Roundtable: Evolution of Trust. Get ready for PKI 2.0

In the digital era, PKI is one of the most effective technologies for authentication of users and devices that is used by worldwide companies for decades already. However, the PKI evolution does not keep pace with the growing needs of customers’ since legacy software and hardware are unable to address the newest challenges. And here […]

more
22.12.2020

Indeed Identity and Corporate Systems enter into business partnership

Indeed Identity and Corporate Systems are pleased to announce that they have entered into a strategic partnership, combining Corporate Systems’ best-in-class consulting services and deep technical expertise with Indeed Identity enhanced cybersecurity solutions. Information security plays an increasingly important role for companies from different economic spheres. This partnership helps support Latvian financial institutions, government entities, […]

more
03.12.2020

Pacific Tech and Indeed Identity announce strategic partnership

Pacific Tech and Indeed Identity enter into a partnership that brings together Indeed Identity cutting-edge cybersecurity products and Pacific Tech’s top-class distribution services. At Pacific Tech, we are continuously evolving and bringing new solutions to our partners and customers in the region. We are delighted to be partnering with Indeed Identity. With Indeed Identity, we […]

more

Mixed PKI environment is not a challenge: Indeed Certificate Manager expands PKI best practices

Companies having PKI in place frequently use time attendance and access control systems. Unfortunately to employees and administrators, it is of common practice when users simultaneously have several devices: a card with an RFID tag to access doors and turn gates and a smart card or USB-token to authenticate in a corporate network. The stated […]

more

Can you imagine PKI without physical cards?

It turns out you can.Of course, physical smart cards and USB-tokens still occupy the majority of the PKI market. They are traditional ‘carriers’ of users’ personal certificates and successful providers of authentication, encryption and digital signature at an office PC. 

more

Indeed PAM 2.3: enhanced tool for comprehensive cybersecurity

In the new release, we continue upscaling the Indeed Privileged Access Manager functionality. New important access control features, expanded user session management options, and improved user experience for a number of scenarios have been added to make Indeed PAM even more functional and convenient management tool. Let’s take a closer look at the following additions […]

more

How to choose the most cost-effective PAM licensing model

Let’s face it. Many cybersecurity and IT departments were not prepared for rapid changes that the pandemic crisis has caused. Security officers all around the world witness the dramatic increase in the number of privileged users which simultaneously widens the area for hackers’ attacks. Corporate budgets are either frozen or reconsidered and you need to […]

more

Webinar: 5 coolest features every access management software should have

What if you’ve had one tool for managing access of employees and customers? Or a tool providing strong and multi-factor authentication with additional functionality at hand? Indeed Access Manager can do both. 

more

Great eight: newest release of Indeed AM 8.0

We are pleased to announce the release of long-awaited Indeed Access Manager version 8.0. It is a new milestone in the product lifecycle which lays the groundwork for the development of the system as a complete integrated solution for managing access to all information systems of an enterprise. What is new in Indeed Access Manager […]

more

Make PKI automation and its multiple benefits a part of your enterprise life

In the era of fast-spreading digitalization, everything requires automation, and PKI is not an exception. Each year, large enterprises with distributed infrastructure require more and more digital certificates, smart cards and smart card readers, operators and administrators of Certificate Authorities. Simultaneously, it results in the growing costs of PKI maintenance. 

more