Protecting our information and infrastructure is a vital topic for Nexus to deliver a trusted service and product and to protect Nexus and customers' information.
Our security principles are Confidentiality, Integrity, and Availability!

So, Nexus's information security goal can be described as; the right information being available to the right person in the right place at the right time with the right level of protection.

We know you have expectations about how we’re protecting your information, so what follows are details about some frequently requested information about Nexus information security.

One Identity

Enable zero trust and digitalization with Trusted Identities

Issuing trusted identities in an organization is a vital part of the digitalization strategy. Trusted identities can be used for access control to facilities, authentication to digital resources, digital signatures on documents and more.

Trusted identities allow processes to be streamlined, simplified and enables automation and self-service in a user-friendly manner.

Manage trusted identities with Smart ID

Identities for the workforce are trusted employee identities, most often issued in the form of corporate ID cards or virtual smartcards on phones and laptops. Employee IDs can be used for physical and digital access, which means that the organization and its employees don’t have to deal with multiple passwords, cards or tokens.

The employee IDs are managed in one central system, which can easily be integrated into existing HR systems, corporate directories and access control systems. This enables smooth and secure on- and offboarding of employees and contractors and makes it easy to trace actions and audit the solution.

Physical ID Management

Issue and manage the lifecycle of physical identities in one central system that's integrated with your corporate directory. Smart ID Physical ID management enables you to use access cards and key fobs, take advantage of ready-to-use workflows, automation and self-service functions.

Digital ID Management

Issue and manage the lifecycle of digital identities in one central system that's integrated with your corporate directory. Smart ID Digital ID management enables you to use digital identities on smart cards, mobile phones and laptops, use ready-to-use workflows, automation and self-service functions.

Physical Access Management

Manage physical access to buildings and sites in one central system that is integrated with your access control systems. With Smart ID Physical access management you can ensure the right people have access to the right buildings, rooms and sites.

Digital Access Management

Manage digital access and enable single sign-on with strong authentication to all local and cloud resources. Let employees and customers access digital resources with help from Smart ID Digital access management.

Corporate PKI

Issue, manage and automate PKI certificates for people, services and devices to enable strong authentication, data confidentiality, integrity and digital signatures, with Smart ID Corporate PKI.

Workplace IoT

Simplify and automate the full lifecycle management of your workplace device identities, by taking advantage of ready-to-use workflows, automation and self-service functionality. Manage trusted identities from external CAs in the same platform where you manage your own PKI.

Enable trust for the internet of things

With billions of things connecting to the Internet, the challenge is how to address security, privacy and safety, and where to get started. Most industries need a security technology that is easy to implement, seamless in use, economical, flexible for various use cases, and scalable for future scenarios.

Secure IoT with PKI-based identities

For any IoT application, it is crucial to protect data, user privacy, and safety. Breaches can harm production continuity and business processes, customers’ trust, and – worst of all – human health and life.

To enable true end-to-end security and prevent cyber attacks against IoT applications, a public-key infrastructure (PKI) can be used to issue certificate-based identities. These trusted identities secure the IoT applications with strong authentication of devices, people and servers, encrypted communication and proven data integrity.

IoT for multiple business verticals

Issue and manage certificate-based, cryptographically secure and unforgeable identities for IoT devices and applications, enabling end-to-end security within the following sectors:

Connected vehicles 

Secure communication with and between connected vehicles by enabling trusted identities.


Secure telecommunication networks by enabling trusted identities to LTE and 5G base stations.


Birth certificate Factory CA and Operational CA for "smart" things.


Protect IoT connected medical devices with trusted identities for end-to-end security.


Protect critical infrastructure IoT like Energy IoT applications and Smart Grids with trusted identities.


Securing Servers, Routers, Desktops, Mobiles, within corporate environments.

Protect workplace devices with trusted identities

Simplify and automate the full lifecycle management of your workplace device identities, by taking advantage of ready-to-use workflows, automation and self-service functionality. Manage trusted identities from external CAs in the same platform where you manage your own PKI.

Do you recognize these challenges

Many organizations face challenges when they secure their workplace devices.

They need to:

  • use automation rather than manual processes to prevent certificate expiry.
  • ensure that there are no unauthorized devices in your network.
  • be compliant and ensure privacy.
  • reduce risk for service interruptions due to expired certificates.
  • reach inventory awareness of known devices in the network.

How does it work?

With Smart ID Workplace, you can automate enterprise certificate provisioning for both domain endpoints, such as machines and servers, and non-domain endpoints, such as dev ops servers, mobile devices and networking devices. It supports enterprise IT to manage and automate the entire lifecycle of their internal and external PKI-based certificates.

As opposed to proprietary solutions, Nexus embraces open standards such as SCEP, EST and ACME to support edge devices.

As secure communication and encrypted traffic are vital in large organizations, Nexus offers flexibility in deployment models, for example to choose data center or a hybrid solution. As we have respect for the security conflicts that may arise, we operate through freedom of choice.

Nexus removes the complexity and lets you stay in control of the lifecycle of all digital identities in one system, with the help of self-service and automated processes.

Smart ID Workplace IoT has the following key features:

  • Device registration manually or in batches, connected to AD or ITSM (for example ServiceNow) and with optional approval steps for traceability.
  • Automatic certificate enrolment and renewal, via various profiles and templates, such as ACME, SCEP, WinEP, EST and Intune, and with manual processes as fallback.
  • Monitoring of issued and expiring certificates, failed enrolments, deactivation and revocation.
  • Change of device ownership.
  • Integration of publicly trusted certificate authorities (CA) from multiple other vendors.
  • Object history and reporting to enable auditing and compliance.

Get in touch

Protect your business

If you are looking for reliable and efficient solutions to enhance your business operations, Mindfire is the perfect partner for you. Contact us today to learn more about our services and how we can help you achieve your goals. Whether you need Cyber Security Services, Managed Security Services (MSS), Consulting Services, Cyber Risk Management Services, Cloud Services, Digital Services, or Digital Transformation, our team of experts is here to assist you every step of the way. Don't hesitate to get in touch with us and take your business to the next level with Mindfire.