PKI Systems.

Get In Touch.

Contact us:

PKI Systems.

Get In Touch.

We Guarantee.

TRUST

Safety

SAFETY

hand 1

SERVICE

face-scan 1

IDENTITY

PKI systems.

PKI allows users in an unprotected open network to protect and exchange information privately and safely by encrypting the information through a pair of encryption keys – public and private. While the private encryption key is kept safe with the user, the public key can be kept by a safe entity and be continually accessible. In no way can the private key be retrieved by tampering with the public key. The PKI infrastructure supplies a unique password for individuals or organizations through digital certificates, which can be cancelled or revoked as required.

Digital signature grants access to digital data. 3D illustration

Digital Certificate .

A digital certificate is a kind of electronic register which is created and based on information describing the protection characteristics of a certain identity in a network (private or public). The certificate is issued by a third party entity – a certificate authority (CA) authorized to issue and manage protection characteristics and public keys for information encryption. These digital certificates contain identifying details such as name, serial number, expiry date, copy of the public key used to decrypt messages, and digital signature (as opposed to digital certificate) of the certificate issuer.

Digital Signature .

With Comda Encrypt end users do not need to change their behavior in order to secure their files. The system is designed to also be adopted and used by non-technical users with minimal training only.

  • Transparent and non-intrusive to end users
  • No noticeable performance impact
  • Uses familiar Windows or Linux systems and commands
  • Non-technical staff can implement and enforce cyber security policies

PKI infrastructure .

A digital signature is a kind of electronic signature which can be used to identify the entity sending the information or the document signatory, and thus it is possible to guarantee that the information has not undergone any changes since it was signed. Digital signatures cannot be copied and an element of time can be incorporated in them.

The receiver can verify that the digital certificate is in fact valid and real by checking its contents. Presently, the leading standard for electronic certificates is called X.509 and most digital certificates issued today meet this standard. Digital certificates can be saved in a database that contains the computer registry so that other verified users can search for the public key.

The PKI infrastructure works on the assumption that using an encrypted public key is the infrastructure basis since it constitutes the most popular user authentication and data encryption method. Traditional encryption entails creating and sharing a secret key for encrypting and deciphering information. Using this encryption method with the help of a secret key presents a significant disadvantage – if and when this key is exposed, the encrypted information can be easily deciphered. Due to this reason, access by public key and PKI infrastructure encryption is preferable to traditional encryption. 

Microsoft ILM.

ILM 2007 is a solution which leans on MIIS 2003 user management and encryption abilities, and adds innovative strong authentication management policy, like smart cards with a new approach that integrates together user database management, digital certificates and passwords in a Windows environment and other organizational systems. ILM 2007’s chief characteristics are: Identity synchronization – the ILM can synchronize user accounts and their different attributes in all systems, including password synchronization. User synchronization – the ILM can synchronize new user details immediately upon creation, automatically and in real-time in different systems simultaneously. Certificate management – the ILM includes built-in rule-based procedures and solutions, which allow organizations to manage the lifespan of their digital certificates and smart cards. These attributes and many others allows efficient, more economical and integrative management of digital certificate infrastructures, smart cards and digital authentication in organizations. In this way, higher efficiency is achieved in the different procedures, whether creating new users, handling existing user support or changing security policy.

Our Solutions.

face-scan 1

Access control systems.

Comda offers solutions to protect and ensure the completeness of the organizational information by assimilating access control.

safe 1

Digital signing systems.

ComSignTrust is a subsidiary of Comda that supplies digital signing systems for enterprises and SMB’s.

Biometrics solutions 1

Biometrics solutions.

Comda is the leading company in israel for biometrics services and products by well known brands.

Vault & Encryption

Vault & Encryption.

Secure your organization's sensitive data base and Store all enterprise passwords in one safty Vault that is secured at the highest technological level.

Contact us for more details

We would love to do any project you choose with the highest quality at the highest security level

Get In Touch.

Leave us a message