Identity Products
Home >Identity Products
IDENTITY PRODUCTS
CertiPath has distilled over a decade of providing services in the secure credential market into a suite of Identity Products that represent the next wave of security for the enterprise. CertiPath’s unique ability to monitor, analyze, and detect misplaced online trust due to improperly used, expired, or compromised credentials addresses a significant exposure in the identity and access management industry.
TrustMonitor™
Continuous monitoring of the trust network both inside and outside an enterprise network is necessary to ensure that the credentials being used are not only valid, but also not being used in a way that would indicate misuse. CertiPath analyzes identities to ensure they:
- Provide the situational awareness by tracking CA-based availability & security issues
- Ensure that credentials used are based on valid contents & constraints
- Monitor certificate authority availability to support device & user validation
- Reduce detection time of possible credential authority availability risks
TrustVisitor™
Managing Visitors
Many organizations struggle to implement a uniform visitor authorization process and policy. A visit request and authorization workflow is critical element leading into the provisioning of a visitor credential. CertiPath’s TrustVisitor™ module provides this capability and much more.
Visitors will not always require a credential from TrustManager. It is more secure to rely on a trusted credential from your visitor’s employer if they have been issued one (e.g., CAC, PIV, PIV-‐I). In addition to visit requests and approval, TrustVisitor provides validation and registration of trusted 3rd party credentials via a web browser your visitor’s can use to register in advance. Pre-‐provisioned credentials are queued-up for approval and access to local systems.
TrustMonitor™
Continuous monitoring of the trust network both inside and outside an enterprise network is necessary to ensure that the credentials being used are not only valid, but also not being used in a way that would indicate misuse. CertiPath analyzes identities to ensure they:
- Provides the situational awareness by tracking CA-based availability & security issues
- Ensures that credentials used are based on valid contents & constraints
- Monitors certificate authority availability to support device & user validation
- Reduces detection time of possible credential authority availability risks
TrustVisitor™
Managing Visitors
Many organizations struggle to implement a uniform visitor authorization process and policy. A visit request and authorization workflow is critical element leading into the provisioning of a visitor credential. CertiPath’s TrustVisitor™ module provides this capability and much more.
Visitors will not always require a credential from TrustManager. It is more secure to rely on a trusted credential from your visitor’s employer if they have been issued one (e.g., CAC, PIV, PIV-‐I). In addition to visit requests and approval, TrustVisitor provides validation and registration of trusted 3rd party credentials via a web browser your visitor’s can use to register in advance. Pre-‐provisioned credentials are queued-up for approval and access to local systems.