Skip to content
CORPORATE TRUST SERVICES

Cryptography-based trust services to protect your digital identities, data and business secrets.

QUALIFIED TRUST SERVICES

Legally compliant digital signatures (eIDAS) to drive forward the digitalization of your business processes.

TRUST COMPONENTS

Everything to do with smartcards, tokens, readers, certificates and signatures.

INNOVATIVE AND SECURE PERSPECTIVES FOR A DIGITAL WORLD.

PKI & CRYPTOGRAPHY SOLUTIONS

STRONG AUTHENTICATION
Phishing-resistant with certificates or FIDO

ENTERPRISE PKI
for Zero-Trust & IoT

ENCRYPTION & KEY MANAGEMENT
for on-premise & Cloud

PKI & CRYPTOGRAPHY PRODUCTS

egofy CARD
Smart Cards & Token

primeID VSC
Virtual Smard Card

primeID ONDEMAND
Remote VSC platform

primeID SELF SERVICE
Self Service for Smart Cards

primeID DISCOVER
Monitor certificates

primeID VALIDATE
Enterprise OCSP

eIDAS / QUALIFIED SIGNATURES & SEALS

Signatures & seals for your employees
with primesign as an enterprise solution

Sign a document online & instantly
for individuals and as an entry point for companies

SUPPORT

Simply integrate our experts into your ITSM structure / remote support up to 24/7

MANAGED SERVICES

We take care of the complete operation of your trust services in our data centers, you take care of your business.

THE USABILITY OF OUR SOLUTIONS ENSURES HIGH ACCEPTANCE.

Everything to do with smartcards, tokens, readers, certificates and signatures.
GENERAL

We are happy
to help.
T +43 1 35553 - 0

SALES

We are happy to support you.
T +43 1 35553 - 200

SHOP

You are a store customer and have a question or need support.
T +43 1 35553 - 300

STANDARD SUPPORT

You have a standard support contract and need assistance.
T +43 1 35553 - 800

SUPPORT PORTAL PREMIUM

You have a Premium Support contract and need assistance.

LOCATIONS
Key Management

STAY IN CONTROL

Check your cryptographic keys and your data.

at a glance : download

DATA ENCRYPTION
is implemented in a variety of ways. Applications, databases and virtualization solutions have integrated encryption mechanisms. Additional products are used for unstructured data, such as file/folder encryption. In all cases, suitable key management is crucial for the security and availability of your data.

KEY MANAGEMENT

Key Management

CENTRAL
KEY MANAGEMENT SYSTEM

  • Management and control of all keys

  • Support of the life cycle

  • Support of common cryptographic key types, algorithms and protocols

  • Highly available access for authorized use

  • Protection against unauthorized access

  • Secure communication via standardized interfaces, e.g. KMIP

  • Auditing and reporting

KEY MANAGEMENT:
In your data center, or
"as-a-Service"

Key Management
Key Management

CRYPTAS
supports you in maintaining control over the use of cryptographic keys, as well as in the creation and implementation of your encryption strategy.

This gives your organization sovereignty over your data assets and processes. You also meet your regulatory requirements, such as NIS-2 or DORA.

Do you have any questions or need more information?