Where does PKI evolution go? – Interview with Nevenko Bartolinčić

There is currently much controversy over the PKI status in modern cybersecurity which raises a number of curious questions. What is the PKI role in digital transformation? When does the new era of cryptography start? We have collected these and other exciting and hot-topic questions about PKI now and future and addressed them to Nevenko […]

more
17.02.2021

The New Normal of European PKI – An Interview With CA Expert Adam Ross

The roundtable «Evolution of Trust: Get ready for PKI 2.0» was about the most confusing, yet vital topics that remain puzzles to many cybersecurity experts. Has COVID-19 affected the PKI landscape? eIDAS and PKI: how do they correlate? What will bring the growing importance of public CAs? We interviewed Adam Ross, product and sales manager […]

more

Interview: CMS Expert Answers the Most Tricky PKI Questions

For decades PKI has remained one of the most effective technologies for authentication of users and devices. Nevertheless, many companies witness that the PKI evolution does not go in line with the growing needs of users. Legacy systems are not able to meet modern customer requirements, giving rise to a number of concerns. We invited […]

more

Roundtable: Evolution of Trust. Get ready for PKI 2.0

In the digital era, PKI is one of the most effective technologies for authentication of users and devices that is used by worldwide companies for decades already. However, the PKI evolution does not keep pace with the growing needs of customers’ since legacy software and hardware are unable to address the newest challenges. And here […]

more
22.12.2020

Indeed Identity and Corporate Systems enter into business partnership

Indeed Identity and Corporate Systems are pleased to announce that they have entered into a strategic partnership, combining Corporate Systems’ best-in-class consulting services and deep technical expertise with Indeed Identity enhanced cybersecurity solutions. Information security plays an increasingly important role for companies from different economic spheres. This partnership helps support Latvian financial institutions, government entities, […]

more
03.12.2020

Pacific Tech and Indeed Identity announce strategic partnership

Pacific Tech and Indeed Identity enter into a partnership that brings together Indeed Identity cutting-edge cybersecurity products and Pacific Tech’s top-class distribution services. At Pacific Tech, we are continuously evolving and bringing new solutions to our partners and customers in the region. We are delighted to be partnering with Indeed Identity. With Indeed Identity, we […]

more

Mixed PKI environment is not a challenge: Indeed Certificate Manager expands PKI best practices

Companies having PKI in place frequently use time attendance and access control systems. Unfortunately to employees and administrators, it is of common practice when users simultaneously have several devices: a card with an RFID tag to access doors and turn gates and a smart card or USB-token to authenticate in a corporate network. The stated […]

more

Can you imagine PKI without physical cards?

It turns out you can.Of course, physical smart cards and USB-tokens still occupy the majority of the PKI market. They are traditional ‘carriers’ of users’ personal certificates and successful providers of authentication, encryption and digital signature at an office PC. 

more

Indeed PAM 2.3: enhanced tool for comprehensive cybersecurity

In the new release, we continue upscaling the Indeed Privileged Access Manager functionality. New important access control features, expanded user session management options, and improved user experience for a number of scenarios have been added to make Indeed PAM even more functional and convenient management tool. Let’s take a closer look at the following additions […]

more

How to choose the most cost-effective PAM licensing model

Let’s face it. Many cybersecurity and IT departments were not prepared for rapid changes that the pandemic crisis has caused. Security officers all around the world witness the dramatic increase in the number of privileged users which simultaneously widens the area for hackers’ attacks. Corporate budgets are either frozen or reconsidered and you need to […]

more