|
|||||||||||||||||||||
Next Generation Embedded PKI Architecture The Business Need
Despite enterprises increasing security needs, the majority of Public Key Infrastructure (PKI) implementations have failed because of their inherent complexity and difficulty in implementation. Many organizations have had such negative experiences that they have scaled back or abandoned them altogether, falling back on traditional SSL/VPN and password techniques. Organizations now require a low-cost, easy-to-deploy PKI solution that provides the increased level of security required to operate safely in today's complex threat environment. The Secure Methods Difference SecureMethods provides a low-cost, easy-to-deploy embedded PKI infrastructure that allows organizations to create the highest level of security possible. SecureMethods provides encryption, authentication, authorization and audit capabilities for all transactions. In addition to providing these benefits, SecureMethods also eliminates the need for passwords while protecting you from the problems inherent in IIS and Windows server flaws. The SecureMethods solution has been developed to address the issues of deployment and cost of advanced security solutions and is unique in its ability to significantly reduce the cost of deployment and increase the ease of use. The SecureMethods architecture protects data against four basic threats: disclosure, forgery, corruption, and repudiation. This architecture supports public key cryptographic schemes that provide a high level of security for transmitted and stored data. The SM architecture also:
The SM architecture includes SM Gateway, which mediates network transactions to protected servers and ensures that all data is securely transmitted or received. SM Gateway can work either in parallel or in conjunction with existing firewall. This level of security, ease of use, and rapid deployment is only available with the SM embedded services model. SecureMethods technology and the SecureMethods (SM) architecture offer users the ability to secure data and transactions through encryption, strong authentication, and role-based authorization. The SM Gateway supports a variety of encryption technologies and securely processes data that has been encrypted and authenticated via digital signatures, smart cards, or biometric methods irrespective of how the transmission was created (out of a web browser, email, or desktop). SM GatewayTM features the same ease of use and operates in the same way without regard for the type of connection -WAN, LAN, wireless, or dialup. SM Gateway also enables centralized authorization management, access control, and audit functions. SM Client, a no-cost software module seamlessly integrates into, and operates with industry standard web browsers to offer full digital signature support and non-repudiation services for transfers executed from within the browser environment. SecureMethods makes these features available fully free of charge. SM Client provides users the ability to encrypt and/or digitally sign any Windows-based file, including office suite, database, graphics, or multimedia files. In addition, SM Client provides:
Implementation Example Many financial services firm have tried to implement an enterprise-wide PKI solution using traditional methods but have been unable to achieve full deployment. Traditionally the barriers to implementation include cost, complexity and difficulty in getting users to change their behaviors. SecureMethods Gateway/Client solution can be implemented for 100 users in less than 30 days throughout financial services enterprises, providing encrypted, digitally signed and auditable transactions using an embedded PKI solution that is transparent to end-users. The Challenge If you're looking to implement embedded PKI in your organization, we offer two services that will prove to you that the next generation is the only viable option. SecureMethods will come to your site and help you develop an evaluation program, or we can provide a free security assessment and show you how our solutions can meet your your PKI needs. |
|||||||||||||||||||||