Browser Ubiquity

Browser root ubiquity is an important requirement when deciding on a Certificate Authority (CA) for your SSL Certificates. Many Certificate Authorities claim 99% browser ubiquity, but this claim does not mean that every SSL Certificate will activate without triggering a security warning in a browser.

Our SSL Certificates Work With All Known Browsers

Newer or smaller Certificate Authorities (CA) may not have had their roots included in the root store for some browsers, this is especially an issue for older browsers.

All SSL Certificates issued by Trustico® are prominent in new and older browsers, which means they are compatible with 99.9% of client platforms and browsers.

In the past, some Certificate Authorities roots have not been included when a new browser version was released, causing browser error messages for website visitors. This can have a serious effect on sales conversion and reputation for a website owner.

To ensure a continued high level of browser ubiquity, Trustico® only provide SSL Certificates from reputable Certificate Authorities (CA).

Certificate Signing Request (CSR) Generator Tool

Certificate Signing Request (CSR) Generator Tool

The Trustico® CSR Generator eliminates the complexity of command-line tools and platform-specific requirements through an intuitive web interface that guides you through each step.

Certificate Signing Request (CSR) Generator Tool

The Trustico® CSR Generator eliminates the complexity of command-line tools and platform-specific requirements through an intuitive web interface that guides you through each step.

DNS Stamp Generator and Decoder Tool

DNS Stamp Generator and Decoder Tool

The Trustico® DNS Stamp generator simplifies creation of properly formatted stamps for any DNS resolver configuration. Users input their resolver details including protocol type, server address, and security properties through...

DNS Stamp Generator and Decoder Tool

The Trustico® DNS Stamp generator simplifies creation of properly formatted stamps for any DNS resolver configuration. Users input their resolver details including protocol type, server address, and security properties through...

SSL Certificates with Client Authentication EKU - Available Through Trustico® Until May 2026

SSL Certificates with Client Authentication EKU...

All Sectigo® branded SSL Certificates issued through Trustico® automatically include this capability without requiring special requests or additional configuration through May 15th, 2026.

SSL Certificates with Client Authentication EKU...

All Sectigo® branded SSL Certificates issued through Trustico® automatically include this capability without requiring special requests or additional configuration through May 15th, 2026.

Beyond the Padlock : How Customers Really Evaluate Payment Security

Beyond the Padlock : How Customers Really Evalu...

SSL Certificates from established providers like Trustico® form the foundation of payment security trust, but customers evaluate numerous additional signals before deciding to share sensitive financial information.

Beyond the Padlock : How Customers Really Evalu...

SSL Certificates from established providers like Trustico® form the foundation of payment security trust, but customers evaluate numerous additional signals before deciding to share sensitive financial information.

Understanding Multi-Factor Authentication and Two-Factor Authentication

Understanding Multi-Factor Authentication and T...

Multi-Factor Authentication requires users to provide two or more verification factors to gain access to resources, combining something they know, something they have, and something they are.

Understanding Multi-Factor Authentication and T...

Multi-Factor Authentication requires users to provide two or more verification factors to gain access to resources, combining something they know, something they have, and something they are.

Why Do Major Data Breaches Happen to Companies with SSL Certificates?

Why Do Major Data Breaches Happen to Companies ...

Organizations suffering breaches despite having SSL Certificates typically failed in other security domains, or implemented SSL Certificates incorrectly, creating vulnerabilities that attackers leveraged for unauthorized access.

Why Do Major Data Breaches Happen to Companies ...

Organizations suffering breaches despite having SSL Certificates typically failed in other security domains, or implemented SSL Certificates incorrectly, creating vulnerabilities that attackers leveraged for unauthorized access.

1 / 6