TrustPoint Blog

Machine-to-Machine (M2M) Certificates Versus Traditional Certificates

Conceptually there is little difference between traditional certificates and new M2M certificates; both are intended to authenticate identities via a …

Continue reading full post

Secure Authentication

In the last few years Machine-to-Machine (M2M) has seen widespread use and can be found in a variety of applications within the Internet of Things …

Continue reading full post

Digital Certificates

A digital certificate is an electronic credential used to verify and authenticate the identity of an individual or device. Its primary function is to …

Continue reading full post

ECC Expertise

Being a Certificate Authority is about one thing — trust. At TrustPoint, we are committed to establishing trust for our customers by providing a highly …

Continue reading full post

ECC Overview

RSA and DSA cryptographic solutions have enjoyed wide use in applications ranging from anti-cloning to secure firmware updates.

Continue reading full post

M2M Security

TrustPoint is bringing to the market a solution specifically designed to provide users and devices connected to M2M end points the ability to securely …

Continue reading full post

TrustPoint Authors

Recent Posts