In the past businesses had to pay a high price recognizing that IT-security does not mean additional stress and more effort.
Nowadays IT-security not only means that computers and networks have to be protected against virus, Trojans etc, but in particular the business must protect internal data, data of institutions and offices as well as private data against data abuse.
Due to the complex worldwide interconnected processes the demand for IT-security, in particular with regard to data abuse, has increased tremendously.
A very high security level can be reached when introducing and consequently using worldwide x509 certificates. Therefore, on all our VPN routers a complete PKI administration (Public Key Infrastructur Administration) with extended import- and export functions is implemented.To avoid any discrepancy between the actual need for protection and the necessary effort of establishing and use when using x509 certificates, a detailed planning and coordination is indispensible.
According to the requirements of IT-security clear rules and regulations concerning the use and handling of x509 certificates and the entire PKI must be fixed.
For the compilation of a PKI with its CA-, sub-CA, and user certificates the answers to the following questions or regulations are of special relevance:
The above mentioned questions are only part of the questions that have to be answered in order to establish a general and efficient use of a PKI.
We are at your disposal for any further questions.