Android signing schemes, compliance and crypto agility
Tech update
EJBCA Enterprise
SignServer Cloud
SignServer Enterprise

Thales Data Protection on Demand with PrimeKey’s Flexible Deployment Options

Thales Data Protection on Demand (DPoD) is a cloud-based HSM (Hardware Security Module) platform that provides on-demand encryption and key management services through an online marketplace. This means that there is no HSM hardware to buy, deploy and ma...
Attorneys talking
Customer story
EJBCA Enterprise
Trust Service Provider

Bundesnotarkammer – Innovation and security in German notaries

To build a brand-new Trust Service Provider (TSP) solution for secure communication and signing from scratch is never a simple task, no matter the size of the project. If you then add a use case involving new international compliance rules, legal docume...
Common Criteria Adventure map
Blog post
EJBCA Enterprise

The QA Adventure of Common Criteria Certification

This is the first time that I have been involved in a Common Criteria certification and I am proud to have been entrusted with the responsibility for the project. My name is Maggie and for the past year, my QA team and I have been on the adventure of ce...
Certified Software and Hardware
Blog post
EJBCA Enterprise
Trust Service Provider

About the Common Criteria Certification – New updates to global requirements

PrimeKey has now completed the process to obtain our second Common Criteria certification for the EJBCA Enterprise software. Since our first Common Criteria certification in 2012, global requirements have gone through a lot of changes. The software we h...
Blog post
About PrimeKey

Why I’m Excited for Keyfactor and PrimeKey Coming Together

The Internet-connected society is already upon us. This past year or so, we were all forced to meet digitally even more than we used to or wanted to. But the change started earlier, and it has only accelerated now. For instance, an Ericsson mobility rep...
White paper
Code signing
Identity Authority Manager
IoT & IIoT security

Cybersecurity – An enabler for critical infrastructure

Learn about the secure implementation of an IoT solution in an IIoT electric utilities environment, specifically transmission. This white paper by Siemens Energy and PrimeKey also covers PKI, mutual authentication, secure certificate imprinting, product...

Pro tip: You can also find your answers in PrimeKey Wiki

Contact us

Fill in your contact information below and we will get in touch with you.