{"id":82961,"date":"2026-05-13T08:30:00","date_gmt":"2026-05-13T12:30:00","guid":{"rendered":"https:\/\/www.inmotionhosting.com\/blog\/?p=82961"},"modified":"2026-05-12T14:57:04","modified_gmt":"2026-05-12T18:57:04","slug":"what-is-tls-transport-layer-security","status":"publish","type":"post","link":"https:\/\/www.inmotionhosting.com\/blog\/what-is-tls-transport-layer-security\/","title":{"rendered":"What is TLS (Transport Layer Security)?"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2026\/05\/What-is-TLS-Transport-Layer-Security-1024x538.png\" alt=\"What is TLS Transport Layer Security - Hero Image\" class=\"wp-image-82966\" srcset=\"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2026\/05\/What-is-TLS-Transport-Layer-Security-1024x538.png 1024w, https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2026\/05\/What-is-TLS-Transport-Layer-Security-300x158.png 300w, https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2026\/05\/What-is-TLS-Transport-Layer-Security-768x403.png 768w, https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2026\/05\/What-is-TLS-Transport-Layer-Security.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>If your business takes payments, collects customer information, or runs anything more than a static brochure site, TLS is already protecting you. Transport Layer Security is the invisible piece of technology that turns &#8220;http&#8221; into &#8220;https&#8221; and keeps customer data private as it moves across the internet. This guide explains what TLS is, why it matters for your business, how it has changed over the years, and what role your hosting provider plays in keeping it current.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Is TLS and Why Does It Matter for Your Business?<\/h2>\n\n\n\n<p><strong>TLS (Transport Layer Security)<\/strong> is a security protocol that encrypts the connection between a visitor&#8217;s browser and your website. Anything sent over that connection, including login credentials, credit card numbers, contact form submissions, and account details, is scrambled in transit so that no one in the middle can read it.<\/p>\n\n\n\n<p>For a business owner, TLS does three practical things:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>It protects customer data, which keeps you out of breach headlines.<\/li>\n\n\n\n<li>It signals trust through the &#8220;https&#8221; prefix.<\/li>\n\n\n\n<li>It satisfies regulatory and compliance requirements that apply to almost every modern website.<\/li>\n<\/ul>\n\n\n\n<p>That last point matters more than many owners realize. <a href=\"https:\/\/gdpr.eu\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">GDPR<\/a>, <a href=\"https:\/\/www.pcisecuritystandards.org\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">PCI DSS<\/a>, and HIPAA all require &#8220;appropriate technical measures&#8221; for protecting personal data, and TLS encryption is one of the baseline measures regulators expect. A website missing valid TLS is treated as a liability, not a neutral default.<\/p>\n\n\n\n<p>There is also the simple matter of customer perception. <a href=\"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/how-to-tell-if-a-website-is-secure\/\">Modern browsers flag any site without TLS as &#8220;Not Secure&#8221;<\/a>, which is enough to send most shoppers somewhere else before they ever see your offer.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Did TLS Evolve From SSL?<\/h2>\n\n\n\n<p>The history of web encryption is the reason most people still say &#8220;SSL&#8221; when they mean &#8220;TLS.&#8221; Understanding the difference helps when you are reading vendor documentation or talking to your developer.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">A Brief History of SSL and TLS<\/h3>\n\n\n\n<p><strong><a href=\"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/what-is-ssl-and-why-is-it-important\/\">Secure Sockets Layer (SSL)<\/a><\/strong> was developed by Netscape in 1994 to make early e-commerce possible. SSL 1.0 was never released publicly, SSL 2.0 had serious flaws, and SSL 3.0, released in 1996, became the foundation that everything else was built on.<\/p>\n\n\n\n<p>The <a href=\"https:\/\/www.ietf.org\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Internet Engineering Task Force<\/a> took over the protocol in 1999 and published TLS 1.0 as the direct successor to SSL 3.0. Although TLS is technically a different protocol, it shares the core ideas with SSL, which is why the two names are still used interchangeably in marketing.<\/p>\n\n\n\n<p>That branding confusion has stuck. Many providers still sell &#8220;SSL certificates&#8221; even though those certificates secure connections using TLS. The label has not caught up with the technology.