sb-au logo
Story image

HID Global acquires PKI-as-a-service solutions provider HydrantID

17 Sep 2019

Identity solutions provider HID Global today announced that it has acquired HydrantID, a provider of management and automation services to secure enterprise organisations data, IT systems, networks, and Internet of Things (IoT).

Specialising in public key infrastructure (PKI) as a service, HydrantID has issued over three million PKI credentials and secured over 125,000 domains.

HydrantID provides PKI-as-a-service solutions that address the critical security needs of networks and IoT system for enterprise, government, financial and other information security-conscious customers.

The majority of these IoT systems are expected to be online by the year 2020 and use IP-based protocols requiring PKI-based authentication to secure the identities of machines on a network and IoT data.

In addition, increased security and bot attacks against enterprise networks and remote devices, as well as regulatory changes and compliance issues, are creating new risks for small, medium and large enterprise organisations.

PKI-based authentication security helps reduce risks significantly.

“We are evolving HID’s Identity and Access Management business to provide one-stop solutions for PKI services across the enterprise,” says HID Global president and CEO Stefan Widing.

“With the acquisition of HydrantID, we are now able to offer enterprise customers a broader range of options, plus the flexibility and scalability of PKI-as-a-service to improve information security.”

Based in Salt Lake City, Utah, HydrantID offers certificate authority services that secure IoT systems, enterprise networks, publicly trusted SSL website certificates and client certificates for e-commerce.

Utilising hybrid cloud trust architecture delivered from a state-of-the-art data centre and scalable cloud platform, HydrantID’s solution helps its customers reduce operating complexities while extending the use of certificate-based authentication and encryption across their organisation.

A benefit of HydrantID is its ability to automate certificate lifecycle events and distribution using industry-standard protocols and “out-of-the-box” integration with common enterprise network software and platforms.

The combination of HydrantID and HID IdenTrust certificate authority services will strengthen HID’s identity and access management solution portfolio to solve customer’s digital security challenges.

The joint solution portfolio will allow customers to deploy scalable certificate-based authentication and encryption for the protection of complex enterprise data and IoT devices.

HydrantID will join HID IdenTrust, under HID’s identity and access management business led by vice president and managing director Brad Jarvis.

In early 2019, HID IdenTrust was named the number one certification authority in the world for the second year in a row.

Download image
Cloud, VPNs & digital workspaces: 3 focus areas for enterprise security
Authentication can bring three things to the table: Choice, appropriate risk analysis, and ease of use for everyone.More
Story image
Demand for VPNs soars in Hong Kong amid fears over Beijing crackdown
VPN provider Surfshark revealed it has seen a week’s worth of sales in just one hour within the city, indicating that locals feel their internet freedom is under attack.More
Link image
Webinar: Build your threat-aware network
Security solutions are available for almost every perceived threat, but now it's becoming a challenge for some enterprises to juggle them all. Find out how to streamline your security network.More
Story image
Endace and Palo Alto Networks launch integration to empower security teams
“The combination of Cortex XSOAR’s powerful orchestration and automation capabilities with the rich network history recorded by the EndaceProbe Analytics Platform gives security operations access to the conclusive forensic evidence they need to respond quickly and accurately to threats.” More
Story image
Current security practices 'grossly inadequate' for protecting cloud infrastructures - report
"As cloud stacks become increasingly complex, with new technologies regularly added to the mix, what's needed is a holistic approach with consistent protection across the full cloud stack."More
Link image
How to deploy containerised apps in your cloud infrastructure
Move your business into the future - take advantage of a free consultation to pinpoint how container-based applications can propel your cloud infrastructure to new heights.More