Resources

PrimeKey Tech Sales on 5G Security
Blog post
Telecom

New ways to build mobile networks

This post is about the new opportunities and challenges that arise for mobile operators using commercial off-the-shelf (COTS) hardware and virtualized software. Learn about new ways to build mobile networks and how EJBCA gives customers an advantage ove...
Webinar-EJBCA-DevSecOps-with-Ansible_2
On-demand webinar
DevOps
EJBCA Cloud

EJBCA DevSecOps with Ansible – Automating PKI Deployments

EJBCA DevSecOps with Ansible  About how to automate PKI deployments and the rationale behind leveraging automation to set up PKI environments. By leveraging automation to set up PKI environments, the time for deployments can be decreased by impressiv...
Connected factory
Guide
IoT & IIoT security
Manufacturing

Securing the connected factory of tomorrow

Securing the connected factory of tomorrow Industrial Internet of Things (IIoT) and Industry 4.0 can accelerate and improve business outcomes, bringing immense value to organizations. In industries such as manufacturing, new service offerings can be de...
DevOpsWebinar
On-demand webinar
DevOps
EJBCA Enterprise

Webinar: PKI as Code – Automating PKI Deployment with Ansible

Using Ansible as an automation and configuration tool can rapidly support new PKI use cases in drastically shorter time frames than previous manual deployments. Siemens has used Ansible to enable PKI deployments–that previously took days or weeks to set...
primekeytechdays2021pki
Blog post
About PrimeKey
Cryptography Solution
IoT & IIoT security
Manufacturing
Supply chain security
Telecom

PrimeKey Tech Days: From the Foundations of PKI to Post-Quantum Encryption

Our field, applied cryptography, is beneficial to society, government, and private enterprises alike. The technologies that we deliver as an industry are omnipresent – from organizations large and small, across the internet and into our homes. It was wi...
tomas gustavsson
Blog post
Connected vehicles
EJBCA Cloud
EJBCA Enterprise
Transportation

Securing the Identities of Connected Cars

Securing the identities of connected cars A Hybrid Approach to PKI Deployment for Modern Manufacturers Manufacturing is one of the most attacked industries, facing a range of cybersecurity challenges. The proliferation of DevOps and distributed IoT de...

Pro tip: You can also find your answers in PrimeKey Wiki

Contact us

Fill in your contact information below and we will get in touch with you.