Encryption Done Properly

Entrust keeps the world moving safely by enabling trusted identities, payments and data protection. Today more than ever, people demand seamless, secure experiences, whether they’re crossing borders, making a purchase, accessing e-government services or logging into corporate networks. Entrust offers an unmatched breadth of digital security and credential issuance solutions at the very heart of all these interactions. With more than 2,500 colleagues, a network of global partners, and customers in over 150 countries, it’s no wonder the world’s most entrusted organizations trust them.

Entrust (formerly known as nCipher) provide PKI services, top level certificates, including user, machine and SSL certificates.

Entrust also produce hardware devices for PKI and also for Hardware Security Modules (aka HSM) to securely manage PKI certificates for secure access by Firewall, Proxy and other devices.

Entrust Security’s cryptographic solutions secure emerging technologies – IoT, blockchain, digital payments – and help meet new compliance mandates, with the same proven technology that global organizations depend on today to protect against threats to their sensitive data, network communications and enterprise infrastructure. We deliver trust for your business critical applications, both on-premises and in the cloud, ensuring the integrity of your data and putting you in complete control.


Bring Your Own Key -BYOK

One of the shining stars of the Entrust portfolio is their cloud product allowing organisations to avoid shared keys offered by cloud providers such as Azure or AWS and maintain control of their data. 

This is important for several reasons:

  • If key management is important to your organisation, why compromise on data in the cloud?
  • Cloud providers are not security specialists, let alone encryption specialists. Why leave this important task to them?
  • In the event that you envisage a multi-cloud strategy, or want to move from one provider to another, do you want to have to approach your outgoing provider for the keys to your data? At the very least this introduces delay, and is an element beyond your control.
  • Shared keys present an inherent risk, given that they are offered to a number of clients and therefore are not organisation specific.  

Bring Your Own Key is a sensible add-on to a cloud environment, low cost compared to other elements of the infrastructure and represents good future strategy and data control. 

How to Engage Us

Lithify is available for short or long term engagements, to help with a problem, to implement a specific project or as your preferred partner in IT Security. 

Contact us, book an initial (free of charge) consultation or request an urgent call back

Contact Us