https:\/\/www.globalsign.com\/en\/blog\/what-is-eidas\/\">eIDAS<\/a>,\u00a0<a href=\"https:\/\/www.globalsign.com\/en\/blog\/what-is-cfr-21-part-11\/\">FDA CFR 21 Part 11<\/a>, and\u00a0<a href=\"https:\/\/www.globalsign.com\/en\/blog\/translating-state-digital-signature-requirements-architecture-engineering-construction\/\">US state architecture and engineering requirements<\/a>\u00a0are putting a spotlight on the need for trust and identity in electronic transactions. As a result, the demand for trusted, high assurance digital signatures<!--more--> has never been higher and companies are turning to, and expecting, their document workflow or digital transaction management providers to offer this capability directly within their existing platforms.<\/p>\n<p>The customers want Trusted Digital Signatures; the service providers want to\u00a0<em>provide<\/em>\u00a0them\u2026but how to do it? For years, the most common option for adding digital signatures into a document platform was to piece together the complex cryptographic components you\u2019d need and basically build the integration in-house. Those components include:<\/p>\n<ul>\n<li><strong>The signing certificates<\/strong>\u00a0\u2013 issued to the verified signers\u2019 identities, these are used to apply the signature.<\/li>\n<li><strong>Revocation services (e.g. OCSP, CRL)<\/strong>\u00a0\u2013 these check the status\/validity of the signing certificates<\/li>\n<li><strong>Timestamping services<\/strong>\u00a0\u2013 rather than relying on the local system clock, a third party\u00a0<a href=\"https:\/\/www.globalsign.com\/en\/blog\/what-is-timestamping-how-does-it-work\/\">timestamp<\/a>\u00a0can be embedded in the signature to provide greater assurance about when the signature was actually applied. This is not technically required to apply a digital signature, but is often needed to meet industry, legal or other regulatory compliance.<\/li>\n<li><strong>Cryptographic hardware &#8211;\u00a0<\/strong>(usually hardware security modules [HSMs] either located and maintained on-premises or hosted by a third party) for storing and protecting the private keys of the signers.<\/li>\n<li><strong>Staff with cryptographic and PKI expertise<\/strong>\u00a0&#8211; to set up and maintain the integrations and hardware.<\/li>\n<\/ul>\n<p>Each of these components would need to be separately sourced with separate API calls back to your platform each time a signature is applied (see example diagram below). And this requires good cryptographic knowledge to set this up.<\/p>\n<p>A cloud-based service can deliver all the components you need to easily deploy digital signatures in your platform without any upfront hardware investment or complex development, while also providing scalability and flexibility and assuring compliance and security.\u00a0<a href=\"https:\/\/www.globalsign.com\/en\/digital-signatures\/\">GlobalSign\u2019s new Digital Signing Service<\/a>\u00a0(DSS) does exactly this \u2013 providing everything you need to integrate digital signatures with one REST API call. There is no need to separately source and set up individual integrations for everything back to your platform. We are truly changing how to enable digital signature capabilities in any workflow offering.<\/p>\n<p>It simplifies the integration between the cryptographic components and your platform, which saves internal development resources and eliminates the need for internal PKI expertise, the cloud-based\u00a0<a href=\"https:\/\/www.globalsign.com\/en\/digital-signatures\/\">DSS<\/a>\u00a0also offers greater flexibility with signing identities, allows for future growth and scaling. Removes the responsibility of private key management from the service provider, ensures high availability by default\u00a0and keeps you in line with the latest best practices\/baseline requirements.<\/p>\n<p>The value of integrating digital signatures into your document platform is clear \u2013 make it easy for your customers to add trusted, compliant signatures to their workflows \u2013 but you shouldn\u2019t have to be a PKI or crypto expert to be able to do so.[\/vc_column_text]<div class=\"lgx-brand-btn-area text-left\">\r\n                    <a class=\"lgx-btn btn-df  lgx-btn-brand\" href=\"\/cyber-security-summit\/tickets\" target=\"_self\"><span>Get your admission ticket<\/span><\/a>\r\n                    \r\n               \r\n                <\/div>[\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_wp_search][vc_wp_posts title=&#8221;More news&#8221; number=&#8221;3&#8243;]<div class=\"wpb-content-wrapper\">[vc_row][vc_column][vc_raw_html]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[\/vc_raw_html][\/vc_column][\/vc_row]\n<\/div>[\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Don\u2019t DIY, Take It to the Cloud Regulations like\u00a0eIDAS,\u00a0FDA CFR 21 Part 11, and\u00a0US state architecture and engineering requirements\u00a0are putting a spotlight on the need for trust and identity in electronic transactions. As a result, the demand for trusted, high assurance digital signatures<\/p>\n","protected":false},"author":2,"featured_media":5048,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[13,26],"tags":[],"class_list":["post-4142","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-congres-update","category-home"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>Building Digital Signatures into Document Platforms - Cyber Resilience Conference<\/title>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/digital-signatures\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Building Digital Signatures into Document Platforms - Cyber Resilience Conference\" \/>\r\n<meta property=\"og:description\" content=\"Don\u2019t DIY, Take It to the Cloud Regulations like\u00a0eIDAS,\u00a0FDA CFR 21 Part 11, and\u00a0US state architecture and engineering requirements\u00a0are putting a spotlight on the need for trust and identity in electronic transactions. As a result, the demand for trusted, high assurance digital signatures\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/heliview.com\/cyber-resilience-belgium\/digital-signatures\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Cyber