PKI_101_onePage
-
Upload
andrew-smith -
Category
Documents
-
view
16 -
download
1
Transcript of PKI_101_onePage
EVERY INDUSTRY GOING DIGITAL
An evolution to new business models that feature
cloud apps, mobile workforces, Internet of Things,
agile innovation, connected customers and
virtually anything-as-a-service.
PKI & the Rise ofDIGITAL BUSINESS
THE UPSIDE
Employees, customers, partners,
and suppliers connected to the
enterprise with real-time data
flowing from products and services.
THE DOWNSIDE
So can hackers, thieves
and others with bad intentions.
KEY QUESTION
How do you capitalize on all
the upside of Digital Business
without creating new security risks?
The Key Challenge ofDIGITAL BUSINESS
PKI (Public Key Infrastructure)
Provide every authorized person, device and app
in the ecosystem with a trusted identity — and highly secure channels
for sending information and conducting transactions.
The Key Enabler ofDIGITAL BUSINESS
How DoesPKI WORK?
DIGITAL CERTIFICATES
Every authorized person, device and app gets a digital certificate that
proves their identity — think of it as a digital ID card or passport.
PUBLIC & PRIVATE KEYS
Everyone also gets automated digital tools called “keys” that allow them to
scramble information when it’s sent — and decode it when it’s received.
The Cool Security Aspects of PKI
1
NO THEFT
Because messages are
encrypted, they’re useless to
anyone who steals them.
2
NO TAMPERING
Encrypted information can’t
be altered in transit — so if you
receive something, you know
it’s authentic.
3
NON-REPUDIATION
People cannot claim they didn’t
receive messages or information
or payments because it is
all tracked.
The Cool Enablement Aspects of PKI
1
PROCESS TRANSFORMATION
Make your business faster,
smarter and more agile — from
innovation to customer service
to partner connectivity
2
VALUE CREATION
Create entirely new offerings
— and deliver them anywhere,
anytime with cloud simplicity.
3
ROCK STAR TEAMS
Allow people to work,
collaborate and innovate —
without traditional boundaries.
How DoesENTRUST DATACARD PKI
Enable All of This?
Most enterprises have so many authorized users, devices and apps to identify and secure —
our PKI solution makes it all manageable.
Digital business is vastly increasing the interaction between devices, users, and systems — between
the physical and digital — our PKI solution ensures trust and protection in these interactions.
DIGITAL DNA
The Why & How of PKI MIGRATION
THEWHY
THEHOW
DIGITAL BUSINESS IS A GO
Your new digital plan requires a new approach to
enablement & security
VENDOR SELECTION
Study your PKI options and choose a vendor who enables
and secures your vision
COMPLIANCE & REGULATORY
New rules require non-reputable audit trails or serious security for
new processes
MANAGED SERVICE OR ON-PREM?
Your security requirements will likely drive this choice — along with your budget, of course
FINANCIAL BENEFITS OF PKI
Gain efficiencies vs point solutions while
improving security.
BUILD A TEAM
It doesn’t have to be big, just really smart — it also can include
experts from your PKI vendor
VENDOR CHANGE
You and your old PKI vendor are simply parting ways
ALL ABOUT THE METRICS!
The impact of PKI is easy to measure — what matters
most to you?
FREEPKI
FREEPKI
FREEPKI
FREEPKI
FREEPKI
FREEPKI
FREEPKI
FREEPKI
101010101010101010100101010101010101010101010
101010101010101010101
INTERNET OF THINGSconnected devices by 2020
28BCLOUD ADOPTION
of all data now stored in The Cloud
36%MOBILE ENTERPRISE
of all employees mobile workers by 2020
72%
PKI 101
EVERYTHING & EVERYONE BECOMING CONNECTED
RISE OF DIGITAL BUSINESSWhat is driving the move to connected ecosystems?
