Enterprise Resource Security
MTG ERS unlocks the full potential of secure digitization across industries and processes. Based on verified identities, trusted communication and centralized storage of encrypted data become possible.
The MTG ERS product offer consists of three aligned elements:
- MTG Corporate PKI,
- MTG Key Management Systems
- and the appropriate hardware security modules for specific use cases.
MTG ERS simplifies and centralizes the management of cryptographic keys and identities in enterprises and public institutions. MTG ERS allows industry-specific implementation and easy integration of a complete key management lifecycle in selected enterprise processes.
MTG Enterprise Resource Security is considered as the "ERP system for IT security", protecting corporate resources (e.g. production, personnel, information and communication technology, etc.).
While an ERP system handles the central planning, control and management of the company's resources, the ERS system manages the central protection of the associated processes with cryptographic keys.
We support our customers with excellent IT security know-how and the appropriate products. MTG customers benefit from our flexibility in integrating our products. If necessary, complex requirements and specific design requests can be taken into account. In cooperation with our customers, we develop a detailed specification that takes the individual requirements for the respective project into account. Departments involved are fully integrated and interfaces are coordinated mutually.
Further divisions, applications or processes can be included at any time and thus MTG ERS can be extended step by step in the future.
Direct access to the deep technical knowledge of our IT security experts and consultants ensures the best possible preparation, implementation and smooth operation of our systems. This creates future-proof IT security solutions from a single source.
Our quality standard
MTG develops and distributes innovative IT security software solutions with high demands on confidentiality, integrity and availability. The fulfillment of these security objectives in information security is our self-evident quality claim.
Since March 2017, the entire company has been certified according to ISO/IEC 27001:2013. MTG operates a testing facility for IT security that is approved separately by the Federal Office for Information Security (BSI).
IT Security Made in Germany
MTG software always complies with cryptographic and operational requirements from NIST and BSI. These are actively monitored and regularly updated. MTG development guidelines include reviews and checks for secure coding constructs. This includes the consideration of OWASP guidelines. The developers are supported by automated code analysis. Penetration tests are part of our release process.
We are already developing solutions in the field of post-quantum cryptography (PQC) to protect our customers' ERS® systems against future threats from quantum computers. An important aspect for the successful integration of new PQC algorithms is the use of hybrid methods. Hybrid methods combine the advantages from both worlds: On the one hand, the robustness of crypto methods that have been proven millions of times and are in use (e.g., RSA, ECC) and, on the other hand, the combined use of the new, post-quantum secure methods.
MTG Software is „Made in Germany“.