Smart cards have been a part of the information security market for several decades already and are used by companies for the identification of employees. The evolution of […]

Smart cards have been a part of the information security market for several decades already and are used by companies for the identification of employees. The evolution of […]
In June 2013, the Monetary Authority of Singapore (MAS) introduced the Technology Risk Management Guidelines, a comprehensive document setting out risk management principles. It contains best practices to […]
There is currently much controversy over the PKI status in modern cybersecurity which raises a number of curious questions. What is the PKI role in digital transformation? When […]
The roundtable «Evolution of Trust: Get ready for PKI 2.0» was about the most confusing, yet vital topics that remain puzzles to many cybersecurity experts. Has COVID-19 affected […]
For decades PKI has remained one of the most effective technologies for authentication of users and devices. Nevertheless, many companies witness that the PKI evolution does not go […]
In the digital era, PKI is one of the most effective technologies for authentication of users and devices that is used by worldwide companies for decades already. However, […]
Axidian and Corporate Systems are pleased to announce that they have entered into a strategic partnership, combining Corporate Systems’ best-in-class consulting services and deep technical expertise with Axidian […]
Pacific Tech and Axidian enter into a partnership that brings together Axidian cutting-edge cybersecurity products and Pacific Tech’s top-class distribution services. At Pacific Tech, we are continuously evolving […]
Companies having PKI in place frequently use time attendance and access control systems. Unfortunately to employees and administrators, it is of common practice when users simultaneously have several […]
It turns out you can.Of course, physical smart cards and USB-tokens still occupy the majority of the PKI market. They are traditional ‘carriers’ of users’ personal certificates and […]