![]() |
Digital Certificates in Action Around the globe, organisations are taking the plunge and investing in a Public Key Infrastructure (PKI) to support Digital Certificates. It is clear that when all technologies are assessed, digital signatures and the corresponding digital certificates offer much greater assurances than other methods to meet the requirements of digital security for entity authentication, non-repudiation, data integrity, data confidentiality and access control. Brief Introduction to PKI Real World Deployments Over the past couple of years we have seen a shift in the way organisations are spending their IT dollars and a good look at the end use and Return on Investment (ROI) is certainly a starting point. We have seen organisations stop talking about PKI and instead looking at the security problems and applications - requirements for digital certificates and the underlying PKI fold into the solution instead of being a technology looking for a place to be implemented. At the PKI Forum, we meet face-to-face 3-4 times a year and dedicate a full day to real world case studies. Although not an exhaustive list, here are a few examples of real world solutions presented at recent meetings where the business case, the technology and the application all came together in a success story: Singapore, Finland -- PKI for national ID Clearly a wide range of applications across government, healthcare and financial sectors have been deployed. Digital certificates and PKI have become part of many active solutions. How does a "Hyped" Technology Become An Active Solution What financial returns does public-key infrastructure really provide? Here, we provide a general framework for unlocking the financial returns that are made possible by implementing PKI-enabled applications. In considering this framework, the following simple, step-by-step approach should be kept in mind: Focus on the Business Process. Establish Appropriate Metrics. With a proper focus on security-enabled business process, the next step is to establish the appropriate metrics for determining potential financial returns. The metrics chosen will logically be a function of not only the particular business process under analysis (i.e., is it an internal process? A customer-facing process? A partner-facing process?), but also the specific business objectives we have in mind (e.g., are we aiming to increase revenues? Lower costs? Improve efficiency?). Establish a Baseline for the Current State. Having established an appropriate set of metrics, the next step is to use them to establish a baseline for the business process under analysis, based on the way things are today. This is the "business as usual" scenario. Compare to the Desired Future State. The same metrics can then be used to compute the financial impact of implementing a new or improved business process that meets the specific business objectives we have in mind. This is the "business as a result of" scenario, i.e., the desired future state that will result from the successful implementation of a new or improved PKI-enabled business process. If this straightforward approach sounds familiar, it should come as no surprise - it's a time-honored method for establishing value, a process we've all gone through (consciously or otherwise) countless times before. We can step back and observe that PKI is not uniquely complex or difficult to analyse in this regard - on the contrary, this approach for computing financial returns for PKI-enabled applications is the same one used for virtually any other significant investment. All we need, given the relatively early stage of PKI market development, is a general framework to help organise the approach and jump-start a detailed discussion of potential financial returns. The first, critical step is to frame the ROI discussion in the context of the key e-security enablers for a particular e-business process/application. The next step is to establish an appropriate set of metrics for determining potential financial returns. (The PKI Forum has recently published a paper authored by Derek Brink discussing the ROI framework briefly introduced here. The paper may be accessed at www.pkiforum.org/resources.html.) By following the framework, it can be seen the total cost of ownership for implementing an enabling e-security infrastructure such as PKI is significantly less than the financial returns made possible by PKI-enabled applications, when revenues, costs, compliance and risks are understood and quantified. |