Resources

primekeypki-admir-e1632144884130
Blog post
Cryptography Solution

Why IT security vendors need to deliver robustness

For mission critical IT systems, robustness is simply a must. This is nothing new or specific to IT industry. Take a bridge for example - engineers calculate maximum loads, look into specifics of the surrounding environment (geological formation, earthq...
primekeypki-admir-e1632144884130
Blog post
Cryptography Solution

The must-have qualities of applied cryptography: robustness, agility and ubiquity

Modern life revolves around digital data and a myriad of elements of society need data to flow between humans, machines, services, and increasingly also autonomous systems. In many ways, our modern lifestyle and economy is impossible without reliance on...
skola-AdobeStock_66151053
Customer stories

Centralized enrollment and authentication of Microsoft Intune-managed devices

Public school cooperative Erie 1 BOCES was looking for a solution to authenticate mobile devices of students and faculty for Wi-Fi access. PrimeKey EJBCA, with its integration with Microsoft Intune, was the scalable, cost-efficient, and easy-to-use solu...
CybersecurityMadrid
News
About PrimeKey

PrimeKey strengthens presence in France with new subsidiary

PrimeKey is establishing a new subsidiary in France to better support customers and expand in Be-Lux, France and southern Europe, as well as French-speaking Africa. In early 2022, PrimeKey is planning to join the Cyber Campus in La Défense, Paris, which...
EJBCA integrates with Microsoft Intune
News

PrimeKey Nominated to Join Microsoft Intelligent Security Association

PrimeKey EJBCA integrates with Microsoft Intune for scalable, efficient and secure PKI and certificate management PrimeKey has joined the Microsoft Intelligent Security Association (MISA), an ecosystem of independent software vendors and managed secur...
communication tower. cell, radio and television antennas on top
Customer stories
EJBCA Enterprise
Telecom

Powering 5G innovation through security, open standards and flexible integration

As mobile networks have become more critical to society, they have also become a target for cyberattacks, leading to more focus on infrastructure security. As operators have progressed from 4G to 5G infrastructure, ensuring security has become more diff...

Pro tip: You can also find your answers in PrimeKey Wiki

Contact us

Fill in your contact information below and we will get in touch with you.