Skip to content
CORPORATE TRUST SERVICES

Cryptography-based trust services to protect your digital identities, data and business secrets.

QUALIFIED TRUST SERVICES

Legally compliant digital signatures (eIDAS) to drive forward the digitalization of your business processes.

TRUST COMPONENTS

Everything to do with smartcards, tokens, readers, certificates and signatures.

INNOVATIVE AND SECURE PERSPECTIVES FOR A DIGITAL WORLD.

PKI & CRYPTOGRAPHY SOLUTIONS

STRONG AUTHENTICATION
Phishing-resistant with certificates or FIDO

ENTERPRISE PKI
for Zero-Trust & IoT

ENCRYPTION & KEY MANAGEMENT
for on-premise & Cloud

PKI & CRYPTOGRAPHY PRODUCTS

egofy CARD
Smart Cards & Token

primeID VSC
Virtual Smard Card

primeID ONDEMAND
Remote VSC platform

primeID SELF SERVICE
Self Service for Smart Cards

primeID DISCOVER
Monitor certificates

primeID VALIDATE
Enterprise OCSP

eIDAS / QUALIFIED SIGNATURES & SEALS

Signatures & seals for your employees
with primesign as an enterprise solution

Sign a document online & instantly
for individuals and as an entry point for companies

SUPPORT

Simply integrate our experts into your ITSM structure / remote support up to 24/7

MANAGED SERVICES

We take care of the complete operation of your trust services in our data centers, you take care of your business.

THE USABILITY OF OUR SOLUTIONS ENSURES HIGH ACCEPTANCE.

Everything to do with smartcards, tokens, readers, certificates and signatures.
GENERAL

We are happy
to help.
T +43 1 35553 - 0

SALES

We are happy to support you.
T +43 1 35553 - 200

SHOP

You are a store customer and have a question or need support.
T +43 1 35553 - 300

STANDARD SUPPORT

You have a standard support contract and need assistance.
T +43 1 35553 - 800

SUPPORT PORTAL PREMIUM

You have a Premium Support contract and need assistance.

LOCATIONS
Strong Authentication

PROTECT YOUR DIGITAL IDENTITIES

Enable a smooth user experience.

at a glance : download

STRONG AUTHENTICATION
is used to reliably confirm the identity of IT users before they are granted access to critical systems and data. In practice, multi-factor authentication is used for this, often as a combination of a secret (PIN or password), a possession (smart card or mobile device) or a personal characteristic (biometrics).

STRONG
AUTHENTICATION

Strong Authentication

In decentralized organizations, rolling out user identities and restoring lost credentials can be a major challenge. It is cost-intensive and often frustrating for users. Self-services offer a remedy. They can be used to implement secure and highly scalable workflows to distribute digital identities, smart cards and access data in an efficient and user-friendly manner and to restore them if necessary.

CREDENTIAL MANAGEMENT -
is required in connection with strong authentication. It manages the lifecycle of the means of access for binding human and IT user accounts. A credential management system is often connected to the user directory (LDAP) and, in conjunction with a PKI, is able to issue or revoke user certificates and roll them out to smart cards or other certificate carriers.

"
80% of all breaches use compromised identities.

"

2023 Threat Hunting Report,
CrowdStrike

Strong Authentication

The objective of phishing resistance does not allow the use of shared secrets. Passwords, including one-time passwords ("OTP"), are shared secrets that can be intercepted and misused. Shared secrets are also frequently used in multi-factor authentication on an app basis. Only asymmetric cryptography is considered phishing-resistant today. This is used in PKI certificates or FIDO2 authentication.

CRYPTAS
helps you to specify an authentication solution that is suitable for your organization and your regulatory requirements and to implement it together with you on the basis of market-leading technology components.

Strong Authentication

Do you have any questions or need more information?