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Key Differences Between SSL and TLS<\/h3>\n\n\n\n<p>TLS is more secure than SSL in several ways. It uses modern cryptographic algorithms, stronger hash functions for verifying data integrity, and better protection against attacks that try to force the connection back down to a weaker version. SSL 3.0 in particular is vulnerable to known attacks such as POODLE.<\/p>\n\n\n\n<p class=\"alert alert-success\"><strong>The practical takeaway<\/strong>: every browser and server in production today uses TLS, even when the marketing says &#8220;SSL.&#8221; If you are buying a certificate, you are buying TLS, regardless of what the product page calls it.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Does TLS Work in Plain Terms?<\/h2>\n\n\n\n<p>You do not need to be a cryptographer to understand TLS, but a basic picture helps when you are reading security reports or talking to your hosting provider.<\/p>\n\n\n\n<p>Think of TLS like a sealed envelope with a tamper-proof signature. Before the envelope is sealed, the browser and the server perform a quick verification ritual to confirm they are who they say they are. That ritual is called the handshake.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The TLS Handshake, Step by Step<\/h3>\n\n\n\n<p>The handshake happens automatically the moment a browser loads a secure page. Here is what is taking place behind the scenes:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>The browser sends a &#8220;Client Hello&#8221; message listing the TLS versions and encryption methods it supports.<\/li>\n\n\n\n<li>The server replies with &#8220;Server Hello,&#8221; picks the strongest mutually supported option, and sends its TLS certificate to prove its identity.<\/li>\n\n\n\n<li>The browser checks the certificate against a list of trusted authorities baked into the operating system.<\/li>\n\n\n\n<li>Both sides agree on a shared session key and switch to that key for the rest of the conversation.<\/li>\n<\/ol>\n\n\n\n<p>The whole process takes a fraction of a second. Once it completes, the actual data transfer begins, and everything sent in either direction is encrypted.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"416\" src=\"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2026\/05\/Ultimate-Guide-Infographics-HTTPS-Connections-1024x416.png\" alt=\"Infographic explaining HTTPS Connections\" class=\"wp-image-82956\" srcset=\"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2026\/05\/Ultimate-Guide-Infographics-HTTPS-Connections-1024x416.png 1024w, https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2026\/05\/Ultimate-Guide-Infographics-HTTPS-Connections-300x122.png 300w, https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2026\/05\/Ultimate-Guide-Infographics-HTTPS-Connections-768x312.png 768w, https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2026\/05\/Ultimate-Guide-Infographics-HTTPS-Connections-1536x624.png 1536w, https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2026\/05\/Ultimate-Guide-Infographics-HTTPS-Connections-2048x833.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Why TLS Uses Two Types of Encryption<\/h3>\n\n\n\n<p>TLS combines two forms of cryptography because each solves a different problem.<\/p>\n\n\n\n<p><strong>Asymmetric encryption<\/strong> is used during the handshake. The server has a public key (shared with anyone) and a private key (kept secret). Anyone can encrypt data with the public key, but only the server can decrypt it. This is how the two sides safely agree on a shared secret without ever sending that secret in the clear.<\/p>\n\n\n\n<p><strong>Symmetric encryption<\/strong> takes over once the handshake is done. Algorithms like <a href=\"https:\/\/csrc.nist.gov\/projects\/cryptographic-standards-and-guidelines\/archived-crypto-projects\/aes-development\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">AES<\/a> are far faster than asymmetric methods, so they are better suited for handling the actual flow of data once the connection is established.<\/p>\n\n\n\n<p>The combination is what makes TLS both secure and fast enough to use on every page load. Strong cipher suites with Perfect Forward Secrecy add another layer of protection by ensuring that even if the server&#8217;s private key is stolen later, past sessions stay private.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Are the Different TLS Versions, and Which Should You Use?<\/h2>\n\n\n\n<p>TLS has gone through several revisions, and the version your server uses has real security consequences.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>TLS 1.0 (1999) and TLS 1.1 (2006)<\/strong>: Both are deprecated. Major browsers stopped supporting them in 2020. If your server still allows them, security scanners will flag your site.