Internal/External Business Model Hybrids

Of course, it is natural for many organizations to offer both internal and external security services based on PKI technology. These two models must not be viewed as being mutually exclusive. In fact, many of today's PKI deployments begin with a modest-scale internal pilot (for example, deployment of a single PKI-enabled application with a community of users on the order of tens or hundreds). This is followed by larger-scale initiatives (for example, incorporating additional applications and increasing the number of users), including external business-to-business and business-to-consumer deployments.

Get Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.