Introduction

Security


Protecting our information and infrastructure is a vital topic for Nexus to deliver a trusted service and product and to protect Nexus and customers' information.
Our security principles are Confidentiality, Integrity, and Availability!

So, Nexus's information security goal can be described as; the right information being available to the right person in the right place at the right time with the right level of protection.

We know you have expectations about how we’re protecting your information, so what follows are details about some frequently requested information about Nexus information security.

One Identity

Enable zero trust and digitalization with Trusted Identities


Issuing trusted identities in an organization is a vital part of the digitalization strategy. Trusted identities can be used for access control to facilities, authentication to digital resources, digital signatures on documents and more.

Trusted identities allow processes to be streamlined, simplified and enables automation and self-service in a user-friendly manner.

Manage trusted identities with Smart ID

Identities for the workforce are trusted employee identities, most often issued in the form of corporate ID cards or virtual smartcards on phones and laptops. Employee IDs can be used for physical and digital access, which means that the organization and its employees don’t have to deal with multiple passwords, cards or tokens.

The employee IDs are managed in one central system, which can easily be integrated into existing HR systems, corporate directories and access control systems. This enables smooth and secure on- and offboarding of employees and contractors and makes it easy to trace actions and audit the solution.

Physical ID Management


Issue and manage the lifecycle of physical identities in one central system that's integrated with your corporate directory. Smart ID Physical ID management enables you to use access cards and key fobs, take advantage of ready-to-use workflows, automation and self-service functions.

Digital ID Management


Issue and manage the lifecycle of digital identities in one central system that's integrated with your corporate directory. Smart ID Digital ID management enables you to use digital identities on smart cards, mobile phones and laptops, use ready-to-use workflows, automation and self-service functions.

Physical Access Management


Manage physical access to buildings and sites in one central system that is integrated with your access control systems. With Smart ID Physical access management you can ensure the right people have access to the right buildings, rooms and sites.

Digital Access Management


Manage digital access and enable single sign-on with strong authentication to all local and cloud resources. Let employees and customers access digital resources with help from Smart ID Digital access management.

Corporate PKI


Issue, manage and automate PKI certificates for people, services and devices to enable strong authentication, data confidentiality, integrity and digital signatures, with Smart ID Corporate PKI.

Workplace IoT


Simplify and automate the full lifecycle management of your workplace device identities, by taking advantage of ready-to-use workflows, automation and self-service functionality. Manage trusted identities from external CAs in the same platform where you manage your own PKI.

Enable trust for the internet of things


With billions of things connecting to the Internet, the challenge is how to address security, privacy and safety, and where to get started. Most industries need a security technology that is easy to implement, seamless in use, economical, flexible for various use cases, and scalable for future scenarios.

Secure IoT with PKI-based identities


For any IoT application, it is crucial to protect data, user privacy, and safety. Breaches can harm production continuity and business processes, customers’ trust, and – worst of all – human health and life.

To enable true end-to-end security and prevent cyber attacks against IoT applications, a public-key infrastructure (PKI) can be used to issue certificate-based identities. These trusted identities secure the IoT applications with strong authentication of devices, people and servers, encrypted communication and proven data integrity.

IoT for multiple business verticals


Issue and manage certificate-based, cryptographically secure and unforgeable identities for IoT devices and applications, enabling end-to-end security within the following sectors:

Connected vehicles 


Secure communication with and between connected vehicles by enabling trusted identities.

Telecommunications


Secure telecommunication networks by enabling trusted identities to LTE and 5G base stations.

Manufacturing


Birth certificate Factory CA and Operational CA for "smart" things.

Healthcare


Protect IoT connected medical devices with trusted identities for end-to-end security.

Energy


Protect critical infrastructure IoT like Energy IoT applications and Smart Grids with trusted identities.

Workplace


Securing Servers, Routers, Desktops, Mobiles, within corporate environments.

Protect workplace devices with trusted identities


Simplify and automate the full lifecycle management of your workplace device identities, by taking advantage of ready-to-use workflows, automation and self-service functionality. Manage trusted identities from external CAs in the same platform where you manage your own PKI.

Do you recognize these challenges


Many organizations face challenges when they secure their workplace devices.

They need to:

  • use automation rather than manual processes to prevent certificate expiry.
  • ensure that there are no unauthorized devices in your network.
  • be compliant and ensure privacy.
  • reduce risk for service interruptions due to expired certificates.
  • reach inventory awareness of known devices in the network.

How does it work?


With Smart ID Workplace, you can automate enterprise certificate provisioning for both domain endpoints, such as machines and servers, and non-domain endpoints, such as dev ops servers, mobile devices and networking devices. It supports enterprise IT to manage and automate the entire lifecycle of their internal and external PKI-based certificates.

As opposed to proprietary solutions, Nexus embraces open standards such as SCEP, EST and ACME to support edge devices.

As secure communication and encrypted traffic are vital in large organizations, Nexus offers flexibility in deployment models, for example to choose data center or a hybrid solution. As we have respect for the security conflicts that may arise, we operate through freedom of choice.

Nexus removes the complexity and lets you stay in control of the lifecycle of all digital identities in one system, with the help of self-service and automated processes.

Smart ID Workplace IoT has the following key features:


  • Device registration manually or in batches, connected to AD or ITSM (for example ServiceNow) and with optional approval steps for traceability.
  • Automatic certificate enrolment and renewal, via various profiles and templates, such as ACME, SCEP, WinEP, EST and Intune, and with manual processes as fallback.
  • Monitoring of issued and expiring certificates, failed enrolments, deactivation and revocation.
  • Change of device ownership.
  • Integration of publicly trusted certificate authorities (CA) from multiple other vendors.
  • Object history and reporting to enable auditing and compliance.

Cybersecurity Thoughts

Discover our latest thinking on cybersecurity, threat intelligence and related careers.

A guide to onboard Security Information and Event Management in your Organization

If your business is like most, you are collecting logs from almost every device with security relevance. The flood of events is probably more than any human can alone correlate. This is the role of the Security Information & Event Management (SIEM) system.

Digitalization without Cyber Security

In October 2018, Siemens founded a global cyber security Organization which was under the leadership of Natalia Oropeza. It protects IT, OT and all the products based of Siemens.

The story of university data attacks

It is very shocking to know that the cyber criminals have not spared the education sectors from their target zone.