Resources

CNC Laser cutting of metal, modern industrial technology.
Guide
Identity Authority Manager
Manufacturing
Supply chain security

Establish trust from day one – for your IoT devices

Three use cases - from production line to aftermarket  Internet of things and Industry 4.0 solutions can make our world better, smarter and more sustainable, but only when meeting the fundamental requirement of trust.  Secure supply chains, smart bu...
primekeypki-admir-e1632144884130
Blog post
Cryptography Solution

How do we deliver on agility as an IT security vendor?

In previous blog posts, we touched on how important IT infrastructure is for our modern society and why IT security vendors need to deliver robustness . It would appear that notions of agility and robustness go against each other. After all, if somethin...
Android signing schemes, compliance and crypto agility
Tech update
EJBCA Enterprise

Certificate Management for Google Chrome OS devices

Certificate Management for Google Chrome OS devices  Organizations and enterprises require users to authenticate themselves using digital certificates and implements protocols that supports this in their IT infrastructure, for example EAP-TLS authen...
primekeypki-admir-e1632144884130
Blog post
Cryptography Solution

Why IT security vendors need to deliver robustness

For mission critical IT systems, robustness is simply a must. This is nothing new or specific to IT industry. Take a bridge for example - engineers calculate maximum loads, look into specifics of the surrounding environment (geological formation, earthq...
primekeypki-admir-e1632144884130
Blog post
Cryptography Solution

The must-have qualities of applied cryptography: robustness, agility and ubiquity

Modern life revolves around digital data and a myriad of elements of society need data to flow between humans, machines, services, and increasingly also autonomous systems. In many ways, our modern lifestyle and economy is impossible without reliance on...
skola-AdobeStock_66151053
Customer story

Centralized enrollment and authentication of Microsoft Intune-managed devices

Watch the video Public school cooperative Erie 1 BOCES was looking for a solution to authenticate mobile devices of students and faculty for Wi-Fi access. PrimeKey EJBCA, with its integration with Microsoft Intune, was the scalable, cost-efficient, and...

Pro tip: You can also find your answers in PrimeKey Wiki

Contact us

Fill in your contact information below and we will get in touch with you.