ENHANCED SECURITY METHODS
Our Credential Management Systems are used to manage the association between an identity and their issued credentials.
They manage the lifecycle of trusted tokens such as smart cards and provide capabilities for the management
of virtual smart cards and credentials delivered to smartphones and other mobile devices.
PERSONAL IDENTIFICATION VERIFICATION CREDENTIALS
PIV credentials operate by way of using trust and identification tools such as certificates, biometric authentication, key pairs and pin numbers. These can be combined into a credential management system. Credential management systems are used to automate and enhance security posture within organisations by streamlining the access privileges given to staff and other resources.
Our smart cards ensure authentication, flexibility, digital security and confidentiality.
CARD MANAGEMENT SYSTEMS
Cogito Group currently offers a number of different CMS solutions meeting different needs and price points.
CARD MANAGEMENT SYSTEMS
A Card Management System (CMS) manages the lifecycle of Smartcards – from issuance through to its retirement of use.
In a medium to large organisations it becomes difficult to manage credentials through traditional methods, as these methods do not address security and auditing requirements that usually come with a large scale deployment of smartcards. A CMS manages smartcard deployments in a secure and auditable manner, allowing the organisation to: Issue the card, personalise the card with authentication capability, and manage the card post-issuance from a central location.
Smartcards are credit card sized with an embedded integrated circuit or microchip. Smartcards can be used to improve security when accessing information, locations or equipment.
This includes providing logical network access to computer systems, physical access to facilities and to secure and authenticate digital transactions.
CREDENTIAL MANAGEMENT BEST PRACTICES
Credential Management Systems are crucial resources for the detection and prevention of risky behaviours. Controlled access to customer and employee information improves governance and compliance within organisations. Best practices for credential management include:
Review User Roles
As users leave and move through organisations auditing their access levels is necessary to ensure security.
Certificate Authority Management platforms like Jellyfish bring visibility to certificates across your network providing authentication and authorisation, allowing you to automatically manage certificates issued from disparate CA’s and prevents risks associated with certificate outages.
Retiring old encryption keys and replacing them with newly generated keys is a standard of cryptographic best practices.
Credential management systems also require further password management to ensure only the right individuals can access the right passwords necessary for their role.
Auditing ensures the people within your organisation have access only to what they need. Audits should include deprovisioning staff when they leave, or change roles within an organisation.
AU: +61 2 6140 4494
NZ: +64 4909 7580
Auckland | Brisbane | Canberra | Melbourne | Sydney | Wellington