GLOBALTRUST COMPANY
Exclusive Public Key Infrastructure
With GLOBALTRUST COMPANY, your company becomes a registration authority: your own public key infrastructure (PKI) is set up on the basis of a company root certificate. Certificates for client authentication, e-mail signatures, encryption and many other purposes can be conveniently issued, managed and revoked via various interfaces or partner applications – for all employees, departments, devices and services in the company infrastructure. The service is available in all modern operating systems and browsers. In contrast to self-signed certificates, the certificates are therefore immediately categorised as trustworthy from the outside without any intermediate steps.
The electronic business card for employees and devices
Numerous available interfaces
Variant 1
Web
Certificate issuance via internet browser – convenient and immediately available
Variant 2
SOAP
Certificate management via SOAP API, ideal for connecting to any backend systems
Variant 3
Partner application
GLOBALTRUST COMPANY is available in numerous partner applications
Variant 4
Autoenrolment
Not only apply for and revoke certificates, but also distribute them fully automatically
GLOBALTRUST COMPANY: PKI as a Service
Easy application, multiple possible uses
The user certificates can be issued independently on a 24/7/365 basis via an online interface or a separate interface. Multiple purposes and individual configurations are possible: GLOBALTRUST customers use them primarily for signing and encrypting e-mails, document signing and electronic invoicing, for log-in purposes as part of multi-factor authentication, VPN services or SingleSignOgn solutions.
GLOBALTRUST COMPANY
Do you want to issue certificates yourself?
- from as little as € 5 per year and certificate
- Individual term agreement
- Flexible contingent adjustment
- individual configurations
Your benefits at a glance
Binding
Electronically signed e-mails and documents increase your trustworthiness in electronic business transactions
Confidential
Encryption using state-of-the-art algorithms ensures confidentiality
Flexible
Certificates can be issued with flexible duration and configuration, ideal for in-house requirements
Secure
Certificates are a secure identification mechanism for access to protected websites and virtual private networks (VPN)
Simple
Easy to use with standard software. Easy integration into existing workflow and document management systems.
Performance
Certificate management around the clock, without being tied to support and processing times
Autoenrolment – fully automated PKI
Request, disseminate, install, renew and revoke certificates – for hundreds of employees and devices. With the help of numerous interfaces from our partners, this task is no longer a worry. Users don’t notice a thing and can concentrate on their actual work. Our tested partner interfaces provide solutions for the autoenrolment of certificates for use in mail gateways or your own development. Your certificates are distributed and managed automatically – overwhelmed employees, overlooked devices and expired certificates are a thing of the past. We work with you to clarify your requirements and procure a suitable partner solution for you.
GLOBALTRUST COMPANY – get a quote
Get your individual quote, for example:
- 100 Users: 1.584,00 EUR/year
- 1000 Users: 6.960,00 EUR/year
*VAT may apply
from € 5
per User
Schedule a call with us
How can we get in touch with you?
Contact team: +43 1 532 0 944
Our employees are at your disposal for a non-binding consultation.
Availability: Mon-Fri 9:00-17:00
Further information on GLOBALTRUST COMPANY
Download fact sheet GLOBALTRUST COMPANY
- Autoenrolment solutions by Secardeo
- Autoenrollment: advantages and limitations of a Microsoft CA in the Windows-PKI
- Fully automatic Cert Management through the SEPPmail Secure Email Gateway
Please use our contact form in case of any questions
Technical Data
- Interoperability through conformity with X509v3 and RFC 5280
- Future-proof encryption with RSA 4096 or ECDSA secp256r1
- Future-proof hash method: SHA-256, SHA-512, RIPE-MD160 or higher
- Optional: Highly available status service via OCSP guarantees verifiability of certificates
- Optional: LDAP distribution of user certificates facilitates key exchange
- Free revocation management via CRL
- Authorised key usage: Signing and encrypting e-mails and documents, client authentication and much more.
- Operation on HSM in data centre certified according to ISO 270001
- Regular conformity assessment according to eIDAS and ETSI
- Outstanding recognition by browser/operating system manufacturers
- Timely announcement of changed browser specifications
You might also like…
What are the costs of not going paperless?
While digitization reached almost every aspect of daily work, the necessity for handwritten signatures in B2B environments preserves printing paper its crucial role – and incurs costs. However, by implementing e-signatures, businesses can reduce expenses, streamline processes, and contribute to a more sustainable...
QES & Competition Law – European Commission to require electronic signatures from 1st September, 2023
To further simplify merger control procedures and in line with its overall digital strategy, the European Commission has published a number of revised legal texts, including one that will make electronic transmission of electronically signed documents the default method from 1 September 2023. Read on to find out...
On letters, stamping and (e-)seals
On letters, stamping and (e-)seals Still stamping or already sealing? Fully automated and at the highest security level? If no, you should think about it: You can use the electronic seal as a digitization turbo and make it the central game changer of your organization. Did you know that there are administrative...
Encryption and digital signature of e-mails: free of charge for new UPC-customers
Cyber attacks on companies and public authorities usually begin unspectacularly - with an e-mail. Malware is used to introduce computer viruses into the IT system with the aim of extorting a ransom or committing industrial espionage or data theft. Employees are often not to blame, as phishing attacks are becoming...
GLOBALTRUST CODESIGNING – secure signature of software
What is GLOBALTRUST CODESIGNING? More and more operating systems and platforms require software to be signed during installation. This is to protect users, making it easy for them to determine where software comes from and whether the vendor is trustworthy. GLOBALTRUST offers corresponding certificates at...
What is a digital signature?
Clarification of misunderstandings - digital signature is a technical process that clearly identifies an electronic file - special meaning of the "advanced" signatureAlthough the technology of the digital signature has been used for more than ten years, it is still not very widespread and therefore always gives rise...