Back in 1994, Entrust debuted the world's first commercially available public key infrastructure. In the more than 20 years since then, it's been refining and building on the technology. Over the past two decades, enterprise security needs have skyrocketed alongside the growth of connected technology. According to one report from last year, 94 percent of the organizations surveyed reported experiencing cybersecurity issues. These days, a single targeted attack can end up costing an enterprise millions of dollars - and it's not only big corporations and financial institutions that are targeted: From medicine and government entities to small and medium-sized companies, everyone is a target. Across the board, susceptibility to cybercrime has never been higher.
"Limiting susceptibility to intrusions means implementing an integrated security infrastructure for your business."
Cyberattacks target identities and impersonate the rightful owner. To fight cyberattacks, we must properly protect digital identities from theft and misuse. Most organizations already have a process in place that state only a specific user can read a secure document or complete a transaction. However, to protect against attack, controls need to be added to authenticate the user attempting to perform action and confirm that they have the authority to complete the action. This is why PKI is essential.
At a basic level, a PKI is a set of tools and services that comprise a comprehensive authentication system. But PKI is unique in the way that it works. The premise behind it can be visualized like this: You keep a secret in a container. When it comes time to authenticate, the container shows proof of possession of the secret but does not release the secret itself.
One clear benefit of this method is that you don't run the risk of your secret getting stolen. With most authentication systems, that's not the case. For example, if you're logging into a system that just requires a password, then by entering that password — your secret — you relinquish it from your control and risk it falling into the wrong hands. The number of corporate password breaches making headlines of late attests to the inherent vulnerability of this authentication method.
PKI is different. Instead of making you reveal your secret, PKI asks only that you demonstrate you have it. This demonstration comes in the form of a challenge that must be answered via digital signature. The signature is delivered by the signer in such a way that it illustrates he or she knows the secret. Entrust's solution relies on X.509 digital certificates. This is the most popular certificate type in enterprises today due to the fact that it provides many fields of use to further describe the identity for a wide scope of applications. As an example, a policy which describes how an identity is checked. This could ask you to perform a police check and verify a passport, or to simply just check they possessed the email address shown elsewhere in the certificate.
While this may all sound a bit complicated, from a user perspective PKI is very straightforward. One example of PKI, for instance, are chip credit cards. When you take that card, go to the store and tap the reader to pay for something, that's PKI in action. Chip-based passports are another example. From a coding perspective, PKI might be challenging, but for the consumer it leads to greater ease of use than, say, entering a password.
Public key infrastructure ensures robust identity protection.
With the basics of PKI laid out, let's now turn to why enterprises benefit from adopting such a solution. Here are some of the central benefits of PKI as a Service:
For all businesses, keeping up a secure networking environment is a central part of daily operations. A PKI is a vital tool that helps enterprises get there.