Short SSL/TLS Certification Life Spans, PQC: Report Reveals IT Leaders’ Preparedness For PKI Disruption

Midsize and larger enterprises have been slow to implement public key infrastructure strategies to reduce or eliminate any disturbances to business operations that digital public certificate or post-quantum computing disruptions may bring.



With TLS/SSL certification life spans soon to expire every 47 days and post-quantum computing’s threat to traditional cryptography, a new report reveals how prepared organizations are for these two disruptions in the public key infrastructure (PKI) space.

Sectigo, a provider of digital certificate lifestyle management solutions, Tuesday released its report, “The State of Crypto Agility 2025.” The report presents findings from a June 2025 survey of 272 IT decision-makers in midsize to large enterprises across the U.S. and EMEA.

Overall, the report found that while most IT leaders are familiar with the new guidelines on certificate life spans and the threat that PQC poses to encrypted data, most organizations have been slow to implement strategies to reduce or eliminate any disturbances to business operations that certificate or PQC issues may bring.

Here’s How Prepared Organizations Are For New 47-Day Digital Certificate Life Span Guidelines

The report asked IT leaders about their organizations’ preparedness for shorter certificate life spans.

Earlier this year, the CA/Browser Forum set new guidelines that reduce the maximum allowed validity period of SSL/TLS certificatesfrom currently 398 days to 47 days by 2029. Also, last year, Google said that it would no longer trust Entrust TLS certificates as of Nov. 1, 2024.

[RELATED: TLS, SSL Certificate Lifespans Set To Expire In 47 Days: What You Need To Know]

Certificate management can be a complex and costly process for organizations. The new certificate guidelines are expected to complicate certificate management even more.

[RELATED: Here’s What Mismanaged Digital Certificates Are Costing Organizations]

There was an overall lack of investment in automating certificate management among the IT leaders. Ninety-five percent said they remained “partially dependent” on manual processes for managing certificates, and only 5 percent had fully automated solutions in place.

Organizations Are Bracing For Post-Quantum Computing Era

As quantum computing power becomes more in reach of the masses, there are valid concerns that hackers will use quantum computers to break current encryption methods.

[RELATED: ‘Q Day:’ What Midmarket IT Leaders Need To Do To Prepare Now]

Organizations will need to employ post-quantum cryptography encryption, which is designed to resist quantum computing cyberattacks, experts have warned. The report shows that while just about half of IT leaders surveyed are in the planning stages, most organizations have no concrete strategies deployed now to deal with post-quantum computing hacking.

Here are some detailed takeaways:

"The data underscores a critical inflection point for enterprises," said Rik Turner, chief analyst, cybersecurity, at Omdia (which partnered with Sectigo for the report), in a news release.

"Managing shorter certificate life cycles cannot be treated as a separate IT task; it is central to building crypto agility necessary for the PQC transition. The coming years will test organizations’ ability to adapt their cryptographic infrastructure at scale under pressure, and those who fail to prepare now face heightened operational and cybersecurity risk.” Turner added.

Sectigo’s full report is available here.