Webinar
Enabling Successful Software Installs with New Digital Signing Standards
Learn how evolving digital signing standards protect software installs from tampering and boost trust.
Original Air Date: June 6, 2025
Overview
Software producers face growing pressure to deliver secure, trusted installations—especially as digital signing standards evolve. In this expert-led webinar, Venkat Ram Donga, Product Management Director at Revenera, and Dave Roche, Director of Product Management at DigiCert, unpack the latest developments in code signing and software authenticity.
You’ll gain a clear understanding of how digital signatures protect your installers from tampering, ensure identity verification, and meet increasingly stringent compliance requirements. Learn why timestamping is critical for long-term trust, and how to navigate the shift away from PFX files toward more secure signing practices. Discover how InstallShield’s custom signing capabilities integrate seamlessly with modern DevOps pipelines, including Azure, to support both public and private trust models.
The session also explores real-world examples, including how outdated signing practices can lead to costly disruptions. Whether you're building desktop applications, embedded software, or enterprise installers, this webinar delivers actionable insights to future-proof your software distribution. Don’t miss this opportunity to hear directly from the teams shaping the future of secure software delivery.
Recap
Key Themes and Takeaways
The Evolving Landscape of Digital Signing Standards
Digital signing has become a cornerstone of secure software installation. As standards evolve, software producers must adapt to new requirements that ensure authenticity, prevent tampering, and maintain trust throughout the software supply chain.
The Role of Code Signing in Software Integrity
Code signing acts as a protective layer for software installers, using cryptographic key pairs to verify origin and integrity. This process ensures that software has not been altered and that it originates from a trusted source, reinforcing user confidence during installation.
Timestamping: Extending Trust Beyond Certificate Expiry
Timestamping allows signed software to remain trusted even after its certificate expires. Without it, legacy binaries may fail validation, leading to costly disruptions. Implementing timestamping is a best practice that extends the lifecycle of signed software and protects long-term deployments.
Transitioning Away from PFX Files
Traditional PFX-based signing methods pose significant security risks, including the potential for certificate theft. New regulations now require certificates to be generated and stored in FIPS-compliant environments, prompting a shift toward more secure signing infrastructures.
Understanding EV Certificates and HSM-Based Signing
Extended Validation (EV) certificates offer higher levels of trust and are required for certain use cases like driver signing. Hardware Security Modules (HSMs) provide secure, non-exportable key storage, aligning with compliance standards and reducing the risk of key compromise.
Public vs. Private Trust Models
Public trust models are ideal for open ecosystems, while private trust models suit internal or partner-based software distribution. Private trust allows organizations to control who can verify and install their software, offering tailored security for closed environments.
Integrating Signing into DevOps Pipelines
Modern signing workflows can be embedded directly into CI/CD pipelines, including Azure DevOps. This integration enables automated, scalable signing processes that align with agile development practices and reduce manual overhead.
Enhancing Software Security with Composition Analysis
Software composition analysis and static binary scanning help identify vulnerabilities in open-source components and build artifacts. These checks prevent compromised software from being signed and distributed, strengthening overall software security.
Preparing for Future Standards and Short-Term Certificates
The industry is moving toward shorter certificate lifecycles and stronger cryptographic algorithms. Proactively managing certificate rotation and key strength is essential for staying ahead of evolving security requirements and maintaining compliance.
Multi-Layered Signing for Installer Security
Secure installation requires signing both individual binaries and the overall installer package. This dual-layer approach ensures compatibility with modern operating systems and enterprise security settings, such as Windows 11 Smart App Control.
Speakers
Dave Roche
Director of Product Management
Digicert
Venkat Ram Donga
Director, Product Management
Revenera
Frequently Asked Questions
Digital code signing is a security process that uses cryptographic certificates to verify the origin and integrity of software. It ensures that the installer hasn’t been tampered with and comes from a trusted source. This builds user trust and helps prevent malware from being disguised as legitimate software. Code signing is especially critical for enterprise environments and modern operating systems that enforce strict security policies.
Timestamping allows signed software to remain trusted even after its signing certificate expires. It records the exact time the software was signed, which helps validate its authenticity long after the certificate’s validity period ends. This is essential for long-lived software deployments, especially in industries like healthcare or embedded systems. Without timestamping, older binaries may fail to install or trigger security warnings.
PFX files store private keys and certificates but are vulnerable to theft if not properly secured. When placed on build servers or shared across teams, they can be accessed by unauthorized users or malicious actors. This can lead to certificate abuse, software tampering, and reputational damage. Modern standards now recommend using FIPS-compliant hardware or cloud-based signing services to mitigate these risks.
Extended Validation (EV) certificates require more rigorous identity verification and offer higher trust levels, especially in environments like Microsoft’s SmartScreen. They are often required for signing drivers and other sensitive software components. Standard certificates are easier to obtain but may not provide the same level of assurance to end users. Choosing between them depends on your software’s distribution model and risk profile.
Code signing can be automated within CI/CD pipelines using custom signing tools or cloud-based APIs. This allows software producers to embed signing into build workflows without manual intervention. Integration with platforms like Azure DevOps ensures that every build is signed securely and consistently. Automating signing helps maintain compliance and reduces deployment delays.
Public trust certificates are recognized across open ecosystems like Windows, macOS, and Linux, making them ideal for consumer-facing software. Private trust certificates are used in closed environments, such as internal enterprise systems or partner networks. They allow organizations to control who can verify and install their software. Choosing the right trust model depends on your distribution strategy and security requirements.
Short-term certificates reduce the risk of long-term key exposure and make it easier to rotate credentials regularly. They align with evolving security standards that favor frequent renewal and stronger cryptographic practices. Software producers can use short-term certificates to isolate signing events and minimize the impact of potential compromises. This approach supports a more agile and secure development lifecycle.
Software composition analysis scans open-source components and dependencies for known vulnerabilities before signing. It helps ensure that installers don’t include outdated or compromised libraries. This proactive check reduces the risk of distributing insecure software and supports compliance with industry regulations. Integrating composition analysis into the signing workflow strengthens overall software integrity.
If a certificate is compromised, it must be revoked immediately to prevent further misuse. This can disrupt software installations and require re-signing and redistribution of affected binaries. Using ephemeral signing practices and timestamping can limit the scope of impact. Software producers should have a certificate lifecycle management strategy to respond quickly to such incidents.
Windows 11 introduces stricter security controls like Smart App Control, which blocks unsigned or suspicious binaries. To ensure compatibility, installers must be signed with trusted certificates and include timestamping. Multi-layered signing—covering both individual binaries and the installer package—is recommended. This helps meet enterprise security standards and ensures smooth deployment across modern Windows environments.
Resources
Webinar
Enabling Successful Software Installs with New Digital Signing Standards
Register for the upcoming webinar and be better equipped you with the knowledge and tools necessary to navigate changes to digital signing standards effectively for a seamless installation experience.
Data Sheet
InstallShield 2024
Nahtlose Builds in der Cloud mit InstallShield-Lizenzfunktionen
Data Sheet
Cloud License Server with InstallShield
Get your questions answered about how to eliminate the time and effort required to set up and manage local License Servers. Easily configure your builds from the DevOps build pipeline with InstallShield’s Cloud License Server.
Online Event
“Unpacking MSIX”: Panel Discussion
Watch this roundtable discussion to learn more about how developers can retain as much code as possible as they continue to innovate and modernize applications.
Webinar
TechTalk: InstallShield “Suite” Secrets
In this TechTalk you’ll learn about Suite, a project type within InstallShield, and how it resolves the problem of installing multiple packages, learn how Windows features in Suite works, and how secure it is to send packages via an installer.
eBook
A Developer’s Guide to MSIX
MSIX represents a new, modern runtime environment intended to protect both your application and end-user systems. This one-of-a-kind book will help you retain as much code as possible while modernizing your applications for containerized packages.
Want to learn more?
Whether you are an existing customer needing assistance, or new to Revenera's Software Installation solutions, we are happy to help out with your Installation needs.