CIO Influence
CIO Influence News IT and DevOps Security

PKI Solutions Introduces PKI Spotlight Monitoring and Alerting Solution

PKI Solutions Introduces PKI Spotlight Monitoring and Alerting Solution
Cybersecurity industryโ€™s first product providing real-time monitoring and alerting of the availability, configuration, and security of organizationsโ€™ Public Key Infrastructure environments

PKI Solutions, a leading cybersecurity firm providing Public Key Infrastructure (PKI) products, services, and training, announced the introduction of PKI Spotlightโ„ข, the industryโ€™s first and only solution that provides real-time monitoring and alerting of the availability, configuration, and security of all of organizationsโ€™ PKI environments โ€“ all consolidated into one easy-to-use dashboard. PKI is a foundational technology for almost every identity and data encryption solution used throughout the world.

Top iTechnology Data Centre News:ย ESO Acquires Interdev Technologies, Leading Provider of Cloud-Based ePCR Software in Canada

Protecting data has never been more challenging with cyber threats ever-present and ever-morphing, remote workforces and employee turnover, and applications and devices requiring constant updates. Now, more than ever, organizations need a holistic, centralized view of all of their security components and real-time security intelligence to protect their companyโ€™s important data now and in the future. According to Gartner,ย โ€œToday, in many organizations, ongoing operations and rapid (cybersecurity) incident response are hampered by the proliferation of siloed dashboards.โ€ย By 2024, organizations adopting aย cybersecurity mesh architectureย to integrate security tools to work as a cooperative ecosystem will reduce the financial impact of individual security incidents by an average of 90%.

โ€œWeโ€™re excited to introduce a groundbreaking new PKI solution that solves the most difficult PKI management challenges that are not addressed by any current products and processes in the market today,โ€ said Mark B. Cooper, president and founder of PKI Solutions. โ€œWhat PKI Spotlight delivers is revolutionary โ€“ because it is the first and only solution to consolidate vital information about an organizationโ€™s PKI environment into a single view, at your fingertips. This has been challenging due to the uniquely distributed nature of PKI, adoption of locked down hardware components such as Hardware Security Modules (HSM), expanding cloud environments, and the fact that organizations might not always have dedicated resources to manage all their PKI environments.โ€

PKI Spotlight Empowers Organizations With Real-Time Security Intelligence

With PKI Spotlight, PKI Solutions intends to provide enterprise organizations with improved outcomes in Operational Resilience, Security Posture Management, Threat Detection, and adoption of Best Practices. It enhances an organizationโ€™s operational resilience by improving the uptime, availability, and recoverability of its PKI and HSM environments. It also improves an organizationโ€™s security posture management by maintaining the security and integrity of their PKIs with visibility into configurations that can impact identity and encryption systems. The productโ€™s threat detection features allow IT teams to quickly spot abnormal actions in the PKI environment and its best practices features help organizations review and refine their PKI operational and configuration best practices. Overall, this improved security intelligence provided by PKI Spotlight allows IT teams to make faster, smarter, and more efficient decisions to protect their organizationsโ€™ data and provide frictionless employee and customer experiences.

Top iTechnology 5G Technology News:ย Tempest Telecom Solutions Reintroduces and Redefines Itself as Tempest

PKI Spotlightโ€™s core capabilities include:

  • Real-time PKI and HSM event configuration and roles and aggregation engine
  • Unified dashboard with event, configuration, and PKI roles exploration
  • Customized alerting and notifications for critical PKI functions, events, activity, and configurations changes
  • Email-based integration into Incident Management and Service Management solutions
  • Config Explorer for fine-grained visibility into PKI configurations such as CA permissions, revocation, Active Directory, cryptography, and policy modules
  • Time-based event filtering and exploration that filter events by source, role, time, and severity with built-in search for message and event ID
  • View of all PKI roles, such as Certification Authority, Web Enrollment site, CRL Distribution Point, Authority Information Access (AIA), OCSP Responder, NDES and CES/CEP servers

Early Customer Response to PKI Spotlight

As part of PKI Solutionโ€™s Early Access Program (EAP) for PKI Spotlight, enterprise organizations across many different industries have provided valuable feedback and an overwhelmingly positive response to the new solution.

โ€œWith PKI Solutions, we get the best-in-class PKI expertise. PKI Spotlight is an important addition to our portfolio of products and gives us productivity gains together with peace of mind that our PKI systems are available and functional, and any service that relies on our PKI is operating smoothly and securely,โ€ said Scott Fales, principal network engineer at BayPort Credit Union. โ€œWe expect our reliance on our PKI environment to increase over time and having a product like PKI Spotlight means that we can reliably execute on initiatives that continue to improve our security posture.โ€

According to Roger A. Grimes, 34-year cybersecurity consultant and author of 13 books and more than 1,200 magazine articles on computer security, the time has come for a product like PKI Spotlight. โ€œWhether you have one PKI server or dozens, you should get PKI Spotlight. Itโ€™s what Microsoft should have created 20 years ago,โ€ said Grimes. โ€œOnce you see what it does it seems so obvious why you absolutely need it.โ€

Top iTechnology Cloud News:ย Dormant IPv4 Addresses Can Help Mitigate Expected Network Outages

[To share your insights with us, please write toย sghosh@martechseries.com]

Related posts

Nudge Security Automates Employee Offboarding, Eliminating 90% Of Manual IT Effort

PR Newswire

Detect Data Theft & Ransomware With Menlo Securityโ€™s Free Security Assessment Toolkit

CIO Influence News Desk

Iceotope Announces OEM Agreement With Hewlett Packard Enterprise To Provide Liquid Cooling At The Edge

Leave a Comment