PKI_101_onePage

1
EVERY INDUSTRY GOING DIGITAL An evolution to new business models that feature cloud apps, mobile workforces, Internet of Things, agile innovation, connected customers and virtually anything-as-a-service. PKI & the Rise of DIGITAL BUSINESS THE UPSIDE Employees, customers, partners, and suppliers connected to the enterprise with real-time data flowing from products and services. THE DOWNSIDE So can hackers, thieves and others with bad intentions. KEY QUESTION How do you capitalize on all the upside of Digital Business without creating new security risks? The Key Challenge of DIGITAL BUSINESS PKI (Public Key Infrastructure) Provide every authorized person, device and app in the ecosystem with a trusted identity — and highly secure channels for sending information and conducting transactions. The Key Enabler of DIGITAL BUSINESS How Does PKI WORK? DIGITAL CERTIFICATES Every authorized person, device and app gets a digital certificate that proves their identity — think of it as a digital ID card or passport. PUBLIC & PRIVATE KEYS Everyone also gets automated digital tools called “keys” that allow them to scramble information when it’s sent — and decode it when it’s received. The Cool Security Aspects of PKI 1 NO THEFT Because messages are encrypted, they’re useless to anyone who steals them. 2 NO TAMPERING Encrypted information can’t be altered in transit — so if you receive something, you know it’s authentic. 3 NON-REPUDIATION People cannot claim they didn’t receive messages or information or payments because it is all tracked. The Cool Enablement Aspects of PKI 1 PROCESS TRANSFORMATION Make your business faster, smarter and more agile — from innovation to customer service to partner connectivity 2 VALUE CREATION Create entirely new offerings — and deliver them anywhere, anytime with cloud simplicity. 3 ROCK STAR TEAMS Allow people to work, collaborate and innovate — without traditional boundaries. How Does ENTRUST DATACARD PKI Enable All of This? Most enterprises have so many authorized users, devices and apps to identify and secure — our PKI solution makes it all manageable. Digital business is vastly increasing the interaction between devices, users, and systems — between the physical and digital — our PKI solution ensures trust and protection in these interactions. DIGITAL DNA The Why & How of PKI MIGRATION THE WHY THE HOW DIGITAL BUSINESS IS A GO Your new digital plan requires a new approach to enablement & security VENDOR SELECTION Study your PKI options and choose a vendor who enables and secures your vision COMPLIANCE & REGULATORY New rules require non-reputable audit trails or serious security for new processes MANAGED SERVICE OR ON-PREM? Your security requirements will likely drive this choice — along with your budget, of course FINANCIAL BENEFITS OF PKI Gain efficiencies vs point solutions while improving security. BUILD A TEAM It doesn’t have to be big, just really smart — it also can include experts from your PKI vendor VENDOR CHANGE You and your old PKI vendor are simply parting ways ALL ABOUT THE METRICS! The impact of PKI is easy to measure — what matters most to you? FREE PKI PKI 101

Transcript of PKI_101_onePage

EVERY INDUSTRY GOING DIGITAL

An evolution to new business models that feature

cloud apps, mobile workforces, Internet of Things,

agile innovation, connected customers and

virtually anything-as-a-service.

PKI & the Rise ofDIGITAL BUSINESS

THE UPSIDE

Employees, customers, partners,

and suppliers connected to the

enterprise with real-time data

flowing from products and services.

THE DOWNSIDE

So can hackers, thieves

and others with bad intentions.

KEY QUESTION

How do you capitalize on all

the upside of Digital Business

without creating new security risks?

The Key Challenge ofDIGITAL BUSINESS

PKI (Public Key Infrastructure)

Provide every authorized person, device and app

in the ecosystem with a trusted identity — and highly secure channels

for sending information and conducting transactions.

The Key Enabler ofDIGITAL BUSINESS

How DoesPKI WORK?

DIGITAL CERTIFICATES

Every authorized person, device and app gets a digital certificate that

proves their identity — think of it as a digital ID card or passport.

PUBLIC & PRIVATE KEYS

Everyone also gets automated digital tools called “keys” that allow them to

scramble information when it’s sent — and decode it when it’s received.

The Cool Security Aspects of PKI

1

NO THEFT

Because messages are

encrypted, they’re useless to

anyone who steals them.

2

NO TAMPERING

Encrypted information can’t

be altered in transit — so if you

receive something, you know

it’s authentic.

3

NON-REPUDIATION

People cannot claim they didn’t

receive messages or information

or payments because it is

all tracked.

The Cool Enablement Aspects of PKI

1

PROCESS TRANSFORMATION

Make your business faster,

smarter and more agile — from

innovation to customer service

to partner connectivity

2

VALUE CREATION

Create entirely new offerings

— and deliver them anywhere,

anytime with cloud simplicity.

3

ROCK STAR TEAMS

Allow people to work,

collaborate and innovate —

without traditional boundaries.

How DoesENTRUST DATACARD PKI

Enable All of This?

Most enterprises have so many authorized users, devices and apps to identify and secure —

our PKI solution makes it all manageable.

Digital business is vastly increasing the interaction between devices, users, and systems — between

the physical and digital — our PKI solution ensures trust and protection in these interactions.

