Guides & Whitepapers

Here you will find a mix of guides, reports and whitepapers available as downloads.

Blog IoT Matter PKI Smart homes Whitepaper/Guide

[Technical White Paper] Device Attestation with Matter PKI

8 May, 2024
Curious about how Matter ensures compliance and tackles counterfeiting of your products? Read our technical whitepaper to know more!
Citizen ID IoT PKI Whitepaper/Guide Workforce Workplace Zero Trust

[Trend report] PKI evolution in cybersecurity

16 April, 2024
Read our trend report to understand the impact of the growing cloud adoption on PKI and how organizations are responding to it.
Blog IoT PKI Whitepaper/Guide

Achieving zero-trust for IoT & IIoT with secure device identities

24 October, 2023
In an era where the Internet of Things (IoT) and Industrial Internet of Things (IIoT) dominate, securing connected devices is paramount. Explore ou...
Blog IoT PKI Whitepaper/Guide

Ensuring trust in the ISO 15118 Plug and Charge Ecosystem

29 June, 2023
As electric mobility continues to shape the future of transportation, promising trust, convenience, interoperability, and enhanced user experiences...
Blog

Be Quantum-ready: A guide to protecting your organization from quantum threat

7 February, 2023
From quantum computing to quantum threat to post-quantum computing, discover everything you need to know to be Quantum-ready. Download our free gui...
Whitepaper/Guide

Guide: The CISOs Cheat Sheet

2 June, 2022
The CISOs Cheat Sheet Cybersecurity is always evolving, and organizations worldwide are facing an increased level of complex cyber threats. More s...
Lifecycle management Online service

Guide: Identities as a service

3 May, 2022
Everything you need to know to get started with identities as a service including the Nexus GO services that make workforce and workplace identitie...
IoT security

Solution Brief: Advanced Metering Infrastructure

28 September, 2021
In this solution brief, we will discuss why to use trusted identities to secure your Advanced Metering Infrastructure (AMI) from cyberattacks and c...