LEGIC Orbit – Making cryptography simple
Scale your system security according to your compliance requirements
LEGIC Orbit is a next generation secure key and configuration management solution that allows you to centrally generate, securely distribute and use your application’s most sensitive data.
Cloud-based key management
Based on HSM infrastructure
Secure distribution channels
Fully integrated in LEGIC Connect
Scalable to your needs
UI or API
Full system control via UI or API
Do you have any questions about our products and services? We will help you to develop your individual solution.
In order to manage and control high security applications, key and configuration management is a core task. With “security by design” in mind, LEGIC has focused on putting its customers in charge of their own security for over 30 years. With the next generation key and configuration management service LEGIC Orbit, we enable the highest level of system security for your trusted services.
Centrally manage cryptographic keys
The cloud-based key and configuration management service can be integrated in your solution and is controlled via API or UI. It allows you to randomly generate, distribute as well as destroy cryptographic keys and is scalable to your needs.
Hardware protection of cloud with HSM
Based on certified hardware security modules that are operated geo-redundantly as well as exclusively within Swiss jurisdiction, your most sensitive data is well protected without compromising availability.
Secure distribution of symmetric encryption keys
LEGIC Orbit delivers flexible and secure distribution of symmetrical keys and sensitive configuration data from a trusted cloud service to embedded devices anywhere in the field. This unique architecture supports either distribution via backend or mobile configuration app, effectively turning every smartphone into a universal configuration tool that conforms to your security requirements.
Fully integrated in the LEGIC Security Platform
The LEGIC Security Platform consists of seamlessly interoperable components that enable secure interactions between people and things. Mobile Credentialing using LEGIC Connect or LEGIC Connect Go benefits from the security of integrated LEGIC Orbit key management. LEGIC Security Modules have built-in Secure Element to ensure invulnerable security configurations at the network edge. This guarantees end-to-end secure interaction between your management system, your mobile users and ultimately your valuable infrastructure.
LEGIC ConnectRead more