Ensuring the highest level of security, Public Key Infrastructure enables core enterprise processes of users’ authentication, encryption and digital signature. Just like any technology, PKI actively evolves and adapts to the rapidly changing digitalization. We’ve collected the most important PKI trends that you cannot miss. Let’s get started. Trend 1. There is a global tendency […]
Smart cards have been a part of the information security market for several decades already and are used by companies for the identification of employees. The evolution of smart cards has led to the emergence of virtual, mobile ones, which are getting more popular in Europe. Can these cards replace traditional physical ones? What do […]
There is currently much controversy over the PKI status in modern cybersecurity which raises a number of curious questions. What is the PKI role in digital transformation? When does the new era of cryptography start? We have collected these and other exciting and hot-topic questions about PKI now and future and addressed them to Nevenko […]
The roundtable «Evolution of Trust: Get ready for PKI 2.0» was about the most confusing, yet vital topics that remain puzzles to many cybersecurity experts. Has COVID-19 affected the PKI landscape? eIDAS and PKI: how do they correlate? What will bring the growing importance of public CAs? We interviewed Adam Ross, product and sales manager […]
For decades PKI has remained one of the most effective technologies for authentication of users and devices. Nevertheless, many companies witness that the PKI evolution does not go in line with the growing needs of users. Legacy systems are not able to meet modern customer requirements, giving rise to a number of concerns. We invited […]
In the digital era, PKI is one of the most effective technologies for authentication of users and devices that is used by worldwide companies for decades already. However, the PKI evolution does not keep pace with the growing needs of customers’ since legacy software and hardware are unable to address the newest challenges. And here […]
Companies having PKI in place frequently use time attendance and access control systems. Unfortunately to employees and administrators, it is of common practice when users simultaneously have several devices: a card with an RFID tag to access doors and turn gates and a smart card or USB-token to authenticate in a corporate network. The stated […]
It turns out you can.Of course, physical smart cards and USB-tokens still occupy the majority of the PKI market. They are traditional ‘carriers’ of users’ personal certificates and successful providers of authentication, encryption and digital signature at an office PC.
In the era of fast-spreading digitalization, everything requires automation, and PKI is not an exception. Each year, large enterprises with distributed infrastructure require more and more digital certificates, smart cards and smart card readers, operators and administrators of Certificate Authorities. Simultaneously, it results in the growing costs of PKI maintenance.
Managing many digital certificates, the infrastructure administrators of large enterprises have to almost grope their way to greater PKI performance. Even one unnoticed detail can disrupt workflow. However, lack of visibility was a part of the legacy PKI world. Today, modern smart card management systems offer easy-to-use tools not only for issuing smart cards with […]