What can you do with a powerful PKI platform?

Set-up private Certificate Authority (CA)
Secure access to websites & applications (SSL/TLS)
Enable MFA for VPN or private network access
Enforce device authentication for workplace & IoT devices, MDM
Deploy code signing and authentication (DevOps)
Secure cloud application access
Provide passwordless shell access to machines (SSH)
Protect access to corporate network and WiFi
Initiate mutual authentication for secure web applications (mTLS)
Roll out email signing and encryption
Secure communication between microservices and containers
Manage keys in public cloud

Adopt true end-to-end security

The Smart ID PKI issues certificate-based, cryptographically secure, unforgeable identities that enable,

Strong authentication: Certificate-based authentication ensures only authorized users, devices, or servers can connect to a network or application. Revocation of certificates instantly blocks access in case of compromise or emergency.

Encryption and privacy: Certificates guarantee encrypted communication between devices and services to securely transmit data over TLS.

Integrity: Digitally signed messages based on certificates prove the origin of data and detect data manipulation. Signed firmware ensures secure software updates from verified sources.

Complete, compliant, and feature-rich

  • Securely issue certificate-based identities
  • Complete certificate lifecycle management
  • Store certificates on multiple devices - mobile phones, smartcards, corporate devices, IoT devices, etc.
  • Ensure high performance and scalability 
  • Manage multiple CAs and tenants
  • Common Criteria EAL4+ certified 
  • TISAX and ISO 27001 compliant

Enhance interoperability

The Smart ID PKI supports a wide range of enrolment protocols and interfaces which makes it easily extensible to various use cases while keeping it secure and compliant with global industry standards.

  • ACME
  • CMC
  • CMP
  • EST
  • EST-coaps
  • SCEP
  • WinEP
  • REST API
 

NEXUS SMART ID PKI

The only complete PKI platform

 

 

 

Certificate Factory

Responsible for control mechanisms and data preparation in the issuance process.

Distribution Agent

Responsible for distributing certificates, CRLs, and CILs to different services

Certificate Issuing System

Creates, uses, and deletes CA keys on demand from the Certificate Factory, in addition to certificate and CRL signing

OCSP Responder

Answers queries on behalf of one or several CAs, enabling multi-tenant hosting, about the revocation and issuance status of certificates

Support for HSMs

Connect with several HSMs over the PKCS#11 cryptographic interface, to manage CA keys, TLS keys, key archiving, PIN protection, and user keys

Key Generation System

Performs key generation and smart card pre-personalization functions

SNMP Protocol

Allows for the CF and CIS-managed services to forward notifications over the SNMP protocol

Protocol Gateway

Handles standard protocols and functionalities for enrolling certificates to different kinds of devices

 

 

 

Explore more technical details, tutorials, and updates

TO NEXUS DOCUMENTATION

Deploy Smart ID PKI in your preferred mode

As-a-Service

  • We develop, install, and operate - You use
  • Quickly deploy a scalable service with fast onboarding 
  • Benefit from using the most up-to-date software based on standard services
  • Avoid system and application downtime due to expired certificates  

Hybrid

  • Customized set-up aligned to your needs 
  • Combine services and on-premise deployment
  • For example, Nexus will manage the online Certificate Authority while you manage identities in a local Smart ID system

Start your FREE trial for our GO IoT services today!

ENROL TO GET ACCESS

LEADING GLOBAL ORGANIZATIONS RELY ON SMART ID PKI

Scalable platform that promotes trust in every interaction

Further PKI resources

 

 

PKI explained in 4 mins
PKI enables organizations to secure IoT communication, enable digital document signing, and everything in between! Martin Furuhed, the PKI expert at Nexus, explains what PKI really is - in 4 minutes.

Know more

 

Is public key infrastructure (PKI) giving you a false sense of security?
Do you think you have secured your organization and solved your issues with strong authentication, data encryption, and digital signatures just because you are using the public key infrastructure (PKI) security method?

Read now

 

A brief history of PKI
Encryption techniques have been used for millennia to protect communication – first on Mesopotamian clay tablets and most recently in the internet of things (IoT). Discover how PKI evolved into the most sophisticated security technology developed by mankind. 

Discover now

 

Leading innovation through collaboration 

We are a part of consortiums and certifications that are pivotal in shaping the security standards, principles, and regulations of the future

Research project collaborations

Connected vehicles Research

Nexus secures V2X communication in SECREDAS project

Nexus secures V2X communication in SECREDAS project The Electronic Components and Systems for European Leadership (ECSEL) SECREDAS project, launched in 2018, has been completed successfully. The project which has funding of €50+ million is aimed at devel...
Blog Research

SecureCare: IoT research project aims to provide trusted high-quality elderly care

“We have initiated a new research project that we hope will result in a truly secure smart-healthcare system for elderly as well as younger and healthier people,” says Helen Holst, CIO at the Swedish municipality City of Solna.
Blog Research

SecureIoT: Making PKI security available for resource-constrained IoT devices

The internet of things (IoT) applications have started to hit the market in big numbers – but security is lagging behind.

Why Nexus

Backed by teams with unparalleled expertise, Nexus Smart ID PKI is the only complete PKI solution in the market

High performance

Guaranteed high performance with a proven capacity to issue 10,000 certificates per second. Offered as a service, guaranteed SLA and capacity as you grow. 

High security

Proven security in compliance with Common Criteria EAL4+, TISAX, and ISO 27001

Smoother migration

Easily migrate to our future-compatible, multi-tenant PKI platform and increase operational efficiency with automation, notifications, and self-service.

Want to know more?

Book a personalized demo session with our PKI experts to discover how
Smart ID PKI can help promote trust in every transaction!

Explore our latest resources

Blog

How to Send an Encrypted Email in Outlook

9 October, 2024
Did you know that 94% of malware is delivered via email? With cyber threats increasing, businesses must take extra precautions to secure their communications. One simple yet powerful solution is encrypting your emails.  In this blog, we’ll walk you through...
Blog

What is PCI SSC?

4 October, 2024
Did you know that global payment fraud losses hit $41 billion in 2023? As businesses continue to embrace digital payments, securing sensitive data has never been more important. That’s where the Payment Card Industry Security Standards Council (PCI SSC) co...
Blog

What is NIS2?

2 October, 2024
Cyberattacks are increasing rapidly, and the damage they cause can be severe! In fact, in 2022, over 50% of European companies reported facing some kind of cyberattack. To tackle this, the NIS2 directive was introduced to boost cybersecurity across the Eur...
Blog

How to Prevent Software Vulnerabilities?

25 September, 2024
Software vulnerabilities are a serious threat, especially for businesses managing IoT devices and security databases. If not addressed, these vulnerabilities can lead to cyberattacks, data breaches, and significant financial losses. Understanding how to pr...
Blog

How to Find Software Vulnerabilities?

24 September, 2024
Finding vulnerabilities in software is a critical task for any business aiming to protect its digital assets. Weaknesses in software can open doors for malicious actors, leading to data breaches and financial losses. As cyber threats continue to evolve, un...