+1 971 231 5523 info@pkisolutions.com

The Microsoft PKI Cybersecurity Experts

Consulting, training and best practice assessments for Microsoft Certificate Services based Public Key Infrastructure (PKI). Our best-of-breed expertise and proprietary software solutions will ensure you have the right PKI for your enterprise security and management needs.

Learn More Contact Us

Service Portfolio

PKI Design and Implementation Consulting

PKI Solutions can provide you the expertise you need to ensure your environment will not only meet your needs today, but is properly designed for your needs down the road. No one wants to tear out a core piece of their identity solution because a security consideration was overlooked.

Microsoft Active Directory Certificate Services Training

Courses focus on building knowledge and skills with all features of Microsoft Active Directory Certificate Services (ADCS). There is a strong emphasis on security, best practices, and hands-on skills labs.

Certificate Services Best Practice Reviews

Whether you deployed the PKI or you engaged another company, the ADCS Best Practice Review can provide you with the knowledge and assurance that it was done right. PKI environments are notorious for hiding problems until it’s too late and the solution is placed into production.

Internet of Things (IoT) Security

Securing and protecting IoT devices with identities and encryption protected by x509 PKI certificates. Careful planning, architecture and implementation can ensure your devices will protect your customers as well as your brand and reputation.

Secure Mobile Device Management

One of the biggest security hurdles in the enterprise today is managing and securing a plethora of personal mobile devices. How do you ensure these devices are secure and able to participate in your organization safely? How do you integrate them with your Wireless authentication or VPN infrastructure? A properly designed PKI environment is needed to support these clients which are not part of the typical managed enterprise.

Hardware Security Modules (HSM)

The key to properly protecting your PKI environment is carefully designed procedures and policies. But how do you enforce them consistently? The integrity and assurance level of the PKI depends on ensuring organization procedures are followed at all times. Hardware Security Modules (HSM) are available from a number of manufacturers and are leveraged in a PKI to enforce defined procedures.

Certificate Policies and Practices Statements

Ensuring your PKI is properly designed and secured is a critical element in protecting your environment. The creation and implementation of a Certificate Policy and Practice Statement should be developed using best practices and real-world expertise.

Meet Mark B. Cooper

Mark B. Cooper, President & Founder of PKI Solutions Inc., is a former Microsoft Senior Engineer and subject matter expert for Microsoft Active Directory Certificate Services (ADCS).

Mark B. Cooper - "The PKI Guy"

Mark B. Cooper,President & Founder of PKI Solutions Inc., is a former Microsoft Senior Engineer and subject matter expert for Microsoft Active Directory Certificate Services (ADCS). He is also the author of several Microsoft whitepapers, including the specifications and deployment of ADCS on Microsoft Windows Failover Clusters and Securing and Hardening Network Device Enrollment Service for Microsoft Intune and System Center Configuration Manager

Latest News

Certificate Validation, Certutil, Internet Explorer, Offline CA, PKI, Revocation, Watch Out

Ignore Revocation Checking – The bane of my existence!

As students in my PKI training classes know, one of the areas I am a vocal about is the blind use of the CRLF_REVCHECK_IGNORE_OFFLINE setting in a PKI environment. I am so adamantly against the use of this setting, I personally refuse to ever explicitly

Certificate Validation, Internet Explorer, PKI, Revocation, RFCs, Watch Out

What Your Browser Doesn’t Tell You Can Hurt You – Revocation and Internet Explorer

One of the topics I have been using as an example of revocation checking behavior in my PKI In-Depth class is the interesting case of Internet Explorer (IE) and its revocation behavior. Let’s take a moment and have you think about your assumption of how

Certificate Templates, Certificate Validation, Hash Algorithms, Known Issues, PKI

RSASSA-PSS – Why Your Certificate Can’t Be Validated

A common theme has been arriving in my email box lately as well as many online forums. Consistently people are reporting error with certificates issued by their internal Microsoft ADCS based CAs. Problems range from Apple devices, Firefox, appliances and many other systems. When people

  © Copyright 2013-2016 PKI Solutions Inc. // All Rights Reserved // Terms of Service // Privacy Policy // Pricing and Refund Policies