With LEGIC Orbit you can manage and control high security applications such as access control through cryptographic key and configuration management. It enables the highest level of system security for your trusted services.
Product Information
Centrally manage cryptographic keys
The cloud-based key and configuration management service LEGIC Orbit can be integrated in your mobile applications and is controlled via API or UI. It allows you to randomly generate, distribute as well as destroy cryptographic keys and is scalable to your needs.
Hardware protection of cloud with HSM
Based on certified hardware security modules that are operated geo-redundantly as well as exclusively within Swiss jurisdiction, your most sensitive data is well protected without compromising availability.
Secure distribution of symmetric encryption keys
LEGIC Orbit delivers flexible and secure distribution of symmetrical keys and sensitive configuration data from a trusted cloud service to embedded devices anywhere in the field. This unique architecture supports either distribution via backend or mobile configuration app, effectively turning every smartphone into a universal configuration tool that conforms to your security requirements.
Fully integrated in the LEGIC Security Platform
The LEGIC Security Platform consists of seamlessly interoperable components that enable secure interactions between people and things. Mobile Credentialing using LEGIC Connect or LEGIC Connect Go benefits from the security of integrated LEGIC Orbit key management. LEGIC Reader ICs have built-in Secure Element to ensure invulnerable security configurations at the network edge. This guarantees end-to-end secure interaction between your management system, your mobile users and ultimately your valuable infrastructure.
LEGIC Identsystems | |
---|---|
Product Category | Access Control Systems |
Product Name | Secret-key cryptography platform: LEGIC Orbit |
Industry | Networking and Computing |