Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

This document outlines the features of Active Directory Certificate Services (AD CS) within Windows Server® 2012. AD CS serves as the server role designed to establish a public key infrastructure (PKI), enabling your organization to utilize public key cryptography, digital certificates, and digital signatures. The services offered by AD CS can be tailored for issuing and managing digital certificates, which are essential for software security systems leveraging public key technologies. These digital certificates facilitate the encryption and digital signing of electronic documents and messages, ensuring secure communication. Additionally, they play a crucial role in authenticating computer, user, or device accounts across the network. By employing AD CS, you can significantly boost security measures by linking the identity of individuals, devices, or services to their corresponding private keys. Furthermore, AD CS provides a reliable, cost-effective, and efficient mechanism for overseeing the distribution and utilization of certificates, thereby enhancing overall security within your organization’s infrastructure. Ultimately, implementing AD CS can lead to improved trust and integrity in digital communications.

Description

Enhance the return on investment for current PIV infrastructure in cross-agency encryption by utilizing ZevaCrypt™, a comprehensive and user-friendly end-to-end encryption solution. Email communication, particularly over secure channels, has consistently posed significant security challenges, especially for those tasked with enforcing the use of high assurance credentials like PIV and CAC. Given that email serves as the primary communication method for both sensitive and non-sensitive information, the importance of secure exchanges cannot be overstated. While encrypting emails within a single organization is relatively straightforward, achieving encryption across different organizations remains complex and often requires manual intervention. Existing PKI encryption systems fall short of providing the necessary level of security, as they typically do not validate certificate policies in accordance with their intended design. It is essential to understand that robust encryption must integrate strong identity verification with advanced cryptographic techniques. In this context, PKI encryption emerges as the sole method capable of fulfilling this essential convergence of objectives, ensuring that sensitive communications remain secure across various agencies.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Azure Marketplace
CertSecure Manager
GeoCivix
HYPR
Microsoft Outlook
OfficeSpace Software
QCecuring
RadiantOne

Integrations

Azure Marketplace
CertSecure Manager
GeoCivix
HYPR
Microsoft Outlook
OfficeSpace Software
QCecuring
RadiantOne

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

$9.90 per month
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Microsoft

Founded

1975

Country

United States

Website

docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/hh831740(v=ws.11)

Vendor Details

Company Name

ZevaCrypt

Country

United States

Website

zevacrypt.zevainc.com

Product Features

Encryption

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Alternatives

Alternatives

Cryptainer Pro Reviews

Cryptainer Pro

Cypherix Software
Secardeo TOPKI Reviews

Secardeo TOPKI

Secardeo