<\/li>\n\n\n\n<li><strong>TLS 1.2 (2008)<\/strong>: Still considered secure when configured with modern cipher suites. It is the minimum acceptable version for most compliance frameworks today.<\/li>\n\n\n\n<li><strong>TLS 1.3 (2018)<\/strong>: The current standard, defined in <a href=\"https:\/\/datatracker.ietf.org\/doc\/html\/rfc8446\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">RFC 8446<\/a>. It is faster, simpler, and removes the older cipher suites that caused most past vulnerabilities.<\/li>\n<\/ul>\n\n\n\n<p>For most businesses, the right configuration is TLS 1.2 and TLS 1.3 enabled, with older versions disabled at the server level. Tools like <a href=\"https:\/\/ssl-config.mozilla.org\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Mozilla&#8217;s SSL Configuration Generator<\/a> produce ready-to-use settings for common web servers, and <a href=\"https:\/\/www.ssllabs.com\/ssltest\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Qualys SSL Labs<\/a> will grade your live configuration in about a minute.<\/p>\n\n\n\n<p>If that sentence sounded like a foreign language, you are exactly the kind of business owner who benefits from managed hosting. More on that below.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Where Does Your Business Encounter TLS Every Day?<\/h2>\n\n\n\n<p>TLS is not limited to websites. Almost every secure online service uses it under the hood.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Websites and online stores<\/strong> use TLS through HTTPS to protect logins, checkout flows, and form submissions.<\/li>\n\n\n\n<li><strong>Email<\/strong> uses TLS through SMTPS, IMAPS, and POP3S to keep messages private in transit. Modern providers reject mail servers that refuse to use TLS.<\/li>\n\n\n\n<li><strong>VPN connections<\/strong> like OpenVPN are built on top of TLS for remote employees and branch offices.<\/li>\n\n\n\n<li><strong>APIs and integrations<\/strong> between platforms (payment processors, <a href=\"https:\/\/www.inmotionhosting.com\/blog\/what-is-crm\/\" type=\"post\" id=\"9864\">CRMs<\/a>, marketing tools) almost always require TLS for the connection to be accepted.<\/li>\n\n\n\n<li><strong>Voice and messaging<\/strong> services protect calls and chat with TLS variants such as SIPS.<\/li>\n<\/ul>\n\n\n\n<p>If you operate a business online in any capacity, your customers, vendors, and employees are passing through TLS-protected connections constantly, often without realizing it.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Are TLS Certificates and How Do You Get One?<\/h2>\n\n\n\n<p>A TLS certificate is the document that proves your domain is what it claims to be. It contains your domain name, your public key, the issuing authority&#8217;s signature, and an expiration date. Browsers trust the certificate because they trust the authority that signed it.<\/p>\n\n\n\n<p>There are three common types:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Domain Validated (DV)<\/strong>: Confirms control of the domain only. Fast, free or low cost, and the right fit for most small business sites. Providers like <a href=\"https:\/\/letsencrypt.org\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Let&#8217;s Encrypt<\/a> issue DV certificates at no charge.<\/li>\n\n\n\n<li><strong>Organization Validated (OV)<\/strong>: Requires verification of the business behind the domain. A reasonable step up for companies that want to demonstrate identity to visitors.<\/li>\n\n\n\n<li><strong>Extended Validation (EV)<\/strong>: Involves the most thorough vetting. Historically shown with a green address bar, though <a href=\"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/how-to-tell-if-a-website-is-secure\/\">modern browsers no longer display that indicator prominently<\/a>.<\/li>\n<\/ul>\n\n\n\n<p>Certificates expire, usually every 90 days for free certificates and once a year for paid options. An expired certificate makes your site unreachable to most visitors, which is why automated renewal matters so much. Tools built around the <a href=\"https:\/\/datatracker.ietf.org\/doc\/html\/rfc8555\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">ACME protocol<\/a> handle this without manual intervention, and most quality hosting platforms automate it for you.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Does TLS Slow Down Your Website?<\/h2>\n\n\n\n<p>TLS used to carry a real performance penalty. That stopped being true years ago.<\/p>\n\n\n\n<p>The handshake adds a small amount of latency to the first connection, but several improvements keep the impact minimal:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Session resumption<\/strong> lets repeat visitors skip most of the handshake.<\/li>\n\n\n\n<li><strong>TLS 1.3&#8217;s 0-RTT mode<\/strong> allows data to start flowing on the very first round trip for returning visitors.