SeaCat PKI is now Generally Available

We are proud to announce the public launch of our latest product, the SeaCat PKI.

SeaCat PKI is a state-of-the-art microservice that provides central cyber security certificate and key management for IoT, connected devices, and mobile applications.

SeaCat PKI is already deployed, for example, as a central public key infrastructure in the vehicle-to-anything communication project C-Roads in the Czech Republic, and recently also at C-Roads Slovenia in cooperation with Dars, Motorway Company in the Republic of Slovenia.

Last year, SeaCat PKI successfully participated at two plugtests of the European standardization organization ETSI: Cooperative Intelligent Transport System (C-ITS) and Cellular Venue-to-Anything Communication (C-V2X).

Cyber security is the biggest challenge in the adoption of IoT. The number of IoT connected devices has grown over the last five years to 200 billion installed devices according to Intel.

The primary role of PKI is to provide trust. Specifically, PKI participates in authorization and authentication tasks ("I know whom I communicate with"), encryption ("others can't read what I communicate"), integrity ("others can't change what I sent") and device lifecycle management. Finally, PKI provides and unique and verifiable identity for each device.

PKI function has been part of our flagship SeaCat product suite for a long time, but it has grown into a standalone product. SeaCat PKI is available for on-premise deployments, or as a cloud-based service. SeaCat PKI offers a rich API for easy integration with various systems. We help our customers to deal with security architecture, integrations, and compliance testing during deployment of PKI.

For more information, please continue to our product site or contact us directly at info@teskalabs.com.


Resources




You Might Be Interested in Reading These Articles

TeskaLabs Welcomes New VP of Application Security

TeskaLabs today welcomed ICT security expert Jiri Kohout as their new VP of Application Security. Kohout will have oversight of the information security landscape, architecture design and security implementation, assisting organizations and TeskaLabs Partners to build and operate mobile solutions securely according to best practices and standards.

Continue reading ...

press

Published on February 11, 2016

Future of the Automotive Mobility and Data Security

Mobility has always been at the cutting edge of human innovation and technological advancement. This is unlikely to change in the foreseeable future. Already, mobility as we know it is seeing significant disruption thanks to the entry of nontraditional players who are leveraging the power of computing devices and the Internet. But few things are likely to have a bigger impact on mobility than the enormous volumes of data that will be generated as a result.

Continue reading ...

automotive security v2x

Published on February 10, 2019

Who is Responsible for Securing the Connected Car?

The automotive industry recently witnessed several cases of cyber-hacking that made driving connected cars dangerous if not impossible. Companies like Jeep, Volkswagen, and Tesla all have recently dealt with cases of hackers taking over cars and stopping them while the cars were in use as well as stealing customers' Social Security numbers, financial details, and other sensitive information.

Continue reading ...

automotive security v2x

Published on April 04, 2017