The concept of a physical perimeter no longer applies
10101010101010101010101101010101010101010101010101010101010101101010101010101010101010101010101010101010110101010101010101010101010101010101010110101101010101010101010101010101010101010101101010101010101010101010101010101010101010110101
010101010010101010101010101010101010101010110101101010101010101010101010101010101010101101010101010101010101010101010101010101010110101101010101010101010101010101101011010101010101010101010101010101010101011010101010101010101010101010101010101010101101010101010
01010101010110101010101010101010101010101010101010110101010101010101010101010101010101010101011010110101010101
PKI SOLVES THE IDENTITY PROBLEM
ENTRUST DATACARD MAKES IT EASY
CHOICE OF DEPLOYMENT MODELS EXPERT SUPPORTCOMPLEXITY SOLVED
ANALYSTS AGREE
CORE ELEMENTSOF PKI
HOW IT WORKS MOST COMMONUSE CASES
MANAGED SERVICEON-PREMISE
IDENTITY PROBLEM
PASSWORDS
Besides obvious security risks
for identifying people, they simply
don’t work for devices & apps.
Digital Certificates
Hash Algorithms
Encryption
Public & Private Keys
Digital Signatures
CertificateAuthorityCertificate Encrypt
Validation Validation
Certificate
01 0203 04
USER IDENTITY
Remote Access
Mobile Device
Transaction Signing
DEVICE IDENTITY
Network Auth & ID
Device & Server auth
Endpoint Security
APP IDENTITY
Code Signing
Secure Communications
Highly accessible PKI blackbelts ensure simplicity & security.
CIOs once avoided
PKI because they
thought it was too
complex to manage
PKI is undergoing a
massive and critical
resurgence
Lightweight cloud model with fast deployment & full scalability
For organizations that want to maintain full control
ABC
ABC
Decrypt
101010101010101010100101010101010101010101010
101010101010101010101
INTERNET OF THINGSconnected devices by 2020
28BCLOUD ADOPTION
of all data now stored in The Cloud
36%MOBILE ENTERPRISE
of all employees mobile workers by 2020
72%
PKI 101
EVERYTHING & EVERYONE BECOMING CONNECTED
RISE OF DIGITAL BUSINESSWhat is driving the move to connected ecosystems?
The concept of a physical perimeter no longer applies
10101010101010101010101101010101010101010101010101010101010101101010101010101010101010101010101010101010110101010101010101010101010101010101010110101101010101010101010101010101010101010101101010101010101010101010101010101010101010110101
010101010010101010101010101010101010101010110101101010101010101010101010101010101010101101010101010101010101010101010101010101010110101101010101010101010101010101101011010101010101010101010101010101010101011010101010101010101010101010101010101010101101010101010
01010101010110101010101010101010101010101010101010110101010101010101010101010101010101010101011010110101010101
PKI SOLVES THE IDENTITY PROBLEM
ENTRUST DATACARD MAKES IT EASY
CHOICE OF DEPLOYMENT MODELS EXPERT SUPPORTCOMPLEXITY SOLVED
ANALYSTS AGREE
CORE ELEMENTSOF PKI
HOW IT WORKS MOST COMMONUSE CASES
MANAGED SERVICEON-PREMISE
IDENTITY PROBLEM
PASSWORDS
Besides obvious security risks
for identifying people, they simply
don’t work for devices & apps.
Digital Certificates
Hash Algorithms
Encryption
Public & Private Keys
Digital Signatures
CertificateAuthorityCertificate Encrypt
Validation Validation
Certificate
01 0203 04
USER IDENTITY
Remote Access
Mobile Device
Transaction Signing
DEVICE IDENTITY
Network Auth & ID
Device & Server auth
Endpoint Security
APP IDENTITY
Code Signing
Secure Communications
Highly accessible PKI blackbelts ensure simplicity & security.
CIOs once avoided
PKI because they
thought it was too
complex to manage
PKI is undergoing a
massive and critical
resurgence
Lightweight cloud model with fast deployment & full scalability
For organizations that want to maintain full control
ABC
ABC
Decrypt