<\/li>\n\n\n\n<li><strong>OCSP stapling<\/strong> removes the extra round trip browsers used to make when checking certificate validity.<\/li>\n\n\n\n<li><strong>Hardware acceleration<\/strong> on modern processors handles AES encryption with almost no measurable CPU cost.<\/li>\n<\/ul>\n\n\n\n<p>For most websites running on a healthy server, the performance difference between HTTP and HTTPS is invisible to users. Where TLS performance does matter is at scale, on busy ecommerce sites or APIs handling thousands of requests per second. On those workloads, dedicated infrastructure and offloading TLS to specialized hardware or <a href=\"https:\/\/www.inmotionhosting.com\/dedicated-servers\">dedicated server hosting<\/a> keeps response times consistent under load.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Compliance Requirements Demand TLS?<\/h2>\n\n\n\n<p>If your business is regulated, TLS is not optional.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>PCI DSS<\/strong> requires TLS 1.2 or higher for any system that transmits cardholder data.<\/li>\n\n\n\n<li><strong>HIPAA<\/strong> does not name TLS explicitly but treats it as a baseline expectation for protected health information in transit.<\/li>\n\n\n\n<li><strong>GDPR<\/strong> requires &#8220;appropriate technical measures&#8221; for personal data, and auditors consistently interpret this to include current TLS.<\/li>\n\n\n\n<li><strong>SOC 2<\/strong> and <strong>ISO 27001<\/strong> audits ask for documented TLS configuration and certificate management.<\/li>\n<\/ul>\n\n\n\n<p>The catch is that compliance is not a one-time check. New cipher vulnerabilities are discovered regularly, the <a href=\"https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-52\/rev-2\/final\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">NIST guidelines for TLS<\/a> get updated, and what passed an audit two years ago may fail one today. Keeping TLS aligned with current standards is ongoing work.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Who Keeps Your TLS Configuration Up to Date?<\/h2>\n\n\n\n<p>This is the part business owners often miss until they fail a security scan. TLS is not a &#8220;set once and forget&#8221; technology.<\/p>\n\n\n\n<p>Cipher suites get deprecated. New protocol versions get released. Certificates expire. Compliance frameworks raise their minimums. Whoever is running your server is responsible for tracking all of this and applying changes before something breaks or <a href=\"https:\/\/www.inmotionhosting.com\/blog\/what-is-securityscorecard-rating\/\">fails an audit<\/a>.<\/p>\n\n\n\n<p>On a self-managed server, that responsibility falls on you or your developer. You need to monitor announcements from browser vendors, update OpenSSL libraries, regenerate certificates, test cipher configurations, and verify that nothing downstream broke. Many small teams discover this list the hard way after a failed scan or a missed renewal.<\/p>\n\n\n\n<p>Managed hosting changes the picture. With <a href=\"https:\/\/www.inmotionhosting.com\/vps-hosting\">Managed VPS Hosting<\/a> or managed <a href=\"https:\/\/www.inmotionhosting.com\/dedicated-servers\">Dedicated Server Hosting<\/a> from InMotion Hosting, the operations team handles the moving pieces:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>AutoSSL automatically issues and renews free TLS certificates for every domain in cPanel.<\/li>\n\n\n\n<li>Server software, OpenSSL libraries, and cipher configurations are kept on supported versions.<\/li>\n\n\n\n<li>Security patches that affect TLS are applied as part of the regular maintenance cycle.<\/li>\n\n\n\n<li>Configuration adjustments to meet PCI or other compliance scans can be handled by the support team rather than requiring an in-house systems engineer.<\/li>\n<\/ul>\n\n\n\n<p>For businesses that need an extra layer of help, the <a href=\"https:\/\/www.inmotionhosting.com\/blog\/inmotion-premier-care\/\">Premier Care bundle<\/a> adds proactive monitoring, malware defense, and direct access to InMotion Solutions consulting hours for security and performance work.<\/p>\n\n\n\n<p>The benefit, in plain terms, is that your TLS posture stays current without you having to track the industry yourself. You get the technical compliance, and your team gets to focus on the business.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">TLS Is the Foundation, Hosting Is Where It Lives<\/h2>\n\n\n\n<p>TLS is the standard that makes secure business possible on the internet. The protocol has matured into something quietly reliable, and the practical question for most business owners is no longer whether to use it, but who is responsible for keeping it configured correctly over time.