Public key infrastructure (PKI) is a two-key, asymmetric cryptosystem that affords different IT systems high-level information confidentiality and confidence.
This is how it works: the sender of confidential information requests the recipient entity’s public key, which is not secret, before sending the information. The recipient can only decrypt the information using its private key.
The recipient’s identity is assured through a digital certificate issued by a third-party certificate authority (CA) – such as LAWtrust – that issues, revokes and distributes digital certificates.Download PKI infographic
We offer managed PKI for our clients, using a state-of-the-art data centre and our experienced team of security professionals, therefore eliminating the need for them to build and maintain an in-house PKI solution.Read more
LAWtrust is a recognised industry expert in PKI, with a track record of successful deployments in both the public and private sectors – we make PKI implementation and governance easy. Here's how:Read more
We have extensive experience in the implementation of PKI solutions and we pride ourselves on providing expert and trusted advice on PKI deployments, PKI risk assessments, PKI based identity/permission management and PKI digital signature solutions.Read more
If you decide to take your PKI solutions in-house, LAWtrust can help you to capitalise on your investment. We use the publicly trusted Entrust root certificate for PKI deployments and we provide advice on complete PKI solution strategies, ensuring that deployments are successfully integrated for overall solution reliability, security and effectiveness.Read more
LAWtrust's certificate-based security solutions allow you to transact and communicate with confidence using your mobile device.
Working with the South African Department of Home Affairs, LAWtrust is bringing new levels of trust and security to the South African identity management landscape by replacing traditional green ID books with Smart ID cards.
Absolutely secure, strong authentication is a single-step, software-based authentication process for issuing, provisioning, managing and authenticating the digital identities of users, mobile phones and computers.