Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Forums it-sa Expo Knowledge Forum E

Checklist for automated certificate management

How to find suitable certificate management tools and appropriate certificates? Practical tips on searching, selecting and implementing.

calendar_today Wed, 26.10.2022, 16:00 - 16:15

event_available On site

Action Video


Action description







Data security / DLP / Know-how protection Endpoint Protection Identity and access management Industry 4.0 / IoT / Edge Computing Data Center Websecurity / VPN


This action is part of the event Forums it-sa Expo

Action Video

grafischer Background

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

Certificates that have expired unnoticed, are incorrectly configured or incorrectly applied for can result in processes coming to a standstill. Meanwhile, certificates are needed more and more frequently. Therefore, the administrative effort for admins increases. Professional certificate management tools can provide relief.
In this lecture, we will go into what should be considered when choosing the right certificates and certificate management tools and for which initial situation which type of tool is suitable. We will also give practical tips on how to proceed with searching and implementing them.

Digital certificates (TLS / SSL / x.509) are comparable to an identity card. They contain the name and the public key of the owner so that they can clearly identify him or her. As a result, they play a key role in many security-relevant areas (e.g. system authentication or machine communication).
Certificates can also be used to control network authorisations and access to sensitive data. This combined with their time-limited validity makes careful certificate management essential.

... read more

Language: German

Questions and Answers: No


show more

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.