Indeed Certificate ManagerIndeed Access Manager Indeed Privileged Access Manager Indeed Certificate Manager
EASILY DEPLOY AND MANAGE
PUBLIC KEY INFRASTRUCTURE
Our software gives your company all necessary tools to manage and control the variety of certificate authorities, issued certificates and smart cards at hands of employees
Reducing the cost of managing the public key infrastructure - automation of smart cards and certificate tasks, centralized distribution of PIN code policies
Using the public key infrastructure is associated with multiple routine operations on issuing, use control and revocation of certificates and smart card. Basic tools of certification authorities are not intended to manage user’s smart cards and allow for standard operations with certificates only. All the Indeed CM settings are distributed via policy mechanism. The policy contains the data required to connect to certification authorities, the list of certificates to be issued, as well as additional certificate parameters (such as key backup, automatic approval of issue etc.).
Control of using the smart cards and digital certificates - centralized management and tracking of digital signature tools
Many companies make it a common practice to use smart cards. These are used both internally - for e-mail protection, internal document flow, user authentication - and for communication with third parties, working at trading platforms, in remote banking services and for generating a qualified digital signature. The certificates can be issued either by the company’s own certification authorities, or by external organizations. The management of distributed population of smart cards becomes a complex task, which is to be solved by special systems. Indeed Certificate Manager is an easy-to-use card management system. It offers an effective and centralized smart card tool to solve the task.
Two-factor authentication with smart cards in operating system and applications - replacement of passwords by two-factor authentication
The standard password authentication does not provide for security level sufficient for modern companies. The following information security risks can be associated with password usage. The users do not utilize complex or longer passwords, as a rule, because these are difficult to devise and memorize. This allows an intruder to mine employee account passwords. The employees use one and the same password for all applications and services quite frequently. This makes the problem even worse, since, having mined the password to one of the systems, an intruder gains access to all the resources available to the compromised user.
Meeting the requirements of PCI DSS standard to user authentication - solving the problems of multifactorial authentication in information systems
In April 2016, the new PCI DSS 3.2 version was adopted. Some of the changes introduced in this version become effective on the February 1st, 2018. These are changes in employee authentication upon access to bank information systems. In particular, starting from February 1st, 2018, multi-factor authentication becomes mandatory for a number of access scenarios. The PCI DSS defines the following factors or methods of user authentication: something that you know; something that you have; something that you possess. Here are some examples of the mentioned factors, that are the most frequently used in practice of multi-factor authentication.