Probaris

  • Increase font size
  • Default font size
  • Decrease font size

title-criticalinf

Critical Infrastructure Protection

Much of our nation’s critical infrastructure is now inextricably bound to the internet.  Trillions of dollars worth of commerce are conducted online each year. A large portion of our essential services, including telecommunications, electricity, and financial services depend on the internet.  Alarmingly, our economy and our national security have substantial vulnerabilities due our reliance on a largely unsecured cyberspace.


Significant contributors to the growing cybersecurity problem are the explosion of online identities, together with weak forms of authentication, such as user name and password combinations. To address the online identity problem, the United States is moving to implement a National Strategy for Trusted Identities in Cyberspace (NSTIC). The strategy includes the implementation of a trusted identity ecosystem as a foundational element of a more secure cyberspace.


Probaris is a leading provider of the trusted identity software and services that are called for in the NSTIC.   We are committed to the United States’ national strategy for strengthening digital identities in cyberspace.  We have been working with the US government for years on standards-based identity solutions that are now in the early stages of adoption.


Probaris’ products enable the national strategy’s vision for secure, efficient, easy-to-use, and interoperable identity solutions.  Standards-based trusted identity solutions will soon become the norm for access to online services in a manner that promotes confidence, privacy, choice, and innovation.  Probaris is poised to support organizations moving to the new trusted identity standards to secure their critical assets.

 

Consulting Services

  • Probaris ID™ credentialing implementation
  • Program management support
  • Privacy impact assessments
  • Policy assessment + change mgmt
  • Requirements analysis
  • Architecture and design services
  • Logical access usage
  • eAuthentication risk assessments
.