Report: Read the complimentary Gartner report “How We Will Work in 2028”
According to Gartner’s report “How We Will Work in 2028”, we believe CIOs and CHROs must anticipate how trends in business, society, technology and information will converge to change where, when, why and with whom we will work in a digital business.
Checklist: 6 crucial considerations when choosing an e-signature solution
Trustworthy electronic signatures are necessary for digitalization, and they can save you time and money as well as increase your competitiveness. But choosing the right e-signature solution is not a trivial task – this guide points out and explains 6 crucial considerations to work through and check off.
Video: Enabling Trusted Identities for the Internet of Things
Watch this webinar to learn how IoT PKI controls device identity, from manufacturing bootstrap to lifecycle management, delivers protected operations based on strong authentication and encryption, manages full range of devices from battery-powered sensors to self-driving cars, secure logs and reports to facilitate compliance with data security regulations and establishes a certified root of trust for the security of the entire ecosystem.
Video: Why trusted identities are crucial in IoT projects
In this 9-minute video, public key infrastructure (PKI) expert Tamás Horváth explains why trusted identities are crucial in internet of things (IoT) projects.
Show all guides
How to choose what kind of electronic signatures to use
Before you get going with e-signing, it’s important to investigate what kind of e-signatures you need to ensure compliance with current and future regulations.
The eIDAS regulation explained in 3 minutes
eIDAS – the European Union’s Electronic Identification, Authentication and Trust Services regulation – is being applied directly and in its entirety in the whole of EU since September 29, 2018. Stefan Runneberger, expert on public information infrastructure at identity and security company Nexus Group, explains the regulation in 3 minutes.
How to use external identity provider for Nexus’ security services
Many new use cases have emerged from the new partnership between the new European identity platform Verimi and the identity and security company Nexus Group. The joint offering helps end users and organizations manage access to all kinds of resources, as well as digitally sign documents and transactions in a smooth and secure way, while staying in control of their personal data.
“Today, Nexus sells ready-made products that the market demands”
GET TO KNOW Tobias Eng, Key Account Manager at Nexus, who left Nexus 2.5 years ago and now is back. “Nexus has made a great journey since then. Today, Nexus sells ready-made products that rhyme with market demands. I returned because of that, and also because of the future product portfolio – Nexus is at the absolute edge of technology development and I want to take part in the continued journey”, says Tobias Eng.
How to validate certificates in IoT devices
Public key infrastructure (PKI) certificates are the best available technology to use in internet of things (IoT) devices for secure communication, access control and code security – but the way it is done requires thorough considerations. In this text, PKI expert Tamás Horváth explains how to validate the certificates in IoT devices.
How to design a PKI certificate lifecycle management process for IoT devices
Public key infrastructure (PKI) certificates are straightforward to use in internet of things (IoT) devices for secure communication, access control and code signing – but the design of the certificate lifecycle management processes requires thorough considerations. In this text, PKI expert Tamás Horváth explains how to design your processes for the best possible security and efficiency.
Show all blog posts