Baltimore UniCERT. www.baltimore.com. the world s leading PKI. global e security



Similar documents
Symantec Managed PKI Service Deployment Options

PRIME IDENTITY MANAGEMENT CORE

Your Location Instant NOC using Kaseya. Administrator at Remote Location Secure access to Management Console from anywhere using only a browser

Certificate Authority Product Overview Technology White Paper

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)

Using Entrust certificates with VPN

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

RSA Digital Certificate Solution

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

Technical Description. DigitalSign 3.1. State of the art legally valid electronic signature. The best, most secure and complete software for

White paper. Implications of digital certificates on trusted e-business.

Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.

Security Solutions

Enterprise SSL FEATURES & BENEFITS

Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C

Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules

Licensing Symantec Certificates

How much do you pay for your PKI solution?

The governance IT needs Easy user adoption Trusted Managed File Transfer solutions

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

Certificate Policies and Certification Practice Statements

How To Use Ncr Aptra Clear

Licensing VeriSign Certificates

Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS

White Paper: Managing Security on Mobile Phones

Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February

Secured Enterprise eprivacy Suite

Securing Data on Portable Media.

Secure Access Link. Table of Contents. Introduction. Background. avaya.com. Introduction Background Secure Access Link...

Managed Public Key Infrastructure

5 Things to Look for in a Cloud Provider When it Comes to Security

Provide access control with innovative solutions from IBM.

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

RSA SecurID Two-factor Authentication

The Use of the Simple Certificate Enrollment Protocol (SCEP) and Untrusted Devices

BlackBerry 10.3 Work and Personal Corporate

Managing SSL Security in Multi-Server Environments

Brainloop Cloud Security

Today s Best Practices: How smart business is protecting enterprise data integrity and employee privacy on popular mobile devices. Your Device Here.

How To Manage A Password Protected Digital Id On A Microsoft Pc Or Macbook (Windows) With A Password Safehouse (Windows 7) On A Pc Or Ipad (Windows 8) On An Ipad Or Macintosh (Windows 9)

Frequently Asked Questions (FAQs) SIPRNet Hardware Token

SECURITY ORGANISATION Security Awareness and the Five Aspects of Security

PKI Deployment Business Issues

Understanding Digital Certificates & Secure Sockets Layer A Fundamental Requirement for Internet Transactions

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

PortWise Access Management Suite

Strong Authentication for Secure VPN Access

Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere

Cisco AON Secure File Transfer Extension Module

Entrust Secure Web Portal Solution. Livio Merlo Security Consultant September 25th, 2003

Collaboration solutions for midsized businesses Buyer s guide

SAGE ACCPAC ARCHITECTURE

An Introduction to Entrust PKI. Last updated: September 14, 2004

How To Protect Your Data From Harm With Safenet

U. S. Department of Justice Information Technology Strategic Plan. Appendix E. Public Key Infrastructure at the Department of Justice.

Windows Phone 8.1 in the Enterprise

Entrust Managed Services PKI Administrator Guide

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

Managed Services PKI 60-day Trial Quick Start Guide

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

White Paper. From Policy to Practice: A Practical Guide to Implementing HIPAA Security Safeguards

Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions

TECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access

encryption keys, signing keys are not archived, reducing exposure to unauthorized access to the private key.

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities

PrivyLink Internet Application Security Environment *

Complying with PCI Data Security

ADDING STRONGER AUTHENTICATION for VPN Access Control

Guide to Evaluating Multi-Factor Authentication Solutions

Measuring Success Service Desk Evaluation Guide for the Midsized Business: How to Choose the Right Service Desk Solution and Improve Your ROI

Virtualized Network Services SDN solution for enterprises

SSL VPN vs. IPSec VPN

Why Digital Certificates Are Essential for Managing Mobile Devices

Sage ERP Accpac Version 6.0. Web-Enabled ERP for the Mid-Market

nexus Hybrid Access Gateway

World-Class Architecture. Ultimate Scalability. Sage Accpac ERP ARCHITECTURE

Implement best practices by using FileMaker Pro 7 as the backbone of your 21 CFR 11 compliant system.

Enhancing Organizational Security Through the Use of Virtual Smart Cards

Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Organization.

Integration Guide. SafeNet Authentication Client. Using SAC CBA for Check Point Security Gateway

MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

How To Achieve Pca Compliance With Redhat Enterprise Linux

PortWise Access Management Suite

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform

Simplifying Security with Datakey Axis Single Sign-On. White Paper

Transcription:

TM the world s leading PKI www.baltimore.com global e security

Bringing Real Business On-Line The Internet is now forming a key part of organizations operating strategy. Although most companies accept that the Web can drive massive cost savings and significantly improve service capabilities, they are also aware that important business processes cannot be brought on-line without proven e-security controls. In order to facilitate real e-business, organizations must establish the same core foundations for business that exist in the physical world namely security, identity and trust. Baltimore UniCERT is widely acknowledged as the world s leading Public Key Infrastructure (PKI) product, and has been deployed to secure the widest range of commercial activities in the digital world. Providing the same tenets of trust that exist in physical world business transactions (Privacy, Integrity, Authentication and Non-Repudiation), UniCERT addresses core security concerns associated with the Internet, and allows organizations to move key processes on-line via a range of channels such as intranets, extranets, e-mail and VPNs. Assign Unique Digital Identities Baltimore UniCERT is the most critical element at the heart of a PKI. Leveraging digital certificate technology, UniCERT uniquely identifies individuals operating in an electronic environment and enables users to digitally sign any electronic transaction. The ability to digitally sign transactions uniquely binds users to specific messages or instructions, and offers strong non-repudiation controls for organizations deploying new web-based initiatives. Making PKI Work for You A PKI needs to form a transparent sub-strata of an organization s operations, and provide the infrastructure and services necessary to support the dynamic requirements of banks, governments, and general business corporations. Working with your organization s existing IT infrastructure, UniCERT is flexible enough to incorporate new business opportunities, open enough to integrate with new applications, and scalable enough to manage demand as new e-business initiatives evolve. 3

Meeting the Security Challenge in the Digital World Policy Driven Different business processes require different levels of assurance. For example, a bank-to-bank transaction requires a significantly higher level of assurance than standard e-mail services. UniCERT enables the run-time establishment and enforcement of multiple security policies at company, departmental or individual levels. Certificates are issued in accordance with rules defined by policies, which dictate everything from registration details to certificate use, to the various levels of associated trust derived from the certificate. Scalability Baltimore UniCERT is designed to scale from small installations running on single PCs to large systems distributed across global enterprises. As an organization s PKI requirements grow in line with demand, and become more sophisticated, UniCERT offers advanced technology components that create a complete, robust and scalable security solution. UniCERT is designed to handle the issuance of tens of millions of certificates if required, and the product s unique cloning capabilities provide unprecedented performance, availability and resilience for your PKI. Flexibility Baltimore UniCERT is extremely flexible and easily adapts to the wide variety of PKI requirements including country, organization, and application-specific issues. Every aspect of UniCERT s interactions can be configured, including extensive registration options, certificate distribution methods, algorithm selection, directory and hardware support. The product can also be leveraged as a hosted, in-house or hybrid deployment. Security A Certificate Authority (CA) is the cornerstone of a PKI. It provides the ultimate point of trust, and therefore it is imperative that the CA module itself is secure. UniCERT is the world s first PKI to achieve ITSEC E3 accreditation and supports the use of smartcards and FIPS-140-1 level 4 hardware security modules. In addition, the UniCERT design provides for the signing of data in the internal database and in audit logs - providing comprehensive internal controls to ensure confidentiality, integrity and availability at all times. Openness A PKI system needs to interoperate with an organization s global business requirements and, to be of maximum benefit, must interoperate with a wide range of products such as PKI enabled applications, directories and cryptographic hardware. Baltimore Technologies has adopted a threefold approach to provide an open structured architecture: Implementation of all relevant industry standards, (e.g., X.509, PKIX, SCEP) Support for commercially prevalent applications (e.g., Netscape, MS Internet Explorer, MS Windows 2000 applications) Providing a wide and open interface to third party products Globalization One of the core value propositions of on-line business is globalization. A business that makes the move to the Internet is immediately exposed to a vast number of markets across the world. To assist in building a globally-distributed secure infrastructure, UniCERT s core capabilities include advanced support for diverse languages, including Indian and Chinese dialects. In addition, every message and log can be localized with a minimum amount of work. 4

UniCERT@Work Addressing Tangible Business Needs UniCERT is leveraged across the world to cut internal operating costs, and extend web-based security services to employees, partners and customers. While UniCERT is the technology of choice to secure highly sensitive information, it is also used to secure more 'common' day-today business communications. Companies deploy UniCERT because they have specific business issues which they need to address; both in general enterprise environments and specific vertical scenarios. Common issues include: Need to exchange sensitive or valuable information electronically Need to leverage the Internet to cut communication costs Need to leverage the Internet to improve service capabilities Need to uniquely identify users in the digital world Need to establish a legally-binding method of trading with new or existing business partners Whether you are looking to secure B2B transactions, personalize access to specific digital resources, safeguard e-mail messages, or secure VPN services within your organization, UniCERT delivers. Meeting Industry-specific Challenges Irrespective of industry, UniCERT delivers the same comprehensive yet flexible security controls for any web-driven initiative. Baltimore UniCERT has a proven track-record in a wide range of industries, and has been successfully deployed to address a broad range of vertical challenges. In the government sector, for example, UniCERT has been used to secure sensitive resources, set-up digital identity schemes and roll-out e-tax services to business and citizen communities. In healthcare, UniCERT has been used to secure mail messages between key healthcare parties, and ensure authorized access to patient information. In financial services, the widest range of financial data and processes have been secured, such as Internet banking and corporate funds transfers between partners. In the manufacturing industry, UniCERT has been deployed to cut supply chain headaches and create genuine e-collaboration frameworks on a global scale. Packaged Solutions Save Time and Money Companies need e-security, but how do they deal with the maze of vendors, technologies, and deployment options to address specific business requirements? UniCERT meets this challenge with packaged technology solutions consisting of best-of-breed components and vendors, established and tested architectures and dedicated implementation guides. Baltimore s range of UniCERT-driven solutions incorporate leading 3rd-party technologies, such as Windows 2000 desktop applications, save time and money for the customer, and enable PKI functions to be quickly deployed throughout the organization. 5

