LEGIC Identsystems Secret-key cryptography platform: LEGIC Orbit

Request a Quote Datasheet

Suppliers

Company
Product
Description
Supplier Links
Secret-key cryptography platform: LEGIC Orbit -  - LEGIC Identsystems
Wetzikon, Switzerland
Secret-key cryptography platform: LEGIC Orbit
With LEGIC Orbit you can manage and control high security applications such as access control through cryptographic key and configuration management. It enables the highest level of system security for your trusted services. Product Information Centrally manage cryptographic keys The cloud-based key and configuration management service LEGIC Orbit can be integrated in your mobile applications and is controlled via API or UI. It allows you to randomly generate, distribute as well as destroy cryptographic keys and is scalable to your needs. Hardware protection of cloud with HSM Based on certified hardware security modules that are operated geo-redundantly as well as exclusively within Swiss jurisdiction, your most sensitive data is well protected without compromising availability. Secure distribution of symmetric encryption keys LEGIC Orbit delivers flexible and secure distribution of symmetrical keys and sensitive configuration data from a trusted cloud service to embedded devices anywhere in the field. This unique architecture supports either distribution via backend or mobile configuration app, effectively turning every smartphone into a universal configuration tool that conforms to your security requirements. Fully integrated in the LEGIC Security Platform The LEGIC Security Platform consists of seamlessly interoperable components that enable secure interactions between people and things. Mobile Credentialing using LEGIC Connect or LEGIC Connect Go benefits from the security of integrated LEGIC Orbit key management. LEGIC Reader ICs have built-in Secure Element to ensure invulnerable security configurations at the network edge. This guarantees end-to-end secure interaction between your management system, your mobile users and ultimately your valuable infrastructure.

With LEGIC Orbit you can manage and control high security applications such as access control through cryptographic key and configuration management. It enables the highest level of system security for your trusted services.

Product Information

Centrally manage cryptographic keys
The cloud-based key and configuration management service LEGIC Orbit can be integrated in your mobile applications and is controlled via API or UI. It allows you to randomly generate, distribute as well as destroy cryptographic keys and is scalable to your needs.

Hardware protection of cloud with HSM
Based on certified hardware security modules that are operated geo-redundantly as well as exclusively within Swiss jurisdiction, your most sensitive data is well protected without compromising availability.

Secure distribution of symmetric encryption keys
LEGIC Orbit delivers flexible and secure distribution of symmetrical keys and sensitive configuration data from a trusted cloud service to embedded devices anywhere in the field. This unique architecture supports either distribution via backend or mobile configuration app, effectively turning every smartphone into a universal configuration tool that conforms to your security requirements.

Fully integrated in the LEGIC Security Platform
The LEGIC Security Platform consists of seamlessly interoperable components that enable secure interactions between people and things. Mobile Credentialing using LEGIC Connect or LEGIC Connect Go benefits from the security of integrated LEGIC Orbit key management. LEGIC Reader ICs have built-in Secure Element to ensure invulnerable security configurations at the network edge. This guarantees end-to-end secure interaction between your management system, your mobile users and ultimately your valuable infrastructure.

Supplier's Site Datasheet

Technical Specifications

  LEGIC Identsystems
Product Category Access Control Systems
Product Name Secret-key cryptography platform: LEGIC Orbit
Industry Networking and Computing
Unlock Full Specs
to access all available technical data

Similar Products