Keyfactor and PrimeKey Partner to Enable Highly Scalable PKI for Modern Enterprise and IoT Deployments

Integration Enables Certificate Lifecycle Automation and Deployment for PrimeKey EJBCA

CLEVELAND, Ohio & SOLNA, Sweden – June 23, 2020 – Keyfactor, the leader in securing digital identities, and PrimeKey, a leading provider of open-source public key infrastructure (PKI) and digital signature solutions, today announced a partnership and integration to simplify and automate PKI for large-scale enterprise and internet of things (IoT) deployments.

Enterprises today – and a growing number of connected device manufacturers – rely on PKI to enable digital security. Enterprise security teams and IoT product developers issue trusted and unique identities necessary to protect sensitive data, ensure uptime and secure connections across cloud services and connected devices.

“Companies adopting complex multi-cloud infrastructure or managing high-volume IoT deployments are testing the limits of PKI,” said Kevin von Keyserling, co-founder and chief strategy officer at Keyfactor. “Keyfactor’s certificate lifecycle management solution combined with PrimeKey’s powerful PKI backend delivers a simplified toolset to deploy and manage certificates, even at massive scale.”

PrimeKey delivers a uniquely scalable and flexible alternative to existing certificate authority (CA) software, providing turnkey PKI solutions for governments, financial institutions and thousands of global enterprises. As a pioneer in open-source PKI, PrimeKey’s solutions address a range of digital identity use cases such as IoT, e-ID and e-Passports, as well as PKI migration and consolidation.

Enterprises today use a mix of public and private CAs to support PKI, yet ever-increasing certificate volumes are a challenge to manage across multiple CA-provided tools. Using an API-based gateway, Keyfactor’s certificate management solution (Keyfactor Command) integrates with PrimeKey’s PKI (EJBCA Enterprise), providing end-to-end visibility and automation to all private and publicly issued certificates within a single, purpose-built platform.

Additionally, the integration between EJBCA Enterprise and Keyfactor’s end-to-end identity platform for connected devices (Keyfactor Control) makes it easy and affordable for IoT device manufacturers to embed trusted identity into their IoT products at design, and secure firmware and software updates through the device lifecycle. 

“PrimeKey and Keyfactor share a mutual respect and mission to provide trust and security in zero-trust networks and manufacturing environments,” said Magnus Svenningson, chief executive officer at PrimeKey. “Scalable certificate management, turnkey PKI deployment and robust APIs are critical to solve today’s complex and evolving PKI and IoT use cases. This partnership is a great DNA match and value-add for our shared customer base.”

To learn more about the integration, visit: https://info.keyfactor.com/ejcba-enterprise-certificate-management.

-30-

About Keyfactor

Keyfactor empowers enterprises of all sizes to close their critical trust gap – when breaches, outages and failed audits from digital certificates and keys impact brand loyalty and the bottom line. Powered by an award-winning PKI as-a-service platform for certificate lifecycle automation and IoT device security, IT and InfoSec teams can easily manage digital certificates and keys. And product teams can build IoT devices with crypto-agility and at massive scale. Exceptional products and a white-glove customer experience for its 500+ global customers have earned Keyfactor a 98.5% retention rate and a 99% support satisfaction rate. Learn more at www.keyfactor.com.

About PrimeKey

PrimeKey is one of the world’s leading companies for PKI and digital signature solutions and has developed successful products such as EJBCA Enterprise, SignServer Enterprise, EJBCA Appliance and PrimeKey SEE. As a pioneer in open source security software, PrimeKey provides businesses and organizations around the world with the ability to implement security solutions such as e-ID, e-Passports, authentication, digital signatures, unified digital identities and validation. PrimeKey products are Common Criteria and FIPS certified; PrimeKey has numerous Webtrust/ETSI and eIDAS audited installations.

PrimeKey has offices in Stockholm, Sweden; San Mateo, USA; Aachen, Germany and Melbourne, Australia. Together with its global network of technology and reselling partners, PrimeKey is proud to count many of the industry leading companies and institutions within IT, telecom, banking, industrial, public CAs and different branches of government as long-time customers. For more information, please visit: https://www.primekey.com.

