More cybercriminals are discovering identity theft as a new business model. The aim is to take over an identity (institution/end user/machine) and use it to damage the affected entity. Insiders in your organization could of course have a similar aim. 80 % of all security problems are caused by inadequate handling of privileged accounts. The protection requirements for availability, confidentiality, integrity, and authenticity are growing continuously.
Is the person logging into the intranet actually authorized to do so? Is the software which issues a command to a computer authorized to do this? In the analogue world, we prove our identity with a passport and a driver's license. In the digital world, people or objects are clearly identified using a digital identity, which protects against misuse and makes work difficult for hackers.
However, on the web there is one commodity for which sellers are consistently achieving higher prices: digital identities and digital certificates. Machine identities are particularly popular on the Darknet. On marketplaces such as Dream Market, BlockBooth, and Galaxy3, SSL/TLS certificates cost up to several thousand US dollars. At the start of 2019, IT security researchers from Kaspersky Lab Material found more than 60,000 stolen existing digital identities on the Darknet shop Genesis.
If misuse of a digital identity is to be prevented, identity data must be securely generated, securely stored, and securely processed. But users are already complacent when choosing the right password. Four out of five data attacks take place due to simple and hackable character combinations. T-Systems offers various processes and solutions with which companies can generate digital identities, secure websites, and passwords.
Industry
Protect your company passwords and processes. We also help you to securely use the rapidly growing number of connected "things" on the web.
Health
High compliance requirements necessitate professional planning and certified operations. T-Systems takes on the responsibility for the protection of your data and infrastructure.
Public sector & education
Public facilities are a particular target of IT attacks. T-Systems supports you with specialists and delivers 'made in Germany' security with the highest safety requirements.
Finances
IT Systems are the backbone of the finance sector and are therefore strictly regulated by international compliance standards. We will protect you and help you to securely fulfil these standards.
Telecommunications
Communication is the beating heart of modern IT. As a leading provider of telecommunications services and IT security, we will also secure your exchange of information.
Energy
The energy supply is one of the critical infrastructures with the highest threat potential. Telekom Security prepares tailor-made and BSI-certified solutions for you.
In addition to issuing certificates, the full-service Trust Center also develops complex public key infrastructures (PKI) for industrial customers, authorities, countries, and organizations. The security and performance of individual solutions and products from the Trust Center is safeguarded through regular certifications. The team works in compliance with European regulations on electronic IDentification, Authentication and trust Services (eIDAS) as well as the specifications of the European Telecommunications Standards Institute (ETSI). Furthermore, gematik approval for the electronic health card is available.
The Internet of Things (IoT) and machine-to-machine communication in conjunction with cloud and Industry 4.0 applications are only possible if millions of communicating things and machines are uniquely mapped through the automated mass issuance of digital identities.
Highly automated issuance and management of certificates for the “things” on the web.
Whether they are for corporate identity, shop systems, online banking, or authorities, TLS/SSL certificates enable clear identification of the web server and provide secure and encrypted data transmission and the assurance of communicating with the right receiver.
SSL/TLS web server certificates for secure communication on the web. Categorized as safe in all browsers.
Everything is becoming digital – this also applies to documents and forms, whether this be in the form of electronic transactions, e-folders, or digital maintenance reports and advice notes for goods. To ensure that these documents are legally binding and to protect them against manipulation, qualified signatures are an absolute must.
Qualified electronic signature and remote signature in compliance with eIDAS, as a replacement for the hand-written signature.
Company internal identity management can be mapped via a multi-client capable company PKI. All digital certificates are mapped and managed here – whether electronic signature and encryption for emails or the protection of company and router network.
The cloud public key infrastructure (PKI) for flexible and fast inclusion into your company.
The Energy CA provides certificates for the secure communication between public services, providers, or services providers and thus guarantees confidentiality, integrity, and authenticity within the smart metering environment.
Issuance and management of certificates certified according to BSI (TR3109) in smart meter ECO system.
