top of page


A digital lock and key surrounded by computer code

Public Key Infrastructure

Public Key Infrastructure (PKI) is the backbone of establishing trust in an increasingly connected and automated world. PKI refers to the technology, processes, and policies that enable the use of Public Key Cryptography at scale.


PKI is all about assigning and securing digital identities to any entity: an employee, a server, a networked resource, a device - really anything. It uses a cryptographic key pair to confirm the identity of the sender and receiver of a communication to increase trust and security in internal and external communications.


If you’re curious to know more, you can read a more in depth description of PKI here.

A digital lock surrounded by code


Public Key Infrastructure is deployed across a variety of industries to establish trust between entities without requiring a prior relationship. These include, but are not limited to:

  • Smart Cards for digital access control;

  • SIM cards to verify mobile network subscribers;

  • SSL certificates to authenticate website connections and encryption;

  • Digital Signature enablement;

  • Credit Card chips for payment security and authentication;

  • Digital Certificates for passwordless network authentication;

  • Digital Certificates for passwordless application authentication;


Here at Vivacity we take pride in our Public Key Infrastructure expertise, so if you’d like to learn more about this technology, contact us today for a free consultation with one of our experts.

Deployment and Management

PKI can be cumbersome and resource-intensive to deploy and manage. That’s why it’s more common to see this security infrastructure in place at large enterprises. At Vivacity, we believe in paving the way for Small and Medium Size businesses, and providing access to high-end technology while understanding this segment’s unique needs and constraints.


With VivaPKI, your organization can get white glove service and have our experts deploy and manage PKI on your behalf. Reap all the benefits large enterprises see from PKI at a fraction of the cost.

a man assigning access to a document

Certificate Authority

Vivacity’s Public Key Infrastructure solution, VivaPKI, allows your organization to implement FIPS-compliant Certificate Authorities without any of the hassle. With flexible pricing and many deployment options to address your use case and constraints, VivaPKI enables your organization to:

  • Shift away from password authentication, preventing phishing attacks

  • Enable secure and robust machine-to-machine authentication

  • Issue and manage certificates for intranet applications, network authentication, and Active Directory users

  • Digitally sign data, and verify existing signatures

  • Deploy Hardware Security Modules to secure digital identities.


VivaPKI is Vivacity’s Public Key Infrastructure (PKI) solution, helping bring enterprise grade digital identities to the cybersecurity toolbox of municipalities and SME’s at a fraction of the cost of large enterprise competitors.


One of the main drawbacks of traditional Public Key Infrastructure is that it can often come with a large overhead cost to generate and process cryptographic keys and digital certificates. This is often prohibitive for deployments in highly resource constrained environments, such as wireless networks and Internet of Things (IoT) applications.


Vivacity sees this gap in the market, and our Certificate Authority platform VivaPKI provides an ideal solution for resource-constrained use cases. Our approach to achieve this is based on elliptic curve cryptography, which provides the same level of security as alternatives at a fraction of the key size. As well, it provides an optional proprietary digital certificate format for machine-to-machine communication, which provides a 40% reduction in size compared to traditional X.509 certificates.


SSL / domain certificates for intranet applications

Active Directory user certificates

802.1x Enterprise Network Certificates

Virtual Private

Network authentication

Enabling passwordless authentication to prevent phishing attacks

Machine identity provisioning and management

Authenticating enterprise servers, laptops, and other assets

Creating encrypted tunnels between applications or devices


Authentication, Authorization, and Accounting (AAA) services

Gray geometric Surface
bottom of page