sb-as logo
Story image

HID Global acquires PKI-as-a-service solutions provider HydrantID

17 Sep 2019

Identity solutions provider HID Global today announced that it has acquired HydrantID, a provider of management and automation services to secure enterprise organisations data, IT systems, networks, and Internet of Things (IoT).

Specialising in public key infrastructure (PKI) as a service, HydrantID has issued over three million PKI credentials and secured over 125,000 domains.

HydrantID provides PKI-as-a-service solutions that address the critical security needs of networks and IoT system for enterprise, government, financial and other information security-conscious customers.

The majority of these IoT systems are expected to be online by the year 2020 and use IP-based protocols requiring PKI-based authentication to secure the identities of machines on a network and IoT data.

In addition, increased security and bot attacks against enterprise networks and remote devices, as well as regulatory changes and compliance issues, are creating new risks for small, medium and large enterprise organisations.

PKI-based authentication security helps reduce risks significantly.

“We are evolving HID’s Identity and Access Management business to provide one-stop solutions for PKI services across the enterprise,” says HID Global president and CEO Stefan Widing.

“With the acquisition of HydrantID, we are now able to offer enterprise customers a broader range of options, plus the flexibility and scalability of PKI-as-a-service to improve information security.”

Based in Salt Lake City, Utah, HydrantID offers certificate authority services that secure IoT systems, enterprise networks, publicly trusted SSL website certificates and client certificates for e-commerce.

Utilising hybrid cloud trust architecture delivered from a state-of-the-art data centre and scalable cloud platform, HydrantID’s solution helps its customers reduce operating complexities while extending the use of certificate-based authentication and encryption across their organisation.

A benefit of HydrantID is its ability to automate certificate lifecycle events and distribution using industry-standard protocols and “out-of-the-box” integration with common enterprise network software and platforms.

The combination of HydrantID and HID IdenTrust certificate authority services will strengthen HID’s identity and access management solution portfolio to solve customer’s digital security challenges.

The joint solution portfolio will allow customers to deploy scalable certificate-based authentication and encryption for the protection of complex enterprise data and IoT devices.

HydrantID will join HID IdenTrust, under HID’s identity and access management business led by vice president and managing director Brad Jarvis.

In early 2019, HID IdenTrust was named the number one certification authority in the world for the second year in a row.

Story image
Palo Alto Networks launches new SD-WAN solutions and enhancements
Palo Alto Networks has introduced two new SD-WAN appliances and enhancements to its next-generation SD-WAN solution, expanding the company’s CloudGenix SD-WAN solutions reach.More
Story image
Research: Younger cybersecurity pros more fearful of being replaced by AI
According to the findings, 53% of respondents under 45 years old either agreed or strongly agreed that AI and ML are a threat to their job security, despite 89% of this demographic believing that it would improve their jobs.More
Story image
New project development inhibited by cybersecurity, Kaspersky research states
"There are still some practical steps that can be taken to make sure that an emerging technology or a product reaches its launch. Cybersecurity doesn’t have to be another corporate barrier, but it should be on an integral part of the project all long."More
Story image
Five Eyes nations want legal access to backdoors to fight 'illegal content'
The nations argue that encryption can make the enforcement of public safety difficult, particularly when it comes to serious problems like child exploitation. More
Story image
Microsoft is most imitated brand for phishing attacks in Q3
Popular phishing tactics using the Microsoft brand used email campaigns to steal credentials of Microsoft accounts, luring victims to click on malicious links which redirect them to a fraudulent Microsoft login page. More
Story image
Creating private data regulations for employees
Whether employees are hired on a part-time or full-time basis, everyone must know about data privacy regulations. Everyone needs to be responsible for keeping the organisation’s data secure. More