Our services

Our services

Our powerful Certificate Key Management System (CKMS) makes implementation, distribution and management of certificates easy.

We have been doing this for over 15 years, independently of Certificate Authorities (CAs), for millions of users and devices worldwide.

Is your organisation struggling with traditionally complex issues associated with PKI Management, such as Certificate Lifecycle Management (CLM), S/MIME certificate and private key rollover, integrations with MDM or switching between CAs? Then, KeyTalk offers insight, overview, convenience and control.

Below, you can read more about the KeyTalk CKMS and our solutions such as secure e-mail with LDAP address book / Key Server, and our smart security scan. Do you prefer direct 1-on-1 contact with one of our PKI experts? Feel free to contact us. We would greatly enjoy thinking about it together.

Check mark with stars

CKMS Certificate Key Managment System

KeyTalk CKMS is designed to make certificate implementation, distribution and management simple, efficient and accurate.

We do this using a globally patented technology that seamlessly integrates with your existing infrastructure. Extremely scalable, affordable, user-friendly and flexible.

Read more
Mail icon with shield

Secure email Easily protected against e.g. CEO fraud with S/MIME

Did you know that Business Email Compromise (BEC) is the fastest growing and most damaging form of cybercrime?

If you share privacy or business-sensitive information by e-mail (like every company…) then digital signing and possibly encryption is a must. KeyTalk removes all practical problems and makes implementation and management simple.

Read more
Check mark with shield

Smart Security Scan

Do you have a clear image of the vulnerabilities of your (web) applications and network environment? The KeyTalk Smart Security Scan will help you.

This provides you with a detailed overview of all available certificates and ‘open’ gates at a glance. The Smart Security Scan offers you a complete image of all common vulnerabilities. And flexible, with room for custom scripts, commands, integrations and reports.

Read more