Special regulatory requirements for the authentication and exchange of digital signatures and encrypted documents, for example in the healthcare or energy sector, can be mapped via individualized PKI applications.
Planning, development, and operation of customer-specific PKI solutions in the Trust Center or on the customer's premises.
The use of an access management solution enables companies to optimally secure access to their data in line with their protection requirements. Using policies, access management simply gives access to authenticated and authorized communication partners using a zero-trust model up to and including a federated approach.
A key advantage of well-functioning access management from a user's point of view is single sign-on. It enables users to access many systems and services with a single login process.
For strong authentication of identities, companies can use credential management platforms to flexibly configure various methods as a second factor for their users (such as FIDO token or one time password generators)
TeleSec One Time Pass
The cloud authentication solution allows strong two-factor authentication using one-time passwords.
Privileged account management allows companies to safeguard access to their most critical IT resources (on premises or in the cloud). PAM solutions help companies through the storage, management, and monitoring of privileged accounts and their credentials in a secure digital safe when fulfilling compliance requirements (ISO 27001, BSI basic security...).
By creating a central secure storage place for privileged identity information, companies can:
Privileged Identity Protect Pro
Risk-based authorization and session management for privileged account for protection against attacks.
We carry it in our wallets and coat pockets, use it on our travels, or use it for checking into our office PC. But hardly anyone is aware that, by doing this, they are entrusting their personal data to one of the most secure operating systems on the IT market: Telesec Chipcard Operating System – in short TCOS. The highly-secure smart card operating system certified by the Federal Office for Information Security (BSI).
TCOS for passports or ID cards has been checked in accordance with the internationally recognized process of "Common Criteria". It is therefore one of the most secure systems for international travel documents. More than 100 million passports, personal and company ID cards, digital tachographs, and electronic tickets in Europe are equipped with the highly secure TCOS operating system.
The PACE protocol provides protection against unauthorized uploading of data via a contactless interface. The chip on identity documents has a passport photo and fingerprints stored on it, among other things. The software organizes the encryption, the secure readout of personal data, and protects these against unauthorized access. TCOS is also able to safely store keys and calculate the cryptographic algorithm within the chip. Securely imported keys never have to leave the chip card again.
The combination of the Telesec chipcard operating system and security chip has been designed with international requirements for electronic documents in mind. But we don't stop there: in conjunction with various chip manufacturers, we are continuously checking the use of new smart card technologies as well as application areas. Examples of implementation areas are mobile security, ID cards in companies, electronic driving licenses (European driver's license), the security for cloud solutions and security for data in web solutions such as the intelligent electricity meters (smart meter).
Identity systems for electronic passports and national ID cards. Smart card-based project solutions.
Secure storage and security anchor for digital identities of people and devices.
A trust center serves as an independent certification point and trusted authority for the electronic exchange of data. T-Systems is accredited by the German Federal Network Agency (Bundesnetzagentur) as a trusted service provider. In order to guarantee the highest possible security, all Trust Center services are based on the latest technologies from the security sector – whether for the encryption of data and networks or for two-factor authentication.
As the first German Trust Center, T-Systems offers security services as an independent trusted service provider based on an ISO-certified security concept. The Trust Center accredited by the German Federal Network Agency serves as an independent certification point and trusted authority for the electronic exchange of data.
Behind all services there is a highly secure environment across geographically redundant data centers, based in Germany. If one area has an outage, a second data center automatically steps in. All data, the entire IT infrastructure, and all network connections are mirrored in this data center. In this way, not only are we safeguarding a reliable and highly-available operation, we are also complying with the highest German and European requirements for data protection and security.
Certificate are issued in our own Trust Center and exclusively by trained and security-screened personnel. This ensures that certificates of the highest security level are created. T-Systems guarantees a secure, electronic exchange of data, even for highly sensitive information.
We support your digital transformation with industry-specific consultation, first-class cloud services, digital solutions, and strong systemic security. With us, advanced industry expertise meets a perfectly integrated solution from a single source. Let's power higher performance – together!