Technology Baltimore UniCERT has been fundamentally designed to complement the way your organization does business. Flexible in nature and modular in design, the UniCERT product comprises a comprehensive suite of components which can be dynamically deployed to meet existing and future demands. UniCERT Advanced Technology UniCERT Advanced comprises state-of-the-art modules designed to address specific needs of large enterprises and service providers. Delivering world-class technology to manage intricate industry and organizational challenges, the UniCERT Advanced suite delivers: Advanced Registration Certificate requests can be automatically registered and issued according to policy. Organizations can bulk issue certificates and smartcard service bureaus and wireless management systems can also be fully integrated with your PKI. Automated registration of users Bulk registration of users Wireless registration of users XKMS-based registration and validation of users Core Technology Advanced Technology UniCERT Core Technology UniCERT Core provides everything required to deploy and manage a world-class PKI. Designed to implement flexible security solutions that complement the way your organization does business, UniCERT Core easily evolves to meet your changing requirements such as integration of new applications, addition of new users, interoperability with partner organizations, and changes in corporate structure. Certificate and Registration Authorities Register and approve each and every user Divide your PKI into workable operational domains (to complement the way your organization does business) Tightly integrate new and existing directories with your PKI Manage certificate requests via email, VPN, face-toface and the Web Manage day-to-day administration duties through intuitive GUI interfaces Support the use of smartcards and USB Tokens as required Roaming Using this technology, organizations can enable end-users to digitally sign transactions from almost any Internet browser without the use of hardware tokens such as smartcards. Complete mobility for employees, partners and customers Reduce management and deployment costs Security is totally transparent to the end-user Key Archival/Retrieval Organizations can archive and retrieve a copy of a user s private encryption key. This represents an important safeguard against the loss of valuable information should decryption keys become corrupted, lost or misplaced. Securely store copy of users private keys Permits the retrieval of keys at a later date should they become corrupted/mislaid Non-repudiation remains unaffected Extended Wireless Capabilities Organizations can establish dynamic methods of registering and provisioning users either directly, or through trusted third-parties (e.g., through end-user s mobile operator) Wireless e-security framework Industry-specific solutions for enterprises and network operators 6

Worldwide Recognition Baltimore UniCERT has become one of the world s leading PKI systems used in the most demanding security environments including banking, government and e-commerce. UniCERT has been sold in over 40 countries worldwide and is marketed by Baltimore Technologies and its TrustedWorld Business and Technology Partners. As a recognized leading PKI product, Baltimore UniCERT has won numerous industry awards and has been highlighted in top industry analyst reports around the world as being the ideal solution to provide a secure foundation on which to conduct on-line business. Baltimore Technologies Receives the NSS Gold Award in an independent evaluation of PKI Systems. UniCERT provides a vastly superior out of the box experience. Overall we found UniCERT to be hard to beat in terms of value for money, features, flexibility and ease of use. Bob Walder, Director, The NSS Group. Info Security News Magazine gave UniCERT five stars, its highest rating possible in an independent review of PKI technology. UniCERT was described in the final verdict as having an Excellent graphical management interface; very flexible and easy to customize. Baltimore UniCERT named European IT Prize winner. Baltimore Technologies was chosen from over 300 company submissions by independent experts from 16 European countries. UniCERT won this award based on its technical capability in conjunction with its market domination as the preferred Certification Authority for both national and enterprise level deployment. Aberdeen Group Profile Highlights Baltimore UniCERT s Leading Position in Global e-security Market. While Baltimore can stand alone as one of the best-of-breed suppliers of PKI, cryptographic technology, and professional services, its focus on simplicity, ease-of-use and customization is currently unique among suppliers of certificate-based solutions. The Radicatti Report. Mid-size to large organizations who are looking to deploy PKI should evaluate Baltimore UniCERT as their platform of choice. Baltimore s experience in building massive CAs for the commercial third party vendors shows experience in working with scaling issues. Baltimore Technologies Wins Frost & Sullivan Customer Focus Award. Baltimore clearly differentiates itself as a market winner through its ability to provide highly scalable, standards driven products such as Baltimore UniCERT, a Certificate Authority system which offers users greater compatibility with applications in multivendor environments, said Kumar Gangwani, information technology analyst for Frost & Sullivan. 7

TM www.baltimore.com/unicert info@baltimore.com 2002 Baltimore Technologies plc. All rights reserved. Global e-security, the Baltimore Logo and Baltimore product names including Baltimore UniCERT and Baltimore Telepathy are all trademarks of Baltimore Technologies. All other trademarks are the property of their respective owners. Users should ensure that they comply with all national legislation regarding the export, import and use of cryptography. MAG0302-UC001