Technology from Germany
360° Managed PKI & CLM solution was developed for all customers who are looking for user-friendly software that is quick and easy to implement.
The technology basis is the powerful PKI & CLM product from the German encryption specialist MTG AG. A leading specialist in the management of cryptographic keys and identities.
Maximum Transparency
Never again expired certificates!
The user-friendly Certificate Lifecycle Management enables simple, fast and error-free creation of certificates and full transparency about the status of all your certificates.
- Clear dashboard with a complete and visual overview of all certificates provided with direct access options
- Modern user guidance for fast and smooth workflows
- All important automation interfaces are available
- Connection & migration of the Microsoft PKI is quick and easy
- Convenient access to selected Public CA providers
PKI Use Cases
Protect your sensitive business processes with secure identities
Our offer supports all important applications that require digital certificates for security.
Authentication and authorization of users, such as Windows users, computers, laptops, firewalls, routers, switches and IoT devices.
In VPNs (Virtual Private Networks), PKIs are used to authenticate the identity of the communicating parties and establish a secure, encrypted connection across public networks.
This security mechanism uses certificates to control the access of end devices to a company’s network infrastructure. End devices include PCs, laptops, printers and mobile devices. Access to the company’s network infrastructure (LAN/WLAN) is only granted once the devices have been successfully authenticated with a valid certificate.
Certificates enable employees to digitally sign their emails, thereby guaranteeing the integrity of the message and its authenticity and encrypting the content.
SSL/TLS certificates are essential for securing web applications and services. Certificates from a public certification authority (Public CA) are used for this purpose.
Mobile device management (MDM) platforms are used to manage and secure mobile devices within an organization. A PKI plays a crucial role in securing communication between mobile devices, apps, users and corporate services.
Document signing certificates are used to verify the authenticity and integrity of documents.
Digital certificates contribute significantly to the security, integrity and trust in software products and/or firmware in the context of code signing.
Product packages
Certificate Lifecycle Management (CLM)
& Public Key Infrastructure (PKI)
Two packages are available to you. Depending on whether you only need a CLM (Professional package) or also certificates from a PKI (Ultimate Package).
Professional package (CLM)
This package is suitable for customers who want to optimize the management and monitoring of their certificates and do not require certificates from an MTG Corporate PKI. The package is particularly interesting due to the possibility of connecting selected public CAs and the Microsoft CA.
- All CLM functionalities (clear dashboard, organization into areas (realms), policies, controls and approvals, certificates, roles and rights, documentation)
- Reporting & Monitoring
- Roles & rights management
- Policy Enforcement & Configuration GUI
- Public CA Connection
- Microsoft CA Connection
Ultimate package (CLM & PKI)
This offer is particularly suitable for customers who also require certificates from a private PKI or are looking for a replacement for their Microsoft PKI. The Ultimate package includes all the functions of the Professional package and also offers the functionality of a private CA.
- All functions of the Professional package
- Enterprise PKI
- Own Root CA and Sub CA
- HSM Connection & Support
- OCSP & CRL Responder
- Audit Log
- Microsoft CA Migration with specially developed auto-enrolment Connector
Regulation
Meet important regulatory requirements
Requirements from the IT Security Act, the EU GDPR, NIS2 or DORA and also industry standards or DIN ISO 27001 refer to the state of the art in their regulations for IT security. The use of digital certificates to secure digital identities forms an important basis for fulfilling the state of the art. Access control, cryptography, operational security and communication security can thus be implemented.
Compliance with all relevant data protection requirements (GDPR) are important requirements in the areas of data protection and data security, especially when data is stored outside the EU. A Managed PKI service provider from Germany guarantees users compliance with the relevant legal framework conditions.
Implement PKI Projects with Ease
Reach your goal faster with a system!
Our PKI experts are available for you and can support you in every phase of planning, implementation, operation and further development of your system. To the extent required, depending on your prior knowledge.
1
Analyze
In an initial consultation, we assess your current needs: Are you looking to replace your Microsoft PKI (AD CS) or extend it with our CLM solution? Do you currently lack a PKI and want to implement one? How many certificates do you need and for what purpose? Are there any regulatory requirements (e.g., NIS2, DORA)? Do you need additional service and support? We will present potential use cases and our software solutions to you.
2
Plan
You define the use cases you want to start with. If you haven’t already, register for our free online demo. We then schedule the kickoff meeting for your PKI project. During this complimentary consultation, our PKI experts will guide you through the initial steps. You decide the level of additional support you need. To give you planning security, we offer fixed-price packages for onboarding, implementation of use cases, and ongoing support services during operational phases.
3
Take Off
You have two months to thoroughly test your online demo and all its features. If needed, you can engage our PKI experts for detailed analysis and implementation, such as preparing a proof of concept. For maximum security in planning and implementation, we provide fixed-price packages that cover all phases of your project, from onboarding to ongoing operations.
Maximum transparency
Reach your goal faster with a system!
Our PKI experts are available for you and can support you in every phase of planning, implementation, operation and further development of your system. To the extent required, depending on your prior knowledge.
1.
Status &
Requirements Analysis
2.
Overview & Selection of use cases
3.
Conception &
Proof of Concept
4.
Productive operation & Further development
- Available immediately: Free online demo for 360° Managed PKI & CLM.
- On request: Free proof of concept with later, seamless transition to operational use - including a comprehensive free kick-off consultation with our PKI experts.
- Comprehensive advice and support from our experienced PKI experts at every stage.
- Georedundant and fail-safe operation in a multiple-certified high-security data center (including DIN ISO 27001 and DIN EN50600 Cat lll). Fiber optic connection to the main campus of the world's largest Internet hub (DE-CIX).
- Security patch management of the underlying operating systems and databases and maintenance of the PKI & CLM software.
- Monitoring the availability of the infrastructure, PKI and applications, backup and restore processes.
Analyze, Plan, Take off
Our experts will accompany you every step of the way to your own corporate PKI.