<\/p>\n\n\n\n<p>If your current setup leaves you tracking certificate renewals, cipher updates, and compliance changes on your own, talk to our team. InMotion Hosting&#8217;s <a href=\"https:\/\/www.inmotionhosting.com\/vps-hosting\">Managed VPS<\/a> and <a href=\"https:\/\/www.inmotionhosting.com\/dedicated-servers\">Dedicated Server<\/a> plans include the human support, security maintenance, and certificate automation that keep your TLS configuration aligned with current standards. Our support team can also help you prepare for PCI or other compliance audits without sending you down a rabbit hole of server administration.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If your business takes payments, collects customer information, or runs anything more than a static brochure site, TLS is already protecting you. Transport Layer Security is the invisible piece of technology that turns &#8220;http&#8221; into &#8220;https&#8221; and keeps customer data private as it moves across the internet. This guide explains what TLS is, why it<a class=\"moretag\" href=\"https:\/\/www.inmotionhosting.com\/blog\/what-is-tls-transport-layer-security\/\"> Read More ><\/a><\/p>\n","protected":false},"author":81,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[396,371],"tags":[],"class_list":["post-82961","post","type-post","status-publish","format-standard","hentry","category-glossary","category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is TLS (Transport Layer Security)? | InMotion Hosting<\/title>\n<meta name=\"description\" content=\"TLS protects every secure website transaction. Learn what it is, how it works, and how managed hosting keeps your encryption current and compliant.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inmotionhosting.com\/blog\/what-is-tls-transport-layer-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is TLS (Transport Layer Security)? | InMotion Hosting\" \/>\n<meta property=\"og:description\" content=\"TLS protects every secure website transaction. Learn what it is, how it works, and how managed hosting keeps your encryption current and compliant.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inmotionhosting.com\/blog\/what-is-tls-transport-layer-security\/\" \/>\n<meta property=\"og:site_name\" content=\"InMotion Hosting Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/inmotionhosting\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-13T12:30:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2026\/05\/What-is-TLS-Transport-Layer-Security.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Carrie Smaha\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@carriesmaha\" \/>\n<meta name=\"twitter:site\" content=\"@inmotionhosting\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Carrie Smaha\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is TLS (Transport Layer Security)? | InMotion Hosting","description":"TLS protects every secure website transaction. Learn what it is, how it works, and how managed hosting keeps your encryption current and compliant.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inmotionhosting.com\/blog\/what-is-tls-transport-layer-security\/","og_locale":"en_US","og_type":"article","og_title":"What is TLS (Transport Layer Security)? | InMotion Hosting","og_description":"TLS protects every secure website transaction. Learn what it is, how it works, and how managed hosting keeps your encryption current and compliant.","og_url":"https:\/\/www.inmotionhosting.com\/blog\/what-is-tls-transport-layer-security\/","og_site_name":"InMotion Hosting Blog","article_publisher":"https:\/\/www.facebook.com\/inmotionhosting","article_published_time":"2026-05-13T12:30:00+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2026\/05\/What-is-TLS-Transport-Layer-Security.png","type":"image\/png"}],"author":"Carrie Smaha","twitter_card":"summary_large_image","twitter_creator":"@carriesmaha","twitter_site":"@inmotionhosting","twitter_misc":{"Written by":"Carrie Smaha","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.inmotionhosting.com\/blog\/what-is-tls-transport-layer-security\/#article","isPartOf":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/what-is-tls-transport-layer-security\/"},"author":{"name":"Carrie Smaha","@id":"https:\/\/www.inmotionhosting.com\/blog\/#\/schema\/person\/40542e598fc39115aa6e4a47db2373b3"},"headline":"What is TLS (Transport Layer Security)?","datePublished":"2026-05-13T12:30:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/what-is-tls-transport-layer-security\/"},"wordCount":2041,"commentCount":0,"publisher":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/what-is-tls-transport-layer-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2026\/05\/What-is-TLS-Transport-Layer-Security-1024x538.png","articleSection":["Glossary","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inmotionhosting.com\/blog\/what-is-tls-transport-layer-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inmotionhosting.com\/blog\/what-is-tls-transport-layer-security\/","url":"https:\/\/www.inmotionhosting.com\/blog\/what-is-tls-transport-layer-security\/","name":"What