I Already covered this earlier, when Venafi made some unprovable claims about security:
https://www.venafi.com/blog/post/what-venafi-trustnet-tells-us-about-the-clinton-email-server/
Starting in late March 2009, mail.clintonemail.com was enabled with a Network Solutions’ digital certificate and encryption for web-based applications like Outlook Web Access. This was 3 months after Secretary Clinton took office. The clintonemail.com domain was registered with Network Solutions in January 2009 – 8 days before Secretary Clinton was confirmed by the U.S. Senate. Therefore, from January to end of March 2009 access to clintonemail.com did not use encryption.
Let me break down the argument for any of those posters who are less 'technically inclined'
SSL secures communications sent across the internet
SSL requires a digital certificate
clintonemail.com domain was registered with Network Solutions in January 2009
mail.clintonemail.com was enabled with apurchased Network Solutions’ digital certificate March 2009,
Therefore, from January to end of March 2009 access to clintonemail.com did not use encryption.
So what's the problem ?
Having a "digital certificate" and securing communications does not require purchasing a cert from NetSol. It's easy, and an accepted practice to create your own CA and certificates:
https://www.google.com/search?q=creating+a+ssl+certificate
It's not only possible, but plausible they simply installed a self-signed cert until they purchased the NetSol one.
Or, equally as possible, didn't actually start using the server until after obtaining the netsol cert.
So unless
www.venafi.com has a time machine;
They cannot know if the mail server was secured or not.
They cannot know what services (ie mail, web) were actually running on the machine
Hooray for FUD and misinformation.
ETA: added link so you can see post in context if you want