As for using ManageSecure as our CA, we've got our ELR system/Direct Send PHIN MS set up using certs we generated using ManageSecure.This was easy, convenient, and very cost-effective. We've already created a new root keystore for our state lab and generated a keystore for them to use as an ELR partner with us. We envision using this much more as we bring on additional partners. It sure saved the state lab a lot of money too! I'm sure some of our future partners who also don't have a CA in place will be glad we've got the capability here. Not only did it positively affect our bottom line by not having to purchase expensive 1 or 2 year certs from Verisign or the like, but our timeline was shortened because what took us minutes to generate here would have taken weeks in the state purchasing process.
Thanks again for all your help!"
IT Operations Manager
Virginia Department of Health
"We have been using ManageSecure to manage and monitor our deployment related security
resources such as SSL servers, LDAP servers, certificates. ManageSecure provides timely
reporting and alerting on these resources, which enables timely and proactive action on their
upkeep. ManageSecure has been running in our environment for several months and has been
very stable. The ManageSecure staff is very knowledgeable and has provided excellent support."
Deployment Technical Lead
Scientific Applications International Corporation, Atlanta
"ManageSecure provides great advantages over other products by eliminating the need to
implement your own PKI system with an authorization database... Their technical solution is
simply superb! And their user interface is highly usable -- all the right things in the right places.
Bellsouth is currently evaluating ManageSecure for its PKI management features."
Netegrity and Security Consultant
"ManageSecure is our secure portal to MIST, which is a Management Information System for our
colleges. It is also used to enroll users into our systems and perform identity management.
ManageSecure team has been very professional and they have offered timely support."
Senior Technical Manager
T. John College, Bangalore
"We use ManageSecure to secure access to our ICONSurvey applications. Within
minutes of installing, we were up and running in a secure mode. ManageSecure saved us time and
improved security. It is easy to install and use, and reduces the pain of managing security
resources like certificates and keystores. I highly recommend this product."
CEO, ICONTechnology Group
"Business Networks International (BNETAL) are leaders in the field of IT Architecture and Security. Their knowledge of these domains are superior. The solutions they have developed have been very successful. They have been implemented, deployed and extended nationwide. When I've had customers come to me asking for assistance with their complex IT issues, I have directed them to BNETAL. These customers have thanked me for the referral. They have always reported complete success and satisfaction with outcomes of their projects."
Manager and Subject Matter Expert
Centers for Disease Control and Prevention
BNETAL provided us with some excellent consulting regarding health IT security standards,
and a brief evaluation of an existing project. They are highly recognized as experts in
health IT security, and secure messaging and information exchange - for the public health,
payor and provider markets. I recommend using them as consultants, and considering BNETAL's
Director, Arizona Health-e Connection
"Business Networks International Inc. provided security architecture
and design services as part of the CSC-Connecting for Health (CFH) consortium that recently
concluded the Nationwide Health Information Network (NHIN) Architecture project. This
prestigious project was funded by the US Department of Health Human Services with the
goal of providing the foundation for secure, reliable and standards-based health information
exchange nationally. The CSC-CFH consortium developed the NHIN architecture and implemented
prototype networks in three health markets to demonstrate the real-life value of the NHIN.
Business Networks was responsible for developing the security and privacy architecture
component of the NHIN architecture, and did a superlative job in completing this critical
project deliverable. They made significant contributions to the rest of the CSC-CFH NHIN
architecture, and were active participants in building a consensus across the diverse
stakeholder group that made up the consortium. Their work was of high quality and
appreciated by all members of our team."
Chief Architect, NHIN Architecture project
Computer Sciences Corporation.