Keyfactor Contacts
Sarah Hance

This email address is being protected from spambots. You need JavaScript enabled to view it.

216.785.2291

MRB Public Relations
Angela Tuzzo
This email address is being protected from spambots. You need JavaScript enabled to view it.
732.758.1100

PrimeKey Contacts

Admir Abdurahmanovic

VP Strategy & Partners, co-founder

This email address is being protected from spambots. You need JavaScript enabled to view it.

+46 708 37 02 37

Akima Media GmbH

Annika Hartman

Garmischer Str. 8 

This email address is being protected from spambots. You need JavaScript enabled to view it.

+ 49 89 17959 18-0

DynaPay from Dynamics Business Solutions Now Available on Microsoft AppSource

Dynamics Business Solutions today announced the availability of DynaPay on Microsoft AppSource, an online cloud marketplace providing tailored line-of-business solutions. DynaPay is a comprehensive human resources and payroll management solution built on Microsoft Dynamics 365 Business Central using the native AL development tool. Dynamics Business Solutions provides total enterprise business solutions that enable businesses to use their technology investment in Dynamics 365 to extend business performance.

Payroll is one of the most integral parts of any business. Every worker’s salary compensation is based on the payroll system. Yet the job of calculating payroll for the entire team without automated workflows and systems is an ever-burdening task. DynaPay addresses this, automating salary deposits, leave balances, and other tasks. DynaPay has a built-in formula builder that makes the system extremely flexible, configurable, and able to meet complex payroll requirements for any country, including taxes and provisions. DynaPay generates a monthly WPS file, required by some governments, in SIF and Microsoft Excel formats, and the system is easily configurable to generate other types of electronic payroll files.

For HR managers, DynaPay's HR management dashboard gives them a way to quickly view details related to an employee, such as work leave, duty resumption dates, dues, and overall workforce structure. Managers can also easily keep track of company and employee documents.

DynaPay's time attendance engine is designed for real-time, editable, and customizable attendance management. It's seamlessly integrated with payroll software and supports multiple time attendance and access-control devices. The software automatically communicates with devices and reads clock-in/clock-out times to create overtime reports for users and overtime data to process payroll. DynaPay also calculates gratuity, considering an employee's hiring date, contract type, salary, and remaining leave balances, and it prepares final settlement, saving time and avoiding miscalculation.

Lastly, it sends alerts prior to the date a company document would expire, helping businesses avoid fines and legal penalties.

“It is with great pride and immense pleasure that we introduce our latest product, DynaPay, a human resources and payroll solution for SMBs that is built on Microsoft Dynamics 365 Business Central,” said Mohamed Elmaraghy, Managing Director, Dynamics Business Solutions. “DynaPay is designed to work effectively under any complex business regulations, providing maximum flexibility and agility to extend your investment in Dynamics 365.”

Kirsten Edmondson Wolfe, Senior Director, AppSource Product Marketing, Microsoft Corp. said, “We’re pleased to welcome DynaPay to Microsoft AppSource, which gives our customers access to the best solutions available from our extensive partner ecosystem. Microsoft AppSource offers partner solutions such as DynaPay from Dynamics Business Solutions to help customers manage and customize their payroll functions.”

Learn more about DynaPay and get a free trial at its page on AppSource.

CheatSheet for SwiftUI Makes iOS app Development easier than ever

About the technology

Swift is a general-purpose, multi-paradigm, compiled programming language developed by Apple Inc. for iOS, iPadOS, macOS, watchOS, tvOS, and Linux. Swift is designed to work with Apple's Cocoa and Cocoa Touch frameworks and the large body of existing Objective-C code written for Apple products. Wikipedia

SwiftUI is an innovative, exceptionally simple thanks to building user interfaces across all Apple platforms. You're faster in development and it's easier to separate design and logic. billion iPhone users are expecting subsequent amazing app. it is time for you to create it! Apple's Swift language makes iOS development easier than ever, offering modern language features, seamless integration with all iOS libraries, and thus the top-notch Xcode development environment. And with this free SwiftUI Cheat-Sheet, you'll get started fast.

What does an iOS developer do?

