DIY PKI

Presented by

Rae Barton, PKI expert at Gemalto

About this talk

Public Key Infrastructure (PKI) is a well-known security protocol used by some of the world’s largest governments and top enterprises, but it’s a technology that also affords many possibilities in new and growing industries. Even small to medium sized businesses can greatly benefit from PKI. However, PKI is also often mistakenly perceived as being difficult to deploy. Gemalto is addressing this common misconception. The next webinar in our PKI series, DIY PKI, will walk attendees through the entire process of setting up a PKI environment and how to manage it. We have developed a five step process to make it easy for security professionals to get their PKI system up and running with minimal time spent. The five step implementation method will give you an idea of how to set up a two tier Microsoft PKI infrastructure with Gemalto SafeNet Authentication Manager and SafeNet Luna HSM to perform smart card log on for small to medium sized enterprises. Attendees of the DIY PKI webinar will learn: -Challenges of PKI deployment -Overall PKI integration ecosystem -Common use cases deployed in enterprises: Smart card logon – What happens in the backgrounnd, email encryption/signing Step by step implementation steps oInstall and configure a Hardware Security Module (HSM) oInstall the root CA and configure it with the HSM oInstall and configure the issuing CA oConfigure the permissions of users and create certificate templates oInstall and configure an authentication manager For the purpose of this webinar and using Gemalto’s five step propriety approach, we will use our SafeNet line of technologies to demonstrate the implementation of the PKI solution.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (374)
Subscribers (38560)
With over 280,000 members, the Information Security Community is the largest community of cybersecurity professionals in the industry. Let's build a network that connects people, opportunities, and ideas. If you are involved in purchasing, selling, designing, marketing ... or using information security solutions - this group is for you. Covered topics include compliance, encryption, anti-virus, malware, cloud security, data protection, hacking, network security, virtualization, and more.