Maintain the control you need over policy and day-to-day decision-making, but delegate back-end tasks. The solution delivers on all PKI functionality including hardware, root key protection, user key management, dual key support, availability, scalability, disaster recovery, customer practices support, and more.