The Audit Portal.
primeid DISCOVER connects and audits digital identities from different IT systems across an entire IT infrastructure, such as directory services, public key infrastructures (PKIs), credential management, or mobile device management systems. Identity information matching and consistency checks reveal potential inconsistencies and security risks between interdependent systems. Additionally, cross-system auditing can be integrated into the information security system (ISMS).
primeid DISCOVER creates a central and integral database by aggregating data from users, devices, and certificates from the individual systems across an entire IT infrastructure. Connecting and matching data allows inconsistencies and errors to be detected and promptly fixed. For example, certificates may be found which still exist but are no longer manageable due to replaced devices. Similarly, smart cards may be identified that still have a valid certificate, but whose users are no longer with the organizations, and therefore no longer in the directory.
DISCOVERING CERTIFICATES ON MOBILE DEVICES
Certificates for mobile devices are typically obtained from a certification authority (CA) using the Simplified Certified Enrollment Protocol (SCEP). A mobile device management (MDM) system then distributes the certificates to the individual devices. Usually, it is not recorded, which certificate is installed on which device. primeid DISCOVER overcomes this weakness by connecting certificates and devices and revealing interrelationships between them.
DETECTION OF INCONSISTENCIES ACROSS SYSTEMS
primeid DISCOVER connects and matches identity data from users, devices, and certificates of different, interrelated IT systems. This enables inconsistencies between individual systems to be detected quickly. Additionally, a chronological change log supports fast and easy troubleshooting.
primeid DISCOVER provides notifications regarding upcoming or pending certificate expiry. This allows for the reliable and timely renewal of certificates, preventing any system downtime or pause in production.
- Transparency of all systems that are relevant to IT security
- Central and integral database
- Reporting & messaging
- Identification of inconsistencies and resulting vulnerabilities
- Intelligent, cross-system gathering of security-relevant information
- Complex system dependencies, including object history, at a glance
- Simple installation and maintenance
- Plug-in system for easy extensibility
- Easy operation
Any questions? Need more information? Contact us.