Hardware |
Pay for hardware costs, including servers, databases, and hardware security modules (HSMs).
|
Included
|
Software |
Pay for software licensing, including servers, databases, etc.
|
Included
|
Development |
Extensive custom development is typically required for setup, integrations, and management.
|
Included
|
Security |
Requires blue team (defense) and red team (pentesting) to keep your CA secure.
|
Included
|
Setup |
Requires significant time and cost to setup.
|
Included
|
IT Operations |
Requires staff for monitoring, maintenance, updates, and backups of your PKI systems.
|
Included
|
Control Panel |
Typically requires custom development work to build a UI from scratch that meets your needs.
|
Included
|
Integrations |
Typically requires developing most integrations from scratch.
|
Included (pre-built integrations, APIs, and certificate protocols)
|
Root Generation |
Generate your own root and intermediate certificates, including key ceremonies, offline secure storage, etc.
|
Included
|
Certificate Profiles |
Create your own certificate profiles from scratch and manage updates for ongoing compatibility and compliance.
|
Included (pre-built and custom options)
|
Access Control |
Build your own system for managing users access and certificate requests.
|
Included (customizable options to meet any need)
|
Revocations |
Setup and manage your own infrastructure for revocations.
|
Included (CRL, OCSP)
|
Notifications |
Build your own notification system to stay on top of expirations, renewals, etc.
|
Included
|