Technology from Germany

360° Managed PKI & CLM solution was developed for all customers who are looking for user-friendly software that is quick and easy to implement.

The technology basis is the powerful PKI & CLM product from the German encryption specialist MTG AG. A leading specialist in the management of cryptographic keys and identities.

Maximum Transparency

Never again expired certificates!

The user-friendly Certificate Lifecycle Management enables simple, fast and error-free creation of certificates and full transparency about the status of all your certificates.

PKI Use Cases

Protect your sensitive business processes with secure identities

Our offer supports all important applications that require digital certificates for security.

Authentication and authorization of users, such as Windows users, computers, laptops, firewalls, routers, switches and IoT devices.

In VPNs (Virtual Private Networks), PKIs are used to authenticate the identity of the communicating parties and establish a secure, encrypted connection across public networks.

This security mechanism uses certificates to control the access of end devices to a company’s network infrastructure. End devices include PCs, laptops, printers and mobile devices. Access to the company’s network infrastructure (LAN/WLAN) is only granted once the devices have been successfully authenticated with a valid certificate.

Certificates enable employees to digitally sign their emails, thereby guaranteeing the integrity of the message and its authenticity and encrypting the content.

SSL/TLS certificates are essential for securing web applications and services. Certificates from a public certification authority (Public CA) are used for this purpose.

Mobile device management (MDM) platforms are used to manage and secure mobile devices within an organization. A PKI plays a crucial role in securing communication between mobile devices, apps, users and corporate services.

Document signing certificates are used to verify the authenticity and integrity of documents.

Digital certificates contribute significantly to the security, integrity and trust in software products and/or firmware in the context of code signing.

Product packages

Certificate Lifecycle Management (CLM)
& Public Key Infrastructure (PKI)

Two packages are available to you. Depending on whether you only need a CLM (Professional package) or also certificates from a PKI (Ultimate Package).

Professional package (CLM)

This package is suitable for customers who want to optimize the management and monitoring of their certificates and do not require certificates from an MTG Corporate PKI. The package is particularly interesting due to the possibility of connecting selected public CAs and the Microsoft CA.

Ultimate package (CLM & PKI)

This offer is particularly suitable for customers who also require certificates from a private PKI or are looking for a replacement for their Microsoft PKI. The Ultimate package includes all the functions of the Professional package and also offers the functionality of a private CA.

Regulation

Meet important regulatory requirements

Requirements from the IT Security Act, the EU GDPR, NIS2 or DORA and also industry standards or DIN ISO 27001 refer to the state of the art in their regulations for IT security. The use of digital certificates to secure digital identities forms an important basis for fulfilling the state of the art. Access control, cryptography, operational security and communication security can thus be implemented.

Compliance with all relevant data protection requirements (GDPR) are important requirements in the areas of data protection and data security, especially when data is stored outside the EU. A Managed PKI service provider from Germany guarantees users compliance with the relevant legal framework conditions.

Maximum transparency

Reach your goal faster with a system!

Our PKI experts are available for you and can support you in every phase of planning, implementation, operation and further development of your system. To the extent required, depending on your prior knowledge.

1.

Status &
Requirements Analysis

2.

Overview & Selection of use cases

3.

Conception &
Proof of Concept

4.

Productive operation & Further development
Analyze, Plan, Take off

Our experts will accompany you every step of the way to your own corporate PKI.