Installation

Once a customer has acquired a solution we follow a detailed plan, which has been created based on the customers' needs. Some customers require very little interaction, while others might need more extensive and specialized assistance. The tasks typically associated with installation and training are:

  • Client and server software installation (on site)
  • HSM installation (on site)
  • Interfacing the Cryptomathic application with back-end systems, e.g. a listener or a DLL
  • Test / Pilot / Production commencement

Our installation staff are highly experienced and are accustomed to situations that may cause hick-ups during this phase. Our staff will often solve the problems on the fly but can also rely on our delivery team to support remotely by making swift and adequate changes to solve any unforeseen hurdles.

Training

While onsite, we also always take great effort in training the staff that will operate our solutions. This will save our customer a lot of resources in the long run and it will help identify problems (should any occur) by our support team over time.

Our onsite product training sessions typically consists of:

  • Install
  • Set-up
  • Upgrade
  • Trouble shooting
  • Functionality with a strong focus on the customer's requirements
  • Usage, e.g. running through the different user roles


Many customers also take advantage of our off-site (but on-line) and on-site re-training, which is advantageous for companies with changing staff as well as companies wishing to stay on top of functionality and efficient use as new product versions are released.

Service
offerings


Cryptomathic provides a number of services relating to our secure server solutions:

Testimonials


White Papers

Access free resources

At the leading edge of security provision within its key markets, Cryptomathic closely supports its global customer base with many multinationals as longstanding clients.

  • WHITE PAPER

    EMV Key Management - explained

    Lack of overview or trouble
    understanding EMV key management?
    EMV as seen from a crypto angle for all involved parties in acquiring and issuing.

    READ WHITE PAPER
  • WHITE PAPER

    Business & technical implications Regulatory standards Managing digital signatures

    Digital documents are increasingly commonplace in today's business world.

    READ WHITE PAPER
  • WHITE PAPER

    eIDAS Compliant Remote eSigning

    What is the most secure and user-friendly digital signing experience? Explore the key business advantages and the security requirements for remote e-signatures in accordance with eIDAS.

    READ WHITE PAPER
  • WHITE PAPER

    Key Management Compliance - explained

    Need to explore the complex world of crypto key management? Understand major aspects, including regulatory authorities, compliance schemes, audits, best practices and more.

    READ WHITE PAPER
  • WHITE PAPER

    Cloud Signing vs
    Smart Card Signing

    Which digital signature technology is most applicable for large organisations? Compare the security, usability and costs of different signature generation technologies.

    READ WHITE PAPER
  • WHITE PAPER

    Secure Mobile Transactions - fact or fiction?

    Are banking and payment apps adequately secure against today’s attacks? Understand the threat landscape and how an evolutionary security strategy can deliver long term protection.

    READ WHITE PAPER

Related content

About

About
Cryptomathic

White Papers

Access all
White Papers

Case Studies

Read all
Case Studies

Blog

Check out
our Blog