REMME’s solution uses widely adopted and understandable X.509 certificates at device level which management has executed with PKI (d) that have improved fault resistance.
Articles in this section
- What is REMME?
- Against what attacks can REMME protect?
- Which systems are suitable for REMME implementation as part of its access security solution?
- Could I use two-factor authentication with REMME?
- Which certificate standard is used in REMME?
- What certificates are supported in REMME’s solution?
- What does the certificate management process look like?
- What high level protection is provided against hacking into REMME?
- What if the device with the digital certificate is stolen?
- Can hackers unlock your account using your digital certificate?