CloudGate Certificate Icon

Device Certificate

CloudGate Certificate

CloudGate's Device Certificate prevents unauthorized access by limiting access to the cloud to authorized devices, protecting confidential information from evolving cyber threats.

CloudGate Certicate Icon

Why is Certificate Authentication Necessary?

In today's cybersecurity environment, traditional authentication alone is insufficient. Passwords are easy to break, and even multi-factor authentication (MFA) using SMS or email one-time passwords (OTPs) faces a growing risk of being breached.

Traditional Authentication Methods Vulnerable to Phishing AttacksTraditional authentication methods - vulnerable to phishing | CloudGate Certificate (Device Certificate)

Why Device Certificates Are Effective Against Phishing Attacks

Phishing Attack: OTP BypassPhishing Attack MiTM/OTP (Email Security Measures / Account Takeover Prevention / Cyber Attack Countermeasures for Businesses) | CloudGate Certificate (Device Certificate)
Intensifying Phishing Attacks

In Japan, phishing attacks targeting individual securities accounts, financial institutions, and corporate IT departments are rapidly increasing, causing significant damage to both individuals and organizations.
While user and corporate security awareness has increased, and one-time passwords (OTPs) are widespread, current countermeasures alone are insufficient against sophisticated phishing emails and phishing sites using AI, especially when combined with Man-in-the-Middle (MiTM) attacks.
That's why companies need strong authentication security that is resistant to phishing.

Phishing Countermeasures with CloudGate CertificateThe Key to Blocking Unauthorized Access: Device Certificates (Email Security Measures / Account Takeover Prevention / Cyber Attack Countermeasures for Businesses) | CloudGate Certificate (Device Certificate)
The Key to Blocking Unauthorized Access: Device Certificates

By using device certificates, logins are only possible from pre-registered devices. This prevents unauthorized access even if IDs/passwords are stolen or OTP sessions are hijacked.
Device certificates provide powerful security to protect important confidential information and prevent damage before it occurs.

With CloudGate Certificate,
operational burden and security risks are greatly reduced

certificate
  • CheckIconPhishing Resistance: Only company-specified devices are authenticated
  • CheckIconHigh Security: Private keys stored in a secure area of the device
  • CheckIconMinimal User Burden: Simply authenticate with a single click
  • CheckIconLow Cost: No need to purchase authenticators
  • CheckIconAccess Rule Settings: Advanced security measures with rule settings and SSO integration
Contact us to learn more

Common Questions about Device Certificates

I'm worried users might copy certificates and misuse them.
secured-certificate
CheckIcon

CloudGate certificates are issued by a dedicated chip (SE, TPM) within the device used to store confidential data, making it impossible to copy the certificate to other devices, enabling strict device restrictions to ensure greater security.

How much does it cost to implement?
cost
CheckIcon

It is very inexpensive compared to multi-factor authentication (MFA) that requires an authenticator. CloudGate Certificates are available from 100 yen per device per month.

*Separate initial fees apply.
*A CloudGate UNO contract is required.

Do you offer support for those with limited time or expertise?
ondemand-support
CheckIcon

Our dedicated customer support will assist you with the device certificate implementation. We will also suggest the optimal implementation method by combining installation methods and certificate types.

Device limit Icon

Allow access only to company-owned devