The access protection on IT systems is becoming increasingly important. The unique identification of the user is only one aspect. A company must also know what changes were made to the IT system. We have many years of experience in constructing and operating infrastructures for granting certificates and the administration of smart cards, soft tokens, and tokens. We would be happy to help you in defining the processes and implementing the authentication solutions in your existing network infrastructure. Strong authentication by means of certificates takes account of these increased demands on user identification. The use of certificates has taken on global dimensions, from logging on to the PC or gaining access to network components, up to remote access and, of course, not forgetting data encryption.
We advise and support you on the following areas: