Digi-Sign, The Certificate Corporation
Published on Digi-Sign, The Certificate Corporation (https://www.digi-sign.com)

Home > Competing Technology

By Digi-Sign
Created Feb 25 2008 - 12:14

Competing Technology

PDF [1] Digi-Access™ [2] competes directly with asynchronous number and One-Time Password [OTP] tokens like RSA® SecurID® but this older technology. There have been many improvements since the original SecurID® idea, but the technology is still basically the same. In their favor, tokens are easy for the user to understand (it’s just a more powerful password) but the initial and ongoing costs are expensive. Tokens do provide good two factor authentication, but that’s it.

More and more organizations are moving towards Digital Certificates to solve their authentication issues because they are more flexible and provide additional functions (albeit they may not be needed immediately). If your Storage Type is the Certificate Store within the browser, there are significant cost savings to consider.

  • Digi-Mail™ [3] Service
    • As a business tool, email is the easiest one to manipulate and alter. Once sent, the information is extremely easy to intercept and copy whilst en-route. The best way to protect email is with Digi-Mail™.

      Digi-Mail™ is a simple solution that totally protects email information. All email can be digitally signed and the sensitive information can also be encrypted for total security.


      IMAGE



      Using the capabilities within the Digi-ID™ [4], Digi-Mail™ works with all versions of email software without any additional configuration or specialist skills required to make it work. Digi-Mail™ can be used within an organization or across a user group that includes suppliers, customers, advisors and employees alike.

      Once deployed, all members of the user group can be assured that all communications are bona fide and have not been tampered with or intercepted. With the simple click of a button, those sensitive emails can be encrypted so that only the intended recipients can open them.

      When the email arrives, it is displayed in the recipient’s inbox, clearly marked as being digitally signed. In checking the details of the certificate, the credentials of the sender and the integrity of the communication can be verified:

      IMAGE



      Digi-Mail™ Service provides the Digi-IDs™ designed to provide the secure email [5] you need and as it comes from the TRoot, it will work in either a closed or an open user group.


  • Digi-ID™ Service
    • The Digi-ID™ Service is used when you have more than a single requirement. You might need Digi-SSL™ and Digi-Access™ or any combination of the Services. With the Digi-ID™ Service, each service you require is configured according to your precise requirements and tested for with you before activation.


  • Digi-CA™ Service
    • Digi-CA™ Service is where you actually purchase the Digi-CA Server™ software but we host it for you. This is particularly of use to organizations that know their long-term requirement is for Software CA but their immediate personnel and technical resources are insufficient to meet their needs.

      The Digi-CA Server™ is configured, integrated and designed to meet your future environment and Digi-Sign hosts the software on a dedicated platform for you. As soon as your resources are at the appropriate levels, we migrate the entire system (without service interruption) to your site.


  • Activation Requirements
    • All you require is a single internet enabled PC with Internet Explorer® 5.5+ and to decide whether to store the Digi-ID™ used to access the system on a Digi-Card™, a Digi-Token™ or in the Certificate Store of that PC.



Source URL: https://www.digi-sign.com/digi-ca/certificate%20authority%20competing%20technology

Links:
[1] https://www.digi-sign.com/downloads/download.php?id=digi-ca-pdf
[2] https://www.digi-sign.com/digi-access
[3] https://www.digi-sign.com/digi-mail
[4] https://www.digi-sign.com/digi-id
[5] https://www.digi-sign.com/digital+certificate