An iOS developer builds, tests, and refines applications for mobile devices that use Apple's iOS OS that's according to the goals and standards of their company or client. They need to have a strong understanding of iOS and how it works with different Apple devices such as the iPhone, iPad, iPod touch iTouch Apple Watch, and Apple TV, and be able to adapt their applications to their firm's or client's requirements.

Cheat-Sheet on the App Store

Cheat-Sheet for SwiftUI shows all UI elements and the needed source code. Each UI element is presented in one or more variations. You can try the control and check the functionality. You can see one or more examples for working SwiftUI elements & the source code to get it. Corresponding UIKit elements are listed. It's easy, try it!

To allow experienced coders an easier changeover to SwiftUI, all elements from UIKit are assigned to the corresponding SwiftUI elements.

iOS Development with Cheat-Sheet for SwiftUI is A practical developer app to creating apps for iPhone and iPad using the cheatSheet app. Our app will be guided through every step of the process for building an iOS app, from the first idea to the App Store.

If you are interested in pursuing a career in mobile development and don't know where to start, here's your go-to guide for salaries, skills, and the best programming languages to learn.

To help those interested in the field better understand how to break into a career in mobile development, we compiled the most important details and resources. This guide the way to become an iOS developer are going to be updated on a daily basis. It is also available as a download, How to become an iOS developer with Cheat-Sheet (free PDF).

 

 

Media Contact:
Enrico Bansemer
Bansemer Consulting GmbH
Plauthstr. 13a,
06847 Dessau-Rosslau

This email address is being protected from spambots. You need JavaScript enabled to view it.
http://bansemer.net/

Microchip Expands Adaptec SmartRAID Product Portfolio with New Entry level Adapter

New Delhi, June 22, 2020 — To support cloud, enterprise and workstation customers that require the robustness and performance of hardware RAID at an entry-level cost point, Microchip Technology Inc. (Nasdaq: MCHP) announces the Adaptec® SmartRAID 3100E RAID adapters which are designed to provide reliable hardware RAID protection for customer data in cost-sensitive end applications. The SmartRAID 3100E provides over 60 percent performance acceleration over Microchip’s prior-generation Adaptec Series 8E products at 40 percent power savings.  The Adaptec SmartRAID 3100E series joins Microchip’s existing production-released family of PCIe® Gen 3 SAS-3/SATA SmartRAID 3100 adapters. The new SmartRAID 3100E adapters are ideal for systems desiring application acceleration from caching support and entry-level enterprise RAID data protection without the cost of cache protection or advanced RAID levels of full-featured RAID adapters.

“The SmartRAID 3100E entry-level adapters offer a migration path for those seeking to transition from software RAID solutions or a legacy entry-level hardware RAID solution to Microchip’s proven Smart Storage stack,” said Andrew Dieckmann, associate vice president of Microchip’s Data Center Solutions business unit. “These adapters offer a built-in DRAM cache of 1 or 2 GB providing significant performance acceleration and lower power over previous generations and are ideal for 4K random read/write workloads.”

Entry-level SmartRAID 3100E RAID adapters are well suited for applications such as computing and graphical applications, edge compute and storage nodes, and industrial and manufacturing servers. Enterprises and cloud service providers now have the option to update the popular Adaptec Series 6E and Series 8E RAID adapters to the Smart Storage platform for these applications and benefit from the unified drivers, firmware and management tools across the Smart Storage family.

Deployment Tools

The SmartRAID 3100E adapters share the common Smart Storage deployment tools such as the Adaptec maxView Storage Manager and the new open-source, software-defined storage plug-ins. Public firmware, software and documentation are available at www.adaptec.com/support. A dedicated Adaptec knowledgebase is also available at ask.adaptec.com.

 

Availability

Adaptec SmartRAID 3100E series board-level adapters are available in volume production quantities now. Two new devices, the 3102E-8i and 3101E-4i, supporting hardware RAID levels 0, 1 and 10, provide data reliability and performance acceleration for up to eight and four direct attach devices, respectively. For additional information, visit www.microchip.com/smartstorage or contact a Microchip sales representative or authorized worldwide distributor. To purchase products mentioned here visit our purchasing portal or contact a Microchip authorized distributor.

