A company of NEC, Cyber Defense Institute (CDI), a Japanese Cyber Security Company, launches the cloud-based private certification authority solution PIV Gateway™ CA that supports not only traditional X.509 certificate issuance but also emphasizes the issuance of Platform Certificates.
According to our research, this is the world’s first commercial certification authority service to support Platform Certificates.
Our system leverages FIPS 140-3 certified Hardware Security Modules (HSMs) to fulfill stringent security requirements, underscoring our dedication to adhering to the highest security standards. It presents an optimal solution for computer manufacturers, value-added resellers, and system integrators who supply products with high security demands—such as servers, laptops, and desktop computers—complying with the National Security Agency’s (NSA) Guidance on Acceptance Testing for Supply Chain Risk Management.
Thanks to its OpenAPI compatibility, our system facilitates seamless integration into existing manufacturing workflows, significantly enhancing the efficiency of automated certificate issuance. This capability is essential in sectors requiring improved supply chain security, ensuring the secure and efficient distribution of Platform Certificates.
Further information is available at
https://www.cyberdefense.jp/en/piv_gateway_ca_en.html
About Cyber Defense Institute
Based in Japan with headquarters in Tokyo, Cyber Defense Institute is a cyber security company delivering professional services such as penetration testing, incident response/forensics, and more.
We are a team of top notch engineers that have come together on a mission to protect the safety of cyber space. Dedicated to “Only humans can counter human-driven threat”, all members of us face the threats of cyber space in the front line with high ethical standards and a strong sense of social contribution.
For more information about us, please contact or visit our website.
Email: [email protected]
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.