HANNOVER MESSE 2019,
01 - 05 April
A Public Key Infrastructure consists of policies, standards, hardware, and software to create, distribute, revoke, and manage digital certificates throughout the lifecycle. It ensures secure access to physical and digital resources, ensures secure communication between people, software and devices, and enables digital signing of documents and transactions.The Nexus PKI solution includes:
• Centralized PKI certificate management
• PKI Credential Management
• PKI Middleware
• The highest possible protection of data and information
Nexus provides several types of authenticators, such as RFID cards and key fobs, PKI cards, photo ID cards, one-time password (OTP) tokens, mobile IDs, and virtual ...
Nexus' strong multi-factor authentication solution supports multiple authentication methods that can be used depending on the level of security required:
• Two-factor-authentication ...
IoT applications are used in our homes, vehicles, cities, but also in agricultural and industrial plants and production lines. For every IoT application, the security ...
Many companies protect the access to their buildings. The requirements for this are an efficient and policy-based authorization management and identity management ...