FAQ (Frequently Asked Questions)
What is Embedded PKI ?
Why does my organization need Embedded PKI ?
How can we get Embedded PKI ?
Who can really afford to deploy Embedded PKI ?
We have a firewall, isn't that enough?
Will this work with other products?
Do I need to modify existing applications?
If I deploy a PKI based solution, can I really get my staff
to use it?
What is Embedded PKI ?
Embedded PKI means that PKI or the Public Key Infrastructure is
an integral part of the software. PKI provides a public key (distributed
to anyone) and a private key (known only to the user). PKI software uses
a string of numbers or keys to encrypt documents, messages, or IDs to
protect them from unauthorized access, and then decrypts them for authorized
users.
An integral part of PKI is a digital ID or certificate that identifies
a person or an organization. By identifying users, digital certificates
ensure the confidentiality and integrity of data. PKI often includes digital
signatures to further authenticate documents and enforce nonrepudiation
of business transactions.
Why does my organization need Embedded PKI ?
An organization's data is usually one of its most valuable assets. The
loss of this data can also result in substantial liability. Products with
Embedded PKI enable you to protect and to securely transmit data
via unsecured Internet connections. Software with Embedded PKI provides
the insurance you need to freely conduct e-business transactions.
How can we get Embedded PKI ?
SM Client includes Embedded PKI to transparently identify
and protect users. Used with SM Gateway , SM Client securely
identifies registered users accessing protected web and FTP sites. Only
authorized users can access protected sites and applications.
SM Gateway also logs and reports all access attempts.
Who can really afford to deploy Embedded PKI
?
SM Gateway provides the lowest cost of ownership in the industry.
SM Client is free. There are no annual or per seat license fees.
You do not need to increase your IT staff nor will you incur other maintenance
costs.
We have a firewall, isn't that enough?
Firewalls protect computer networks and users. The SM Gateway protects
networks and enterprise application servers that must be protected with
more than just passwords. Users must have the proper authentication and
the proper authorization before they can access protected applications.
Installable and portable registrations identify users. Once a user is
identified, SM Gateway 's ACL or Access Control List determines
who can access protected applications and the type of access they can
have.
Will this work with other products?
Yes, SM Gateway allows other technologies (firewalls, digital certificates,
and VPNs) to work without affecting their operation.
Do I need to modify existing applications?
No modifications are needed to existing applications.
If I deploy a PKI based solution, can I really get
my staff to use it?
SM Client is as easy to install as Adobe Acrobat Reader or WinZip
and is just as easy to use.
|