Technology from Germany

360° Managed PKI & CLM solution was developed for all customers who are looking for user-friendly software that is quick and easy to implement.

The technology basis is the powerful PKI & CLM product from the German encryption specialist MTG AG. A leading specialist in the management of cryptographic keys and identities.

Grafische Benutzeroberfläche der CLM online Demo der 360° GSA

Maximum Transparency

Never again expired certificates!

The user-friendly Certificate Lifecycle Management enables simple, fast and error-free creation of certificates and full transparency about the status of all your certificates.

PKI Use Cases

Protect your sensitive business processes with secure identities

Our offer supports all important applications that require digital certificates for security.

Authentication and authorization of users, such as Windows users, computers, laptops, firewalls, routers, switches and IoT devices.

In VPNs (Virtual Private Networks), PKIs are used to authenticate the identity of the communicating parties and establish a secure, encrypted connection across public networks.

This security mechanism uses certificates to control the access of end devices to a company’s network infrastructure. End devices include PCs, laptops, printers and mobile devices. Access to the company’s network infrastructure (LAN/WLAN) is only granted once the devices have been successfully authenticated with a valid certificate.

Certificates enable employees to digitally sign their emails, thereby guaranteeing the integrity of the message and its authenticity and encrypting the content.

SSL/TLS certificates are essential for securing web applications and services. Certificates from a public certification authority (Public CA) are used for this purpose.

Mobile device management (MDM) platforms are used to manage and secure mobile devices within an organization. A PKI plays a crucial role in securing communication between mobile devices, apps, users and corporate services.

Document signing certificates are used to verify the authenticity and integrity of documents.

Digital certificates contribute significantly to the security, integrity and trust in software products and/or firmware in the context of code signing.

A professional depiction of corporate management and strategic planning

Product packages

Certificate Lifecycle Management (CLM)
& Public Key Infrastructure (PKI)

Two packages are available to you. Depending on whether you only need a CLM (Professional package) or also certificates from a PKI (Ultimate Package).

Professional package (CLM)

This package is suitable for customers who want to optimize the management and monitoring of their certificates and do not require certificates from an MTG Corporate PKI. The package is particularly interesting due to the possibility of connecting selected public CAs and the Microsoft CA.

Ultimate package (CLM & PKI)

This offer is particularly suitable for customers who also require certificates from a private PKI or are looking for a replacement for their Microsoft PKI. The Ultimate package includes all the functions of the Professional package and also offers the functionality of a private CA.

Regulation

Meet important regulatory requirements

Requirements from the IT Security Act, the EU GDPR, NIS2 or DORA and also industry standards or DIN ISO 27001 refer to the state of the art in their regulations for IT security. The use of digital certificates to secure digital identities forms an important basis for fulfilling the state of the art. Access control, cryptography, operational security and communication security can thus be implemented.

Compliance with all relevant data protection requirements (GDPR) are important requirements in the areas of data protection and data security, especially when data is stored outside the EU. A Managed PKI service provider from Germany guarantees users compliance with the relevant legal framework conditions.

Implement PKI Projects with Ease

Reach your goal faster with a system!

Our PKI experts are available for you and can support you in every phase of planning, implementation, operation and further development of your system. To the extent required, depending on your prior knowledge.

1

Analyze

In an initial consultation, we assess your current needs: Are you looking to replace your Microsoft PKI (AD CS) or extend it with our CLM solution? Do you currently lack a PKI and want to implement one? How many certificates do you need and for what purpose? Are there any regulatory requirements (e.g., NIS2, DORA)? Do you need additional service and support? We will present potential use cases and our software solutions to you.

2

Plan

You define the use cases you want to start with. If you haven’t already, register for our free online demo. We then schedule the kickoff meeting for your PKI project. During this complimentary consultation, our PKI experts will guide you through the initial steps. You decide the level of additional support you need. To give you planning security, we offer fixed-price packages for onboarding, implementation of use cases, and ongoing support services during operational phases.

3

Take Off

You have two months to thoroughly test your online demo and all its features. If needed, you can engage our PKI experts for detailed analysis and implementation, such as preparing a proof of concept. For maximum security in planning and implementation, we provide fixed-price packages that cover all phases of your project, from onboarding to ongoing operations.

Maximum transparency

Reach your goal faster with a system!

Our PKI experts are available for you and can support you in every phase of planning, implementation, operation and further development of your system. To the extent required, depending on your prior knowledge.

1.

Status &
Requirements Analysis

2.

Overview & Selection of use cases

3.

Conception &
Proof of Concept

4.

Productive operation & Further development
Gray triangle with a green border
Analyze, Plan, Take off

Our experts will accompany you every step of the way to your own corporate PKI.