Technology
A Public Key Infrastructure (PKI) consists of hardware components, network infrastructure, network protocols, software, secure operating procedures and a legal framework. It enables users and devices to exchange data over unsecured channels such as the Internet with privacy and/or authentication. It also supports securing data at rest.
- PKI
- IRP Platform
- IPv6 Enablement
- Post Quantum Cryptography
Solutions
- Authentication for applications, Web and SaaS
- Single-click Email Signing & Encryption
- End-to-end IoT and IIoT security
- IPv6
Products
Secure Authentication Suite
Password-less crypto-challenge based authentication for workstations, web and SaaS. Using your mobile device, private key and biometrics to authenticate you to any device.
Email Security Suite
Security add-in for popular email clients for certificate based digital signing and encryption of mails with Windows, MacOS, iOS and Android support.
IDCentral
Complete Trust Management Platform based on Sixscape’s Identity Registration Protocol (IRP), a lightweight digital certificate management protocol based platform for automating certificate request, retrieval, deployment and management and integrating with other standard certificate management protocols.
IoT Security Suite
Secure digital certificate deployment and management of IoT nodes, ensure secure communication between nodes and platform and preventing rogue devices joining the network.
Unified Communications Suite
End to end encrypted chat and audio/video communications platform with file transfer, providing 100% secure communication over IPv6 with digital certificates at each end.