[av_one_full first]
[av_textblock size=” font_color=” color=” admin_preview_bg=”]

Take Control – Become Your Own CA with ComSign’s CA As a Service (CAAAS)

[/av_textblock]
[/av_one_full]

[av_textblock size=” font_color=” color=” admin_preview_bg=”]

Having your own CA means virtually taking full control over the identity management lifecycle of user access to systems, e-signatures and network components management

[/av_textblock]

[av_one_full first min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ padding=’0px’ border=” border_color=” radius=’0px’ background_color=” src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_display=”]
[av_textblock size=” font_color=” color=” admin_preview_bg=”]

Issue digital certificates for employees’ access to organizational systems and e-signing or for network components management.

Issue, store, distribute and revoke digital certificates on smart cards, USB tokens and HSMs (Hardware Security Module)

[/av_textblock]
[/av_one_full]

[av_two_third first min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ padding=’0px’ border=” border_color=” radius=’0px’ background_color=” src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_display=”]
[av_textblock size=” font_color=” color=” admin_preview_bg=”]

Comsign’s CAAAS is a CA establishment turnkey solution. It will design, install, deploy, configure and train your employees to operate your own CA.

Comsign’s CAAAS is a full PKI infrastructure solution based on cryptographic hardware (HSM).
Comsign’s PKI infrastructure is composed of a Root CA that signs the intermediate CA’s (SUBCA) that signs the end certificate for the required users or network components.
The Root and intermediate CA’s certificates are generated through a secured HSM component (Common Criteria EAL4 or FIPS 140-2 Level 3) that saves the CA keys, while the operational CA’s (registration authority) certificates are issued through a Microsoft based CA system.
PKI technology is based on encryption with asymmetric keys: a public key distributed publicly and a private key that is kept secret. The encryption is performed in the cryptographic hardware using the private key, while the decryption is done using the public key.

[/av_textblock]
[/av_two_third]

[av_one_third min_height=” vertical_alignment=’av-align-top’ space=” margin=’0px’ margin_sync=’true’ padding=’5px’ padding_sync=’true’ border=’1′ border_color=’#000000′ radius=’0px’ radius_sync=’true’ background_color=” src=” attachment=” attachment_size=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_display=”]
[av_textblock size=” font_color=” color=” admin_preview_bg=”]

For more details, please contact us:

[/av_textblock]

[av_textblock size=” font_color=” color=” admin_preview_bg=”]





[/av_textblock]
[/av_one_third]

[av_hr class=’invisible’ height=’20’ shadow=’no-shadow’ position=’center’ custom_border=’av-border-thin’ custom_width=’50px’ custom_border_color=” custom_margin_top=’30px’ custom_margin_bottom=’30px’ icon_select=’yes’ custom_icon_color=” icon=’ue808′ font=’entypo-fontello’ admin_preview_bg=”]

[av_textblock size=” font_color=” color=” admin_preview_bg=”]

Want to manage your company’s Digital Identity?
Become your own CA. Contact us and start taking con

[/av_textblock]

[av_textblock size=” font_color=” color=” admin_preview_bg=”]

Comsign is a eIDAS QTSP (Qualified Trust Service Provider). QTSPs are regulated (Qualified) to provide trusted digital certificates under the electronic Identification and Signature (eIDAS) regulation.
eIDAS – (electronic IDentification, Authentication and trust Services) is an EU regulation on electronic identification and trust services for electronic transactions in the European Single Market.

[/av_textblock]

Leave a Reply

Your email address will not be published. Required fields are marked *

Skip to content