Resilience Conference\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/HeliviewCT\" \/>\r\n<meta property=\"article:published_time\" content=\"2019-06-12T14:33:16+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2020-02-07T12:03:24+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2019\/04\/cloud.jpg\" \/>\r\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\r\n\t<meta property=\"og:image:height\" content=\"350\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:creator\" content=\"@HeliviewConf\" \/>\r\n<meta name=\"twitter:site\" content=\"@HeliviewConf\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/digital-signatures\/\",\"url\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/digital-signatures\/\",\"name\":\"Building Digital Signatures into Document Platforms - Cyber Resilience Conference\",\"isPartOf\":{\"@id\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/digital-signatures\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/digital-signatures\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2019\/04\/cloud.jpg\",\"datePublished\":\"2019-06-12T14:33:16+00:00\",\"dateModified\":\"2020-02-07T12:03:24+00:00\",\"author\":{\"@id\":\"\"},\"breadcrumb\":{\"@id\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/digital-signatures\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/heliview.com\/cyber-resilience-belgium\/digital-signatures\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/digital-signatures\/#primaryimage\",\"url\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2019\/04\/cloud.jpg\",\"contentUrl\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2019\/04\/cloud.jpg\",\"width\":1140,\"height\":350,\"caption\":\"logo cloud\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/digital-signatures\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Building Digital Signatures into Document Platforms\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/#website\",\"url\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/\",\"name\":\"Cyber Resilience Conference\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Building Digital Signatures into Document Platforms - Cyber Resilience Conference","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/heliview.com\/cyber-resilience-belgium\/digital-signatures\/","og_locale":"en_US","og_type":"article","og_title":"Building Digital Signatures into Document Platforms - Cyber Resilience Conference","og_description":"Don\u2019t DIY, Take It to the Cloud Regulations like\u00a0eIDAS,\u00a0FDA CFR 21 Part 11, and\u00a0US state architecture and engineering requirements\u00a0are putting a spotlight on the need for trust and identity in electronic transactions. As a result, the demand for trusted, high assurance digital signatures","og_url":"https:\/\/heliview.com\/cyber-resilience-belgium\/digital-signatures\/","og_site_name":"Cyber Resilience Conference","article_publisher":"https:\/\/www.facebook.com\/HeliviewCT","article_published_time":"2019-06-12T14:33:16+00:00","article_modified_time":"2020-02-07T12:03:24+00:00","og_image":[{"width":1140,"height":350,"url":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2019\/04\/cloud.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@HeliviewConf","twitter_site":"@HeliviewConf","twitter_misc":{"Written by":"","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/heliview.com\/cyber-resilience-belgium\/digital-signatures\/","url":"https:\/\/heliview.com\/cyber-resilience-belgium\/digital-signatures\/","name":"Building Digital Signatures into Document Platforms - Cyber Resilience Conference","isPartOf":{"@id":"https:\/\/heliview.com\/cyber-resilience-belgium\/#website"},"primaryImageOfPage":{"@id":"https:\/\/heliview.com\/cyber-resilience-belgium\/digital-signatures\/#primaryimage"},"image":{"@id":"https:\/\/heliview.com\/cyber-resilience-belgium\/digital-signatures\/#primaryimage"},"thumbnailUrl":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2019\/04\/cloud.jpg","datePublished":"2019-06-12T14:33:16+00:00","dateModified":"2020-02-07T12:03:24+00:00","author":{"@id":""},"breadcrumb":{"@id":"https:\/\/heliview.com\/cyber-resilience-belgium\/digital-signatures\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/heliview.com\/cyber-resilience-belgium\/digital-signatures\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/heliview.com\/cyber-resilience-belgium\/digital-signatures\/#primaryimage","url":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2019\/04\/cloud.jpg","contentUrl":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2019\/04\/cloud.jpg","width":1140,"height":350,"caption":"logo cloud"},{"@type":"BreadcrumbList","@id":"https:\/\/heliview.com\/cyber-resilience-belgium\/digital-signatures\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/heliview.com\/cyber-resilience-belgium\/"},{"@type":"ListItem","position":2,"name":"Building Digital Signatures into Document Platforms"}]},{"@type":"WebSite","@id":"https:\/\/heliview.com\/cyber-resilience-belgium\/#website","url":"https:\/\/heliview.com\/cyber-resilience-belgium\/","name":"Cyber Resilience Conference","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/heliview.com\/cyber-resilience-belgium\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":""}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-json\/wp\/v2\/posts\/4142","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-json\/wp\/v2\/comments?post=4142"}],"version-history":[{"count":33,"href":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-json\/wp\/v2\/posts\/4142\/revisions"}],"predecessor-version":[{"id":5081,"href":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-json\/wp\/v2\/posts\/4142\/revisions\/5081"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-json\/wp\/v2\/media\/5048"}],"wp:attachment":[{"href":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-json\/wp\/v2\/media?parent=4142"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-json\/wp\/v2\/categories?post=4142"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-json\/wp\/v2\/tags?post=4142"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}