is TLS (Transport Layer Security)? | InMotion Hosting","isPartOf":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/what-is-tls-transport-layer-security\/#primaryimage"},"image":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/what-is-tls-transport-layer-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2026\/05\/What-is-TLS-Transport-Layer-Security-1024x538.png","datePublished":"2026-05-13T12:30:00+00:00","description":"TLS protects every secure website transaction. Learn what it is, how it works, and how managed hosting keeps your encryption current and compliant.","breadcrumb":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/what-is-tls-transport-layer-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inmotionhosting.com\/blog\/what-is-tls-transport-layer-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inmotionhosting.com\/blog\/what-is-tls-transport-layer-security\/#primaryimage","url":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2026\/05\/What-is-TLS-Transport-Layer-Security.png","contentUrl":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2026\/05\/What-is-TLS-Transport-Layer-Security.png","width":1200,"height":630,"caption":"What is TLS Transport Layer Security - Hero Image"},{"@type":"BreadcrumbList","@id":"https:\/\/www.inmotionhosting.com\/blog\/what-is-tls-transport-layer-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inmotionhosting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Glossary","item":"https:\/\/www.inmotionhosting.com\/blog\/glossary\/"},{"@type":"ListItem","position":3,"name":"What is TLS (Transport Layer Security)?"}]},{"@type":"WebSite","@id":"https:\/\/www.inmotionhosting.com\/blog\/#website","url":"https:\/\/www.inmotionhosting.com\/blog\/","name":"InMotion Hosting Blog","description":"Web Hosting Strategy, Trends and Security","publisher":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inmotionhosting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.inmotionhosting.com\/blog\/#organization","name":"InMotion Hosting","url":"https:\/\/www.inmotionhosting.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inmotionhosting.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2019\/11\/imh-logo-all-colors-big.jpg","contentUrl":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2019\/11\/imh-logo-all-colors-big.jpg","width":1630,"height":430,"caption":"InMotion Hosting"},"image":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/inmotionhosting","https:\/\/x.com\/inmotionhosting"]},{"@type":"Person","@id":"https:\/\/www.inmotionhosting.com\/blog\/#\/schema\/person\/40542e598fc39115aa6e4a47db2373b3","name":"Carrie Smaha","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a5cd05c11bc0b3a239eddf54ae001dd8d0d956e9c8d1e860919bda51a33bfdbb?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a5cd05c11bc0b3a239eddf54ae001dd8d0d956e9c8d1e860919bda51a33bfdbb?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a5cd05c11bc0b3a239eddf54ae001dd8d0d956e9c8d1e860919bda51a33bfdbb?s=96&r=g","caption":"Carrie Smaha"},"description":"Carrie Smaha is a Senior Marketing Operations leader with over 20 years of experience in digital strategy, web development, and IT project management. She specializes in go-to-market programs and SaaS solutions for WordPress and VPS Hosting, working closely with technical teams and customers to deliver high-performance, scalable platforms. At InMotion Hosting, she drives product marketing initiatives that blend strategic insight with technical depth.","sameAs":["https:\/\/www.linkedin.com\/in\/carriesmaha\/","https:\/\/x.com\/carriesmaha"],"url":"https:\/\/www.inmotionhosting.com\/blog\/author\/carrie-smaha\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"primary_category":{"id":396,"name":"Glossary","slug":"glossary","link":"https:\/\/www.inmotionhosting.com\/blog\/glossary\/"},"_links":{"self":[{"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/posts\/82961","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/users\/81"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/comments?post=82961"}],"version-history":[{"count":5,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/posts\/82961\/revisions"}],"predecessor-version":[{"id":82967,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/posts\/82961\/revisions\/82967"}],"wp:attachment":[{"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/media?parent=82961"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/categories?post=82961"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/tags?post=82961"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}