SeaCat PKI is now Generally Available
We are proud to announce the public launch of our latest product, the SeaCat PKI.
SeaCat PKI is a state-of-the-art microservice that provides central cyber security certificate and key management for IoT, connected devices, and mobile applications.
SeaCat PKI is already deployed, for example, as a central public key infrastructure in the vehicle-to-anything communication project C-Roads in the Czech Republic, and recently also at C-Roads Slovenia in cooperation with Dars, Motorway Company in the Republic of Slovenia.
Last year, SeaCat PKI successfully participated at two plugtests of the European standardization organization ETSI: Cooperative Intelligent Transport System (C-ITS) and Cellular Venue-to-Anything Communication (C-V2X).
Cyber security is the biggest challenge in the adoption of IoT. The number of IoT connected devices has grown over the last five years to 200 billion installed devices according to Intel.
The primary role of PKI is to provide trust. Specifically, PKI participates in authorization and authentication tasks ("I know whom I communicate with"), encryption ("others can't read what I communicate"), integrity ("others can't change what I sent") and device lifecycle management. Finally, PKI provides and unique and verifiable identity for each device.
PKI function has been part of our flagship SeaCat product suite for a long time, but it has grown into a standalone product. SeaCat PKI is available for on-premise deployments, or as a cloud-based service. SeaCat PKI offers a rich API for easy integration with various systems. We help our customers to deal with security architecture, integrations, and compliance testing during deployment of PKI.
Most Recent Articles
- TeskaLabs helps LINET with cyber security compliance for medical devices
- TeskaLabs and University hospital in Pilsen launches a pilot of zScanner - open source mobile app for medical photo documentation
- EV Charging Station security demonstrator
- Five Ways AI And Machine Learning Can Enhance Cybersecurity Strategy
- C-ITS ITS-S Security microservice
You Might Be Interested in Reading These Articles
Autonomous vehicles are still working their way into the modern automotive marketplace. However, they are growing more common each year. Many agree, this is an innovative change, and it’s estimated that there will be more autonomous vehicles on the road in the coming years.
Published on July 15, 2019
As part of TeskaLabs‘s research activities, we are working toward a more flexible, contemporaneous method to deploy the software security component (specifically C-ITS Security) into the vehicle software ecosystem (ITS-S). The current best practice in the industry is that the cybersecurity component is integrated into the vehicle application software as a library. However, this approach brings with it many limitations, such as narrow software compatibility. The deployment is highly inflexible and so it is often omitted due to its complexity.
Published on June 15, 2020
Mobility has always been at the cutting edge of human innovation and technological advancement. This is unlikely to change in the foreseeable future. Already, mobility as we know it is seeing significant disruption thanks to the entry of nontraditional players who are leveraging the power of computing devices and the Internet. But few things are likely to have a bigger impact on mobility than the enormous volumes of data that will be generated as a result.
Published on February 10, 2019