Is the person logging into the intranet actually authorized to do so? Is the software which issues a command to a computer authorized to do this? In the analogue world, we prove our identity with a passport and a driver's license. In the digital world, people or objects are clearly identified using a digital identity, which protects against misuse and makes work difficult for hackers.
However, on the web there is one commodity for which sellers are consistently achieving higher prices: digital identities and digital certificates. Machine identities are particularly popular on the Darknet. On marketplaces such as Dream Market, BlockBooth, and Galaxy3, SSL/TLS certificates cost up to several thousand US dollars. At the start of 2019, IT security researchers from Kaspersky Lab Material found more than 60,000 stolen existing digital identities on the Darknet shop Genesis.
If misuse of a digital identity is to be prevented, identity data must be securely generated, securely stored, and securely processed. But users are already complacent when choosing the right password. Four out of five data attacks take place due to simple and hackable character combinations. T-Systems offers various processes and solutions with which companies can generate digital identities, secure websites, and passwords.
Protect your company values and processes. We also help you to securely use the rapidly growing number of connected “things” on the web.
High compliance requirements require professional planning and certified operations. T-Systems takes on the responsibility for the protection of your data and infrastructure.
Public facilities are a particular target for IT attacks. T-Systems supports you with competent specialists and delivers “Made in Germany” security with the highest safety requirements.
IT Systems are the backbone of the finance sector and are therefore strictly regulated by international compliance standards. We will protect you and help you to securely fulfill these standards.
Communication is the beating heart of modern IT. As a leading provider of telecommunications services and IT security, we will also secure your exchange of information.
The energy supply sector is one of the critical infrastructures with the highest threat potential. Telekom Security prepares tailor-made and BSI-certified solutions for you.
In addition to issuing certificates, the full-service Trust Center also develops complex public key infrastructures (PKI) for industrial customers, authorities, countries, and organizations. The security and performance of individual solutions and products from the Trust Center are safeguarded through regular certifications. The team works in compliance with EU regulation on electronic identification and trust services (eIDAS), as well as the specifications of the European Telecommunications Standards Institute (ETSI). Furthermore, gematik approval for the electronic health card is available.
The Internet of Things (IoT) and machine-to-machine communication in connection with cloud and Industry 4.0 applications are only possible if millions of communicating things and machines are clearly virtually mapped through the automated mass issuance of digital identities.
Highly-automated issuance and management of certificates for the “things” on the web.
The ideal solution for all of those who wish to equip their IoT/M2M end devices with digital identities (“passports”) and therefore fulfill the requirement for communication partners to interact authentically with one another in modern digital infrastructures.
The vast number of current IoT/M2M devices, including typical office devices like printers, client workspaces, servers, and phone systems, can be managed very efficiently thanks to automation with the authorization backend automated through the PKI service.
SSL/TLS web server certificates for secure and encrypted communication on the web. In addition, internet web servers will receive an identity to interact authentically.
Qualified electronic signature and remote signature in compliance with eIDAS, as a replacement for the hand-written signature.
The cloud public key infrastructure (PKI) for flexible and fast integration in your company.
Issuance and management of certificates certified according to BSI (TR-3109) in the smart meter ECO system.
Special regulatory requirements for the authentication and exchange of digital signatures and encrypted documents, for example in healthcare or the energy sector, can be mapped via individualized PKI applications.
Planning, development, and operation of customer-specific PKI solutions in the Trust Center or on the customer's premises.
The use of a two-factor authentication solution enables companies to optimally secure access to their data in line with their protection requirements.
The intelligent service generates one-time passwords to log into online services and protected systems, is easy to integrate, and offers increased security through strong two-factor authentication, as well as cost optimization through minimal bureaucracy. It enables users to access many systems and services with a single login process.
The cloud authentication solution facilitates strong two-factor authentication using one-time passwords.
Privileged account management allows companies to safeguard administrative access to their most critical IT resources (on-premises or in the cloud). PAM solutions help companies with the storage, management, and monitoring of privileged accounts and their credentials in a secure digital safe that fulfills compliance requirements (ISO 27001, BSI basic security...).
By creating a central secure storage space for privileged identity information, companies can:
Risk-based authorization and session management for privileged accounts to protect against attacks.
We carry it in our wallets and coat pockets, use it on our travels, or use it for checking into our office PC. But hardly anyone is aware that, by doing this, they are entrusting their personal data to one of the most secure operating systems on the IT market: the TeleSec Chipcard Operating System – or TCOS. The highly-secure smart card operating system is certified by the Federal Office for Information Security (BSI).
TCOS for passports or ID cards has been checked in accordance with the internationally recognized process of “Common Criteria”. It is therefore one of the most secure systems for international travel documents. More than 100 million passports, personal and company ID cards, digital tachographs, and electronic tickets in Europe are equipped with the highly secure TCOS operating system.
The PACE protocol protects against the unauthorized reading of data via a contactless interface. The chip on identity documents has a passport photo and fingerprints stored on it, among other things. The software organizes the encryption, the secure readout of personal data, and protects these against unauthorized access. TCOS is also able to safely store keys and calculate the cryptographic algorithm within the chip. Securely imported keys never have to leave the chip card again.
The combination of the TeleSec chip-card operating system and the security chip has been conceived with international requirements for electronic identity documents in mind. But we don't stop there: working with various chip manufacturers, we are continuously checking the use of new smart card technologies, as well as application areas. Examples of application areas are mobile security, company ID cards, electronic driving licenses (European driver's license), security for cloud solutions, and security for data in web solutions, such as intelligent electricity meters (smart meters).
Identity systems for electronic passports and national ID cards. Smartcard-based project solutions.
Secure storage and security anchors for the digital identities of people and devices.
A trust center serves as an independent certification point and trusted authority for the electronic exchange of data. T-Systems is accredited by the German Federal Network Agency (Bundesnetzagentur) as a trusted service provider. In order to guarantee the highest possible security, all Trust Center services are based on the latest technologies from the security sector – whether for the encryption of data and networks or for two-factor authentication.
As the first German Trust Center, T-Systems offers security services as an independent trusted service provider based on an ISO-certified security concept. The Trust Center accredited by the German Federal Network Agency serves as an independent certification point and trusted authority for the electronic exchange of data.
Behind all services there is a highly secure environment across geographically redundant data centers, based in Germany. If one area has an outage, a second data center automatically steps in. All data, the entire IT infrastructure, and all network connections are mirrored in this data center. In this way, not only are we safeguarding a reliable and highly-available operation, we are also complying with the highest German and European requirements for data protection and security.
Certificate are issued in our own Trust Center and exclusively by trained and security-screened personnel. This ensures that certificates of the highest security level are created. T-Systems guarantees a secure, electronic exchange of data, even for highly sensitive information.