MTG offers a comprehensive portfolio of state-of-the-art quantum safe security products (PQC) ready for use today. MTG is a leading expert for encryption technologies in Germany. MTG’s IT security solutions effectively secure critical infrastructures and the Internet of Things (IoT).
MTG offers security products and services, such as PKI, Key Management System, and HSM integration with best practice traditional and Post-Quantum Cryptography. For Utilities, a range of IoT-Security solutions for Smart Meters, Smart Grids, and Embedded Systems is supplied. MTG is ISO 27001 certified and operates a testing laboratory for IT security, which is accredited by the German Federal Office for Information Security (BSI).
MTG regularly cooperates with partners from industry and science in publicly funded research projects. Research topics, such as Post-Quantum Cryptography or the analysis of network anomalies in energy networks, are a key driver of our innovation and product development strategy.
MTG Product & Service Portfolio
The MTG KMS Server enables different applications in production and operations to access a detached, central security module that can perform all necessary crypto operations. The MTG KMS platform supports multiple independent clients. Rights management ensures the correct distribution of access rights to the respective keys.
The entire life cycle of keys in the MTG-KMS is already supported and can be utilized via the standardized KMIP interface. MTG KMS manages traditional and PQC keys.
The protection of your data against future decryption with quantum computers is already possible with our PQC portfolio today. For this purpose, a new generation of MTG products has been developed, which allow a seamless integration of PQC Algorithms.
MTG-CARA is a flexible, configurable, multi-tenant CA system for the generation and administration of certificates using traditional and post-quantum cryptography (PQC). All functions of a Registration Authority are already integrated. MTG-CARA supports standardized interfaces such as SOAP, SCEP, LDAP and OCSP. As a result, the security functions can be integrated flexibly and seamlessly into corporate or official procedures.