 

Resources

High-res images available through Flickr or editorial contact (feel free to publish):

About Microchip Technology

Microchip Technology Inc. is a leading provider of smart, connected and secure embedded control solutions. Its easy-to-use development tools and comprehensive product portfolio enable customers to create optimal designs which reduce risk while lowering total system cost and time to market. The company’s solutions serve more than 120,000 customers across the industrial, automotive, consumer, aerospace and defense, communications and computing markets. Headquartered in Chandler, Arizona, Microchip offers outstanding technical support along with dependable delivery and quality. For more information, visit the Microchip website at www.microchip.com.

Despite Being Unsafest Email is Most Popular Method for File Sharing

New research by file encryption tool NordLocker explores people’s habits related to file storage, sharing, and protection.

London, England - U.K. | June 22nd, 2020 -- New research by NordLocker reveals that people mostly use email to share their files. Despite posing the biggest security risk, email was the most common method of sharing files for 58% of US and 56% of UK users.

“Even though email is one of the most popular targets for cyberattacks, people still trust it with their personal information,” says Oliver Noble, an encryption specialist at NordLocker. “If an email gets hacked, all of its attachments, such as sensitive documents or private photos, can fall into the hands of criminals.”

According to the survey, other ways people use to share their files include cloud services (35%), messaging apps (27% of US and 46% of UK users), external drives (14-15%), and file transfer services like WeTransfer (10%).

The file encryption tool NordLocker has anonymously surveyed 1,400 people in the UK and the US to find out about users’ habits when it comes to file storage and sharing as well as to understand how people protect their sensitive data.

Exposure to cyber threats

More than half of the respondents (67% of US and 55% of UK users) admit to having fallen victim to a malicious cyber activity at least once. Almost every second user from the US and more than every third user from the UK has had their computer infected with a virus. As many as 3 out of 10 US users and 2 out of 10 UK users have clicked on a link in a scam email, while 7% of users from the US and 8% of those from the UK were asked to pay a ransom to regain access to their own files.

How does exposure of private data feel? Losing a personal computer or finding out someone has access to it is almost as concerning as losing a wallet, having important documents stolen, or returning home to an open front door, the NordLocker study has revealed.

Those who have been victims of cyberattacks tend to take their digital security more seriously. For example, 39% of US users who haven‘t experienced any malicious cyber activity don‘t protect their files. The number decreases to only 16% among those who have. In the UK, the numbers are 32% and 19% respectively.

What people store on their computers and how they value it

Despite the similar results in the US and UK, there was a difference in what users consider as private information and how valuable they think it is. For example, US users equally value their tax records and medical records. 72% of respondents who store these types of files on their computers consider this information as very and extremely valuable. Personal photos and work-related data are also regarded as very valuable by US users (67% and 65% respectively).

In comparison, users from the UK value their photos more than any other type of files they store on their computers: 70% of respondents chose photos over their medical records (69%), work-related data (60%), and tax records (60%).

“Although users consider photos as the most valuable, these types of files don’t hold any sensitive information that could be used in a scam. On the other hand, various documents, tax information, and medical records contain social security numbers and bank account details, which could cause people financial harm or pose a risk of identity theft,” warns Oliver Noble.

How people protect their files

In both the US and the UK, every second person shares their personal computer with other people, thus, they tend to protect their files in one way or another. 75% of respondents claim they protect their files, with passwords being the most popular choice (46%). 16% of respondents say they use encrypted cloud storage, while 12% say they practice hiding their files on a computer manually.

“Even though the safest way to protect files is encryption, NordLocker research shows that only 1 out of 10 people uses an encryption tool to protect their files,” explains Oliver Noble. “The results indicate that cybersecurity is still murky waters to some computer users, and public education on the matter needs improvement.”

About NordLocker:
NordLocker is a tool that secures files stored on a computer or in the cloud with end-to-end encryption. It was created by the cybersecurity experts behind NordVPN – one of the most advanced VPN service providers in the world. NordLocker is available for Windows and macOS. For more information: nordlocker.com.

Press & Media Contact:
Skylie Akers
NordLocker
Tower A, Torre de Las Americas,
Punta Pacificana, Panama City,
Republic of Panama
+5078336910
https://nordlocker.com