Interview: Slovenian Card Payment Processor about migrating from Microsoft CLM / FIM to Indeed CM

Slovenian card payment processor* as part of migration from Microsoft CLM / FIM (EOL) initiated the procedure of purchasing a Card Management System. After the implementation of the Indeed Certificate Manager we decided to ask them to share their experience and decision-making process. *The name of the client is not revealed due to the non-disclosure […]

more

Indeed CM 6.5: upscaled functionality for effortless PKI management

In the new version, we continue upscaling the Indeed Certificate Manager functionality. The new features will make it easier to manage your public key infrastructure. Please keep reading to learn more about the changes in Indeed CM 6.5. Setting up subject name and subject alternative name for a Microsoft CA certificate by making a relevant […]

more

From legacy to the new era – how migration to Indeed CM will heal your PKI pain

In today’s world of complex digital ecosystems, PKI management appears to be a strongly effective security system that is fastly evolving. The evolution creates the growing gap between the customers’ needs and legacy software unable to address the newest challenges.  On top of obvious information security risks, using obsolete or no longer supported software for […]

more

5 global PKI trends that affect any enterprise

Ensuring the highest level of security, Public Key Infrastructure enables core enterprise processes of users’ authentication, encryption and digital signature. Just like any technology, PKI actively evolves and adapts to the rapidly changing digitalization. We’ve collected the most important PKI trends that you cannot miss. Let’s get started. Trend 1. There is a global tendency […]

more

Smart cards for smarter future – Interview with Feitian Technologies, leading global provider of smart cards

Smart cards have been a part of the information security market for several decades already and are used by companies for the identification of employees. The evolution of smart cards has led to the emergence of virtual, mobile ones, which are getting more popular in Europe. Can these cards replace traditional physical ones? What do […]

more

Where does PKI evolution go? – Interview with Nevenko Bartolinčić

There is currently much controversy over the PKI status in modern cybersecurity which raises a number of curious questions. What is the PKI role in digital transformation? When does the new era of cryptography start? We have collected these and other exciting and hot-topic questions about PKI now and future and addressed them to Nevenko […]

more

The New Normal of European PKI – An Interview With CA Expert Adam Ross

The roundtable «Evolution of Trust: Get ready for PKI 2.0» was about the most confusing, yet vital topics that remain puzzles to many cybersecurity experts. Has COVID-19 affected the PKI landscape? eIDAS and PKI: how do they correlate? What will bring the growing importance of public CAs? We interviewed Adam Ross, product and sales manager […]

more

Interview: CMS Expert Answers the Most Tricky PKI Questions

For decades PKI has remained one of the most effective technologies for authentication of users and devices. Nevertheless, many companies witness that the PKI evolution does not go in line with the growing needs of users. Legacy systems are not able to meet modern customer requirements, giving rise to a number of concerns. We invited […]

more

Roundtable: Evolution of Trust. Get ready for PKI 2.0

In the digital era, PKI is one of the most effective technologies for authentication of users and devices that is used by worldwide companies for decades already. However, the PKI evolution does not keep pace with the growing needs of customers’ since legacy software and hardware are unable to address the newest challenges. And here […]

more

Mixed PKI environment is not a challenge: Indeed Certificate Manager expands PKI best practices

Companies having PKI in place frequently use time attendance and access control systems. Unfortunately to employees and administrators, it is of common practice when users simultaneously have several devices: a card with an RFID tag to access doors and turn gates and a smart card or USB-token to authenticate in a corporate network. The stated […]

more