In the new version, we continue upscaling the Indeed Certificate Manager functionality. The new features will make it easier to manage your public key infrastructure. Please keep reading to learn more about the changes in Indeed CM 6.5. Setting up subject name and subject alternative name for a Microsoft CA certificate by making a relevant […]
In the digital ecosystem, PKI management appears to be one of the most complex, yet strongly effective systems that is fastly evolving. The evolution creates the growing gap between the customers’ needs and legacy software unable to address the newest challenges.
Ensuring the highest level of security, Public Key Infrastructure enables core enterprise processes of users’ authentication, encryption and digital signature. Just like any technology, PKI actively evolves and adapts to the rapidly changing digitalization. We’ve collected the most important PKI trends that you cannot miss. Let’s get started. Trend 1. There is a global tendency […]
Smart cards have been a part of the information security market for several decades already and are used by companies for the identification of employees. The evolution of smart cards has led to the emergence of virtual, mobile ones, which are getting more popular in Europe. Can these cards replace traditional physical ones? What do […]
There is currently much controversy over the PKI status in modern cybersecurity which raises a number of curious questions. What is the PKI role in digital transformation? When does the new era of cryptography start? We have collected these and other exciting and hot-topic questions about PKI now and future and addressed them to Nevenko […]
The roundtable «Evolution of Trust: Get ready for PKI 2.0» was about the most confusing, yet vital topics that remain puzzles to many cybersecurity experts. Has COVID-19 affected the PKI landscape? eIDAS and PKI: how do they correlate? What will bring the growing importance of public CAs? We interviewed Adam Ross, product and sales manager […]
For decades PKI has remained one of the most effective technologies for authentication of users and devices. Nevertheless, many companies witness that the PKI evolution does not go in line with the growing needs of users. Legacy systems are not able to meet modern customer requirements, giving rise to a number of concerns. We invited […]
In the digital era, PKI is one of the most effective technologies for authentication of users and devices that is used by worldwide companies for decades already. However, the PKI evolution does not keep pace with the growing needs of customers’ since legacy software and hardware are unable to address the newest challenges. And here […]
Companies having PKI in place frequently use time attendance and access control systems. Unfortunately to employees and administrators, it is of common practice when users simultaneously have several devices: a card with an RFID tag to access doors and turn gates and a smart card or USB-token to authenticate in a corporate network. The stated […]
It turns out you can.Of course, physical smart cards and USB-tokens still occupy the majority of the PKI market. They are traditional ‘carriers’ of users’ personal certificates and successful providers of authentication, encryption and digital signature at an office PC.