Quick CLM Dashboard Overview
In this video, we give you an overview of the dashboard and features of MTG’s Certificate Lifecycle Manager.
Maximum Transparency
No more expired certificates!
The user-friendly Certificate Lifecycle Management (CLM) enables simple, quick, and error-free certificate creation and provides full transparency over the status of all your certificates.
- Clear Dashboard: Visual overview of all certificates with direct access.
- Modern User Interface: Fast and seamless workflows.
- Automation Interfaces: All important interfaces available.
- Microsoft PKI Integration: Quick and easy connection and migration.
- Public CA Access: Convenient access to selected Public CA providers.
PKI Use Cases
Secure your sensitive business processes with secure identities
Our solution supports all essential applications that require digital certificates for security.
- Identity and Access Management (IAM): Authentication and authorization of users and devices (PCs, laptops, firewalls, routers, IoT devices).
- Network Security (VPN): Authentication and encryption of connections over public networks.
- Network Access Control (NAC): Controlled access to network infrastructures after successful certificate authentication.
- Secure Email Communication: Digital signatures and encryption of emails.
- SSL/TLS Web Server Certificates: Securing web applications and services.
- Mobile Device Management (MDM): Securing communication between mobile devices, apps, users, and corporate services.
- Digital Signatures for Documents: Verifying the authenticity and integrity of documents.
- Code Signing: Ensuring security and trust in software products and firmware through digital certificates.
PKI Use Cases (© MTG AG)
Product Packages
Certificate Lifecycle Management (CLM) &
Public Key Infrastructure (PKI)
Professional Package (CLM) |
Ultimate Package (CLM & PKI) |
---|---|
For customers who want to optimize the management and monitoring of their certificates without needing certificates from an MTG Corporate PKI. |
For customers who need certificates from a private PKI or a replacement for their Microsoft PKI. |
|
|
Regulatory Compliance
Meet important regulatory requirements
Use digital certificates to comply with the IT Security Act, EU GDPR, NIS2, DORA, and industry standards like ISO 27001. Our solution supports access control, cryptography, operational security, and communication security, ensuring compliance with all relevant data protection regulations.
Implement PKI Projects with Ease
Reach your goal faster with a system!
Our PKI experts are available for you and can support you in every phase of planning, implementation, operation and further development of your system. To the extent required, depending on your prior knowledge.
1 | Analyze |
In an initial consultation, we assess your current needs: Are you looking to replace your Microsoft PKI (AD CS) or extend it with our CLM solution? Do you currently lack a PKI and want to implement one? How many certificates do you need and for what purpose? Are there any regulatory requirements (e.g., NIS2, DORA)? Do you need additional service and support? We will present potential use cases and our software solutions to you. |
2 | Plan |
You define the use cases you want to start with. If you haven’t already, register for our free online demo. We then schedule the kickoff meeting for your PKI project. During this complimentary consultation, our PKI experts will guide you through the initial steps. You decide the level of additional support you need. To give you planning security, we offer fixed-price packages for onboarding, implementation of use cases, and ongoing support services during operational phases. |
3 | Take Off |
You have two months to thoroughly test your online demo and all its features. If needed, you can engage our PKI experts for detailed analysis and implementation, such as preparing a proof of concept. For maximum security in planning and implementation, we provide fixed-price packages that cover all phases of your project, from onboarding to ongoing operations. |