Insights and Outlooks from the Digital Identity Market Leader

Sep 24, 2013 11:58:24 AM
Cleveland, OH - September 24, 2013 - Certified Security Solutions' Certificate Management System (CMS) is featured in the AirWatch Marketplace as a fully integrated mobile certificate solution. Developed to give AirWatch customers [...]
Jul 25, 2012 5:15:44 AM
The Certificate Management System (CMS), formerly known as the Certificate Reporting Tool (CRT), as referenced below, provides reporting and notification capabilities to an existing Public Key Infrastructure (PKI). The reports and [...]
Jul 11, 2012 5:51:39 AM
Why PKI Procedures are so important to your business Most people who are familiar with Public Key Infrastructure have been aware of the unfortunate events that happened to the Dutch Public CA DigiNotar. As a both a Dutch native an [...]
Mar 15, 2012 6:39:29 AM
Certified Security Solutions sent a team to the 2012 RSA Security Conference in San Francisco where one of the underlying themes was mobile security. Located in the Microsoft Pavilion, team CSS boasted a 'Got PKI?' theme centered [...]
Feb 9, 2012 4:00:13 AM
The popularity of Apple’s iPads and iPhones among consumers are well documented, but recent findings from Forrester Research shows that these devices are gaining steam in the corporate world. The “Consumerization of IT” or BYOD (B [...]
Jun 2, 2011 5:00:11 AM
It is safe to say that everything has gone digital. In an age where people are farming virtual farms and tending to online fish tanks, why wouldn't the need for a "virtual signature" become apparent? When it comes to replacing you [...]
May 31, 2011 11:55:35 AM
CIOs, CSOs and IT Security personnel are confronted with the realization that the RSA SecurID breach may have impacts that extend well beyond RSA itself, and into its customer base. While the admission of a breach at RSA this past [...]
Apr 18, 2011 5:00:16 AM
SHA-1 is a widely adopted hash algorithm that can no longer be considered trustworthy. Current PKI design analysts must weigh the benefits of implementing SHA-2 verses the compatibility problems associated with its adoption. This [...]
Apr 14, 2011 3:20:42 PM
iOS devices such as iPads and iPhones are quickly becoming a part of the enterprise IT landscape, in a trend sometimes referred to as “the consumerization of IT.” From a security practitioner’s standpoint, there are a number of fa [...]