now offering TLS 1.3 globally

Picture of Tim Davis

Tim Davis

Senior Cloud and Security Engineer

Share Post:

tls-1.3 now offering TLS 1.3 globally by January 2019

Revion has begun transitioning it’s servers to the lastest protocol version of TLS (1.3).

TLS 1.3 updates the most important security protocol on the Internet, delivering superior privacy, security, and performance over its predecessors TLS 1.2.

This new security protocol reduces latency caused during the TLS Handshake by removing a whole round-trip connection for session establishment which greatly improves performance.

Here is sample of the speed improvements as tested on one of our servers:

Speed test with TLS 1.2 –

Speed Test with TLS 1.3 –

As you can see from the images, there is a 76% gain in website speed when comparing TLS 1.3 to TLS 1.2.

In addition to drastically improved performance, Transportation Layer Security (TLS) 1.3 protocol provides unparalleled privacy and security improvements compared to previous versions of TLS and non-secure HTTP.  TLS 1.3 represents a significant leap forward for security.

TLS 1.3 removes all primitives and features that have contribute to a weak configurations and enabled common vulnerability exploits like DROWN, Vaudenay, Lucky 13, POODLE, SLOTH, CRIME and more. This new protocol has also introduced more improvements than any previous version of the protocol.  Additional features have been added to enhance the security and robustness of the protocol.

By the end of January 2019, Revion will have moved all it’s servers to TLS 1.3.   In turn, we will be one of the first managed service providers to offer TLS 1.3 support on a global scale which reduces latency, optimizes performance and hardens the security of encrypted connections.

For more information on TLS 1.3 implementation, please feel free to contact us:

Revion offers a full suite of services such Oracle APEX, HIPAA hosting, Managed Service Provider services –

Stay Connected

More Updates

Log4j2 Vulnerability

Revion is not using Log4j2 tool for apache-tomcat, we are using default lightweight API – Java logging API — java.util.logging. Additionally, we are not exposing

Bind/DNS services upgraded

To address security vulnerability discovered in Bind 9.8.1. we have upgraded all bind dns servers to 9.8.1.-P1