DIGITAL DNA

The Why & How of PKI MIGRATION

THEWHY

THEHOW

DIGITAL BUSINESS IS A GO

Your new digital plan requires a new approach to

enablement & security

VENDOR SELECTION

Study your PKI options and choose a vendor who enables

and secures your vision

COMPLIANCE & REGULATORY

New rules require non-reputable audit trails or serious security for

new processes

MANAGED SERVICE OR ON-PREM?

Your security requirements will likely drive this choice — along with your budget, of course

FINANCIAL BENEFITS OF PKI

Gain efficiencies vs point solutions while

improving security.

BUILD A TEAM

It doesn’t have to be big, just really smart — it also can include

experts from your PKI vendor

VENDOR CHANGE

You and your old PKI vendor are simply parting ways

ALL ABOUT THE METRICS!

The impact of PKI is easy to measure — what matters

most to you?

FREEPKI

FREEPKI

FREEPKI

FREEPKI

FREEPKI

FREEPKI

FREEPKI

FREEPKI

101010101010101010100101010101010101010101010

101010101010101010101

INTERNET OF THINGSconnected devices by 2020

28BCLOUD ADOPTION

of all data now stored in The Cloud

36%MOBILE ENTERPRISE

of all employees mobile workers by 2020

72%

PKI 101

EVERYTHING & EVERYONE BECOMING CONNECTED

RISE OF DIGITAL BUSINESSWhat is driving the move to connected ecosystems?

The concept of a physical perimeter no longer applies

10101010101010101010101101010101010101010101010101010101010101101010101010101010101010101010101010101010110101010101010101010101010101010101010110101101010101010101010101010101010101010101101010101010101010101010101010101010101010110101

010101010010101010101010101010101010101010110101101010101010101010101010101010101010101101010101010101010101010101010101010101010110101101010101010101010101010101101011010101010101010101010101010101010101011010101010101010101010101010101010101010101101010101010

01010101010110101010101010101010101010101010101010110101010101010101010101010101010101010101011010110101010101

PKI SOLVES THE IDENTITY PROBLEM

ENTRUST DATACARD MAKES IT EASY

CHOICE OF DEPLOYMENT MODELS EXPERT SUPPORTCOMPLEXITY SOLVED

ANALYSTS AGREE

CORE ELEMENTSOF PKI

HOW IT WORKS MOST COMMONUSE CASES

MANAGED SERVICEON-PREMISE

IDENTITY PROBLEM

PASSWORDS

Besides obvious security risks

for identifying people, they simply

don’t work for devices & apps.

Digital Certificates

Hash Algorithms

Encryption

Public & Private Keys

Digital Signatures

CertificateAuthorityCertificate Encrypt

Validation Validation

Certificate

01 0203 04

USER IDENTITY

Remote Access

Mobile Device

Transaction Signing

DEVICE IDENTITY

Network Auth & ID

Device & Server auth

Endpoint Security

APP IDENTITY

Code Signing

Secure Communications

Highly accessible PKI blackbelts ensure simplicity & security.

CIOs once avoided

PKI because they

thought it was too

complex to manage

PKI is undergoing a

massive and critical

resurgence

Lightweight cloud model with fast deployment & full scalability

For organizations that want to maintain full control

ABC

ABC

Decrypt

101010101010101010100101010101010101010101010

101010101010101010101

INTERNET OF THINGSconnected devices by 2020

28BCLOUD ADOPTION

of all data now stored in The Cloud

36%MOBILE ENTERPRISE

of all employees mobile workers by 2020

72%

PKI 101

EVERYTHING & EVERYONE BECOMING CONNECTED

RISE OF DIGITAL BUSINESSWhat is driving the move to connected ecosystems?

The concept of a physical perimeter no longer applies

10101010101010101010101101010101010101010101010101010101010101101010101010101010101010101010101010101010110101010101010101010101010101010101010110101101010101010101010101010101010101010101101010101010101010101010101010101010101010110101

010101010010101010101010101010101010101010110101101010101010101010101010101010101010101101010101010101010101010101010101010101010110101101010101010101010101010101101011010101010101010101010101010101010101011010101010101010101010101010101010101010101101010101010

01010101010110101010101010101010101010101010101010110101010101010101010101010101010101010101011010110101010101

PKI SOLVES THE IDENTITY PROBLEM

ENTRUST DATACARD MAKES IT EASY

CHOICE OF DEPLOYMENT MODELS EXPERT SUPPORTCOMPLEXITY SOLVED

ANALYSTS AGREE

CORE ELEMENTSOF PKI

HOW IT WORKS MOST COMMONUSE CASES

MANAGED SERVICEON-PREMISE

IDENTITY PROBLEM

PASSWORDS

Besides obvious security risks

for identifying people, they simply

don’t work for devices & apps.

Digital Certificates

Hash Algorithms

Encryption

Public & Private Keys

Digital Signatures

CertificateAuthorityCertificate Encrypt

Validation Validation

Certificate

01 0203 04

USER IDENTITY

Remote Access

Mobile Device

Transaction Signing

DEVICE IDENTITY

Network Auth & ID

Device & Server auth

Endpoint Security

APP IDENTITY

Code Signing

Secure Communications

Highly accessible PKI blackbelts ensure simplicity & security.

CIOs once avoided

PKI because they

thought it was too

complex to manage

PKI is undergoing a

massive and critical

resurgence

Lightweight cloud model with fast deployment & full scalability

For organizations that want to maintain full control

ABC

ABC

Decrypt