16.04.2021

Roundtable: Best PAM approach – what requires your full attention

Privileged access management is an important part of any cybersecurity policy. With the PAM market predicted to continue rapidly growing in the upcoming years, PAM implementation the #1 priority for many companies in Turkey.  The selection of PAM is a complex process that can be confusing if you do not know where to start. Day […]

more

Secure authentication in your pocket – meet newest release of Indeed Key 2.1

When it comes to multi-factor authentication, any cybersecurity officer knows – usability is a must step toward users’ acceptance of the technology. The product will be ignored if it is not user-friendly.  Here is where Indeed Key comes to the rescue. It is a mobile application that transforms a smartphone into an easy-to-use security tool […]

more

5 global PKI trends that affect any enterprise

Ensuring the highest level of security, Public Key Infrastructure enables core enterprise processes of users’ authentication, encryption and digital signature. Just like any technology, PKI actively evolves and adapts to the rapidly changing digitalization. We’ve collected the most important PKI trends that you cannot miss. Let’s get started. Trend 1. There is a global tendency […]

more

Smart cards for smarter future – Interview with Feitian Technologies, leading global provider of smart cards

Smart cards have been a part of the information security market for several decades already and are used by companies for the identification of employees. The evolution of smart cards has led to the emergence of virtual, mobile ones, which are getting more popular in Europe. Can these cards replace traditional physical ones? What do […]

more

Where does PKI evolution go? – Interview with Nevenko Bartolinčić

There is currently much controversy over the PKI status in modern cybersecurity which raises a number of curious questions. What is the PKI role in digital transformation? When does the new era of cryptography start? We have collected these and other exciting and hot-topic questions about PKI now and future and addressed them to Nevenko […]

more

The New Normal of European PKI – An Interview With CA Expert Adam Ross

The roundtable «Evolution of Trust: Get ready for PKI 2.0» was about the most confusing, yet vital topics that remain puzzles to many cybersecurity experts. Has COVID-19 affected the PKI landscape? eIDAS and PKI: how do they correlate? What will bring the growing importance of public CAs? We interviewed Adam Ross, product and sales manager […]

more

Roundtable: Evolution of Trust. Get ready for PKI 2.0

In the digital era, PKI is one of the most effective technologies for authentication of users and devices that is used by worldwide companies for decades already. However, the PKI evolution does not keep pace with the growing needs of customers’ since legacy software and hardware are unable to address the newest challenges. And here […]

more
22.12.2020

Indeed Identity and Corporate Systems enter into business partnership

Indeed Identity and Corporate Systems are pleased to announce that they have entered into a strategic partnership, combining Corporate Systems’ best-in-class consulting services and deep technical expertise with Indeed Identity enhanced cybersecurity solutions. Information security plays an increasingly important role for companies from different economic spheres. This partnership helps support Latvian financial institutions, government entities, […]

more
03.12.2020

Pacific Tech and Indeed Identity announce strategic partnership

Pacific Tech and Indeed Identity enter into a partnership that brings together Indeed Identity cutting-edge cybersecurity products and Pacific Tech’s top-class distribution services. At Pacific Tech, we are continuously evolving and bringing new solutions to our partners and customers in the region. We are delighted to be partnering with Indeed Identity. With Indeed Identity, we […]

more

Webinar: 5 coolest features every access management software should have

What if you’ve had one tool for managing access of employees and customers? Or a tool providing strong and multi-factor authentication with additional functionality at hand? Indeed Access Manager can do both. 

more