Red Sift’s Quarterly Product Release, Winter 2026

This Winter, Red Sift Certificates introduces Private PKI Monitoring, expanding certificate visibility beyond the public internet and into private networks and internal environments. This release helps teams close long-standing visibility gaps in private PKI and manage certificates more consistently across modern, hybrid infrastructure.

In addition to this update, we’ve also delivered improvements to Red Sift OnDMARC, including:

  • Improvements to DMARC Reports that reduce noise and make it easier to investigate authentication results and maintain enforcement.
  • New threat-based event feeds via Event Hub, enabling DMARC intelligence to be streamed directly into SIEMs and security workflows for faster detection and response.

Red Sift Certificates

Introducing Private PKI Monitoring: Closing blind spots in certificate management

Private certificates deployed inside private networks are not visible to Certificate Transparency logs or public internet scanning, yet they underpin critical internal services, applications, and infrastructure.

The risks are fundamentally the same as those in public PKI, including expired certificates, broken trust chains, and unexpected issuance, but are often more acute in private environments. Internal certificate issuance is typically less constrained, ownership is harder to establish, and large enterprises may be managing orders of magnitude more certificates across internal systems.

Private PKI Monitoring in Red Sift Certificates brings these internal certificates into view by allowing teams to discover and monitor them alongside publicly exposed certificates, using the same inventory and workflows already in place.

By combining on-premise scanning with existing discovery capabilities, internal certificates, including those issued by private CAs and deployed on internal hosts, are surfaced in a single inventory. The result is consistent visibility across public and private environments, without relying on manual tracking or fragmented processes.


“By using the Private PKI Agent in Red Sift Certificates, we were able to discover active internal certificates we believed had already been decommissioned, including expired ones still in use. That level of visibility is exactly what we need to avoid blind spots in our PKI environment.”

Martin Tierney, IT Infrastructure Administrator at William Fry LLP

Why it matters

Public certificate discovery relies heavily on Certificate Transparency logs, which provide visibility into certificates issued for internet-facing services. Private PKI certificates used inside private networks, however, are not recorded in CT logs and cannot be discovered through external scanning.

As a result, private PKI often depends on manual tracking or static documentation to understand where certificates are deployed and which trust anchors apply. As environments scale and change, this approach becomes difficult to maintain, creating blind spots that increase the risk of expired certificates, broken trust chains, and service disruption.

How private PKI monitoring in Red Sift Certificates works 

Customers deploy lightweight scanning agents within their private infrastructure, where they can safely discover internal hosts and the certificates deployed on them. These findings are then securely integrated into the same inventory used to track publicly exposed certificates, providing a single, unified view of certificate usage across environments.

Each certificate is tagged with its discovery source, making it clear whether it was observed via public transparency logs, network scanning, private infrastructure, or seen across multiple sources. This context helps teams quickly distinguish internal assets from internet-facing ones and understand where visibility gaps previously existed.

See it in action

Private PKI Monitoring is enabled by default for existing Red Sift Certificates customers. To see it in action and learn how to prepare for broader PKI ecosystem changes in 2026, join the Red Sift webinar on February 25, 2026.

High-assurance certificate transparency monitoring

Red Sift Certificates strengthens Certificate Transparency monitoring by helping teams distinguish expected certificate issuance from genuine misissuance with a higher degree of confidence.

By accounting for known-good certificates identified through integrations and API uploads, the application isolates the certificates that remain. When fully configured, any certificates outside this known set can be treated as true misissuances, rather than noise that requires manual validation.

Teams are alerted when a certificate has not been explicitly endorsed within a defined time window, allowing them to investigate unexpected issuance early. Alerting can also be scoped to high-value domains, ensuring attention is focused where the risk and impact are greatest.

Read more on this subject in the dedicated guide by Ivan Ristic, Red Sift’s Chief Scientist, and author of “Bulletproof TLS and PKI,” the de facto SSL/TLS and PKI reference manual.

Red Sift OnDMARC

DMARC Reports improvements

We’ve made a series of targeted improvements to DMARC Reports to help teams reach and maintain p=reject faster, with less noise and less manual analysis.

These updates are designed to make it easier to answer the two questions that matter most when reviewing DMARC data: are your authorized sources behaving as expected, and is there anything new you need to investigate?

Clearer, more complete results

DMARC Reports now surface a full view of authentication outcomes, not just failures. By showing passes and failures together, and grouping related SPF and DKIM signals, it’s easier to understand what’s working, what isn’t, and why, without jumping between views or exporting data.

Faster investigation with focused filtering

Quick filters make it easy to narrow in on the results you care about, whether you’re validating successful authentication or digging into a specific issue. This reduces time spent scanning large datasets and helps teams move from insight to action more quickly.

A more structured view of email sources

The sources table has been reorganized to prioritize relevance and reduce clutter, bringing the most important sources and summary statistics into clearer focus. This makes it easier to assess the health of known senders while keeping an eye on anything that may require review.

Threat feeds via Event Hub

To help security teams act on email threats more quickly, OnDMARC now surfaces additional threat-based events through the Event Hub capability. These events allow DMARC intelligence to be streamed directly into your SIEM or broader security tooling for correlation and response.

Forensics events offer detailed visibility into emails that fail DMARC authentication, often serving as an early indicator of phishing activity targeting employees, customers, or suppliers.

At an aggregate level, threat and probable-threat events can be used to alert teams to suspicious sending behaviour associated with known or suspected threats, helping surface patterns that may warrant investigation.

By ingesting these events into your existing security workflows, teams can take proactive steps to reduce risk, for example, identifying and blocking malicious URLs or email infrastructure before they can be used to deliver phishing attacks.

PUBLISHED BY

Francesca Rünger-Field

22 Jan. 2026

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
Product Release

Red Sift’s Quarterly Product Release, Winter 2026

Francesca Rünger-Field

This Winter, Red Sift Certificates introduces Private PKI Monitoring, expanding certificate visibility beyond the public internet and into private networks and internal environments. This release helps teams close long-standing visibility gaps in private PKI and manage certificates more consistently across modern, hybrid infrastructure. In addition to this update, we’ve also delivered improvements to Red…

Read more
Awards

Wrapping up 2025 on a high: Red Sift OnDMARC tops G2’s Winter…

Francesca Rünger-Field

As 2025 comes to a close, we’re thrilled to share that Red Sift OnDMARC has hit a new milestone in the G2 Winter 2026 Report. This quarter, we’ve secured first place in 8 reports, been featured in 19 total, and earned a record-breaking 16 badges. It’s a standout moment made even more special by…

Read more
Product Release

Red Sift’s Quarterly Product Release, Fall 2025

Francesca Rünger-Field

This Fall marks a major expansion of Red Sift Brand Trust with the launch of Social Media Monitoring, a new add-on that helps organizations detect and respond to fraudulent company and executive profiles across platforms such as Facebook, Instagram, LinkedIn, TikTok, and X. By extending protection beyond domains, Brand Trust now gives security teams…

Read more
AI

Red Sift’s AI Agent, Part III: Performance in action

Phong Nguyen

This is the third article in our AI Agent series. In Part 1, we introduced Red Sift’s AI Agent for lookalike classification – an intelligent solution for handling the ambiguous cases that rule-based automation can’t confidently resolve, offering analyst-grade triage autonomously. In Part 2, we took readers behind the scenes to explore the engineering…

Read more