Browser Ubiquity

Browser root ubiquity is an important requirement when deciding on a Certificate Authority (CA) for your SSL Certificates. Many Certificate Authorities claim 99% browser ubiquity, but this claim does not mean that every SSL Certificate will activate without triggering a security warning in a browser.

Our SSL Certificates Work With All Known Browsers

Newer or smaller Certificate Authorities (CA) may not have had their roots included in the root store for some browsers, this is especially an issue for older browsers.

All SSL Certificates issued by Trustico® are prominent in new and older browsers, which means they are compatible with 99.9% of client platforms and browsers.

In the past, some Certificate Authorities roots have not been included when a new browser version was released, causing browser error messages for website visitors. This can have a serious effect on sales conversion and reputation for a website owner.

To ensure a continued high level of browser ubiquity, Trustico® only provide SSL Certificates from reputable Certificate Authorities (CA).

SSL Certificate : What You Need to Know About Encryption and Security

SSL Certificate : What You Need to Know About E...

Encryption is a cornerstone of online security, and SSL Certificates are the key to implementing encryption on websites. When an SSL Certificate is installed on a web server, it enables...

SSL Certificate : What You Need to Know About E...

Encryption is a cornerstone of online security, and SSL Certificates are the key to implementing encryption on websites. When an SSL Certificate is installed on a web server, it enables...

Certificate Signing Request (CSR) Generator Tool

Certificate Signing Request (CSR) Generator Tool

The Trustico® CSR Generator eliminates the complexity of command-line tools and platform-specific requirements through an intuitive web interface that guides you through each step.

Certificate Signing Request (CSR) Generator Tool

The Trustico® CSR Generator eliminates the complexity of command-line tools and platform-specific requirements through an intuitive web interface that guides you through each step.

DNS Stamp Generator and Decoder Tool

DNS Stamp Generator and Decoder Tool

The Trustico® DNS Stamp generator simplifies creation of properly formatted stamps for any DNS resolver configuration. Users input their resolver details including protocol type, server address, and security properties through...

DNS Stamp Generator and Decoder Tool

The Trustico® DNS Stamp generator simplifies creation of properly formatted stamps for any DNS resolver configuration. Users input their resolver details including protocol type, server address, and security properties through...

SSL Certificates with Client Authentication EKU - Available Through Trustico® Until May 2026

SSL Certificates with Client Authentication EKU...

All Sectigo® branded SSL Certificates issued through Trustico® automatically include this capability without requiring special requests or additional configuration through May 15th, 2026.

SSL Certificates with Client Authentication EKU...

All Sectigo® branded SSL Certificates issued through Trustico® automatically include this capability without requiring special requests or additional configuration through May 15th, 2026.

Beyond the Padlock : How Customers Really Evaluate Payment Security

Beyond the Padlock : How Customers Really Evalu...

SSL Certificates from established providers like Trustico® form the foundation of payment security trust, but customers evaluate numerous additional signals before deciding to share sensitive financial information.

Beyond the Padlock : How Customers Really Evalu...

SSL Certificates from established providers like Trustico® form the foundation of payment security trust, but customers evaluate numerous additional signals before deciding to share sensitive financial information.

Understanding Multi-Factor Authentication and Two-Factor Authentication

Understanding Multi-Factor Authentication and T...

Multi-Factor Authentication requires users to provide two or more verification factors to gain access to resources, combining something they know, something they have, and something they are.

Understanding Multi-Factor Authentication and T...

Multi-Factor Authentication requires users to provide two or more verification factors to gain access to resources, combining something they know, something they have, and something they are.

1 / 6