DIY PKI

Presented by

Rae Barton, PKI expert at Gemalto

About this talk

Public Key Infrastructure (PKI) is a well-known security protocol used by some of the world’s largest governments and top enterprises, but it’s a technology that also affords many possibilities in new and growing industries. Even small to medium sized businesses can greatly benefit from PKI. However, PKI is also often mistakenly perceived as being difficult to deploy. Gemalto is addressing this common misconception. The next webinar in our PKI series, DIY PKI, will walk attendees through the entire process of setting up a PKI environment and how to manage it. We have developed a five step process to make it easy for security professionals to get their PKI system up and running with minimal time spent. The five step implementation method will give you an idea of how to set up a two tier Microsoft PKI infrastructure with Gemalto SafeNet Authentication Manager and SafeNet Luna HSM to perform smart card log on for small to medium sized enterprises. Attendees of the DIY PKI webinar will learn: -Challenges of PKI deployment -Overall PKI integration ecosystem -Common use cases deployed in enterprises: Smart card logon – What happens in the backgrounnd, email encryption/signing Step by step implementation steps oInstall and configure a Hardware Security Module (HSM) oInstall the root CA and configure it with the HSM oInstall and configure the issuing CA oConfigure the permissions of users and create certificate templates oInstall and configure an authentication manager For the purpose of this webinar and using Gemalto’s five step propriety approach, we will use our SafeNet line of technologies to demonstrate the implementation of the PKI solution.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (857)
Subscribers (48086)
The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker (C|EH), Computer Hacking Forensics Investigator (C|HFI) and EC-Council Certified Security Analyst (E|CSA)/License Penetration Tester (L|PT) programs, and various others offered in over 60 countries around the globe.