CRYPTOGRAPHY CONSULTINGENCRYPTIONPKI

Despi­te the avai­la­bi­li­ty of relia­ble encryp­ti­on tech­no­lo­gies, encryp­ti­on, strong authen­ti­ca­ti­on and digi­tal iden­ti­ties are rare­ly used in enter­pri­se net­works. Espe­ci­al­ly appli­ed cryp­to­gra­phy, i.e. the use of pro­ven cryp­to­gra­phic methods in user-fri­end­ly appli­ca­ti­ons, is a valuable approach for achie­ving com­pli­ance goals.

In indi­vi­du­al cus­to­mer work­shops, we deve­lop via­ble encryp­ti­on and authen­ti­ca­ti­on con­cepts that reflect the cur­rent sta­te of the art.

Topics

  • Encryp­ti­on of end devices
  • Device encryp­ti­on for remo­va­ble media
  • Use of e‑mail encryp­ti­on and tech­no­lo­gy selection 
    • S/MIME encryp­ti­on
    • OpenPGP / PGP encryption
    • Ad-hoc email encryp­ti­on and secu­re data exchange
    • Domain encryp­ti­on
    • SMTP/TLS trans­port encryption
    • PKI and digi­tal identities
  • Sel­ec­tion of a cryp­to­gra­phic hard­ware secu­ri­ty modu­le (HSM)
  • Use of mul­ti-fac­tor authentication

Cryp­to­gra­phy con­sul­ting is pro­vi­ded in coope­ra­ti­on with the encryp­ti­on experts CSPD.at. SEC4YOU recom­mends the Cryp­toP­ro Secu­ri­ty pro­ducts deve­lo­ped in Austria.

YOUR ADVANTAGES

  • Secu­re use of cryp­to­gra­phy to pro­tect sen­si­ti­ve data

 

  • Use of BSI recom­men­da­ti­ons for encryp­ti­on and authentication

 

  • Use of fle­xi­ble mul­ti-fac­tor authentication

 

  • Best prac­ti­ce recom­men­da­ti­on for PKI, key manage­ment and digi­tal identities

 

  • Cost savings through effi­ci­ent deploy­ment planning

Ques­ti­ons about cryp­to­gra­phy consulting? 

Would you like to talk to an expert?