Welcome!

News Feed Item

CSS and ISARA Introduce the First and Only Quantum-Safe, Full-Stack PKI

Partnership elegantly solves upgrade burden as auto industry moves to over-the-air software update

CLEVELAND and WATERLOO, Ontario, April 17, 2018 /PRNewswire/ -- from booth #N3123 at RSA Conference 2018 -- Certified Security Solutions (CSS), the leader in Public Key Infrastructure (PKI) based digital identity software and services, and ISARA, the leading provider of security solutions for the quantum computing age, announced today that their innovative partnership has resulted in release of the world's first quantum-safe, full-stack PKI solution.

CSS and ISARA Introduce the First and Only Quantum-Safe, Full-Stack PKI

With the new PKI solution, the automotive industry has the ability to ensure that its over-the-air (OTA) software updates are secure against attack from today's conventional systems and quantum computers in the future.  By deploying a quantum-safe PKI today, carmakers can accomplish mass software updates at scale without the burden of extremely complicated (nearly impossible) recalls and dealer visits when current classic Roots of Trust become unsafe with the dawn of large-scale quantum computers. Connected vehicles on the road today, and all connected vehicles in development, will need protection from the potential negative effects of large-scale quantum computers.

"Quantum computing will deliver amazing benefits, but will also create a new and very serious security threat,'' said Scott Totzke, CEO & Co-founder of ISARA Corp. "We're proud to partner with CSS by integrating a new level of quantum-safe security into their PKI solutions. Helping to solve this security challenge for the auto industry is a big leap forward toward the reality of completely connected vehicles that remain secure and safe.''

Experts estimate that large-scale quantum computers will be available within the next decade, with some predicting in as early as eight years.  With immense computing power driven by quantum mechanics, these computers offer the potential for huge advancements in areas such as artificial intelligence and material design. But that computing power also will be capable of breaking public key cryptography that protects all of the data, software updates and technology we now safely store, share and use.

"Simply stated, solutions that are not built on a foundation of crypto-agility will not be secure in the future," said Kevin von Keyserling, President and CEO of CSS. "We're excited to announce the extension of our Enterprise and IoT security solutions together with ISARA. Our commitment to crypto-agility and its enablement has allowed CSS clients to upgrade from deprecated algorithms such as SHA-1, and systematically migrate from Roots of Trust requiring replacement. The CSS/ISARA offering futureproofs the security of devices into the quantum computing era."

About Certified Security Solutions (CSS)

Certified Security Solutions (CSS) is the leading provider of PKI software and services to securely connect people, applications, and devices to business ecosystems. Headquartered in Independence, OH, CSS solutions facilitate the identification, authentication, management, and overall security of digital assets across the Enterprise and the IoT markets. Contact us at 877-715-5448 or visit https://www.css-security.com/ for more information.

CSS Media Contact

Sarah Hance
[email protected]
216.785.2291

About ISARA Corporation 

ISARA is a cyber-security company specializing in creating production-ready quantum-safe security solutions that can be embedded into commercial products today to secure data now and in the future. As a commercial solution provider within a rich academic and research ecosystem, ISARA is part of a collaborative effort to raise awareness of quantum threats, and design and implement quantum-safe solutions that will work globally. For more information, visit www.isara.com.

ISARA Media Contact

Aaron Curtiss
[email protected]
(720) 281-1395

David Satterfield
[email protected]
(408) 802-6767

Cision View original content with multimedia:http://www.prnewswire.com/news-releases/css-and-isara-introduce-the-first-and-only-quantum-safe-full-stack-pki-300630901.html

SOURCE Certified Security Solutions (CSS)

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
As organizations shift towards IT-as-a-service models, the need for managing and protecting data residing across physical, virtual, and now cloud environments grows with it. Commvault can ensure protection, access and E-Discovery of your data – whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise. In his general session at 18th Cloud Expo, Randy De Meno, Chief Technologist - Windows Products and Microsoft Part...
Andi Mann, Chief Technology Advocate at Splunk, is an accomplished digital business executive with extensive global expertise as a strategist, technologist, innovator, marketer, and communicator. For over 30 years across five continents, he has built success with Fortune 500 corporations, vendors, governments, and as a leading research analyst and consultant.
"Cloud computing is certainly changing how people consume storage, how they use it, and what they use it for. It's also making people rethink how they architect their environment," stated Brad Winett, Senior Technologist for DDN Storage, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
In his session at 20th Cloud Expo, Brad Winett, Senior Technologist for DDN Storage, will present several current, end-user environments that are using object storage at scale for cloud deployments including private cloud and cloud providers. Details on the top considerations of features and functions for selecting object storage will be included. Brad will also touch on recent developments in tiering technologies that deliver single solution and an end-user view of data across files and objects...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settl...
No hype cycles or predictions of zillions of things here. IoT is big. You get it. You know your business and have great ideas for a business transformation strategy. What comes next? Time to make it happen. In his session at @ThingsExpo, Jay Mason, Associate Partner at M&S Consulting, presented a step-by-step plan to develop your technology implementation strategy. He discussed the evaluation of communication standards and IoT messaging protocols, data analytics considerations, edge-to-cloud tec...
In his session at @ThingsExpo, Dr. Robert Cohen, an economist and senior fellow at the Economic Strategy Institute, presented the findings of a series of six detailed case studies of how large corporations are implementing IoT. The session explored how IoT has improved their economic performance, had major impacts on business models and resulted in impressive ROIs. The companies covered span manufacturing and services firms. He also explored servicification, how manufacturing firms shift from se...
IoT is at the core or many Digital Transformation initiatives with the goal of re-inventing a company's business model. We all agree that collecting relevant IoT data will result in massive amounts of data needing to be stored. However, with the rapid development of IoT devices and ongoing business model transformation, we are not able to predict the volume and growth of IoT data. And with the lack of IoT history, traditional methods of IT and infrastructure planning based on the past do not app...
For far too long technology teams have lived in siloes. Not only physical siloes, but cultural siloes pushed by competing objectives. This includes informational siloes where business users require one set of data and tech teams require different data. DevOps intends to bridge these gaps to make tech driven operations more aligned and efficient.
For organizations that have amassed large sums of software complexity, taking a microservices approach is the first step toward DevOps and continuous improvement / development. Integrating system-level analysis with microservices makes it easier to change and add functionality to applications at any time without the increase of risk. Before you start big transformation projects or a cloud migration, make sure these changes won’t take down your entire organization.
It is ironic, but perhaps not unexpected, that many organizations who want the benefits of using an Agile approach to deliver software use a waterfall approach to adopting Agile practices: they form plans, they set milestones, and they measure progress by how many teams they have engaged. Old habits die hard, but like most waterfall software projects, most waterfall-style Agile adoption efforts fail to produce the results desired. The problem is that to get the results they want, they have to ch...
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service.
Digital Transformation is much more than a buzzword. The radical shift to digital mechanisms for almost every process is evident across all industries and verticals. This is often especially true in financial services, where the legacy environment is many times unable to keep up with the rapidly shifting demands of the consumer. The constant pressure to provide complete, omnichannel delivery of customer-facing solutions to meet both regulatory and customer demands is putting enormous pressure on...
The best way to leverage your CloudEXPO | DXWorldEXPO presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering CloudEXPO | DXWorldEXPO will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at CloudEXPO. Product announcements during our show provide your company with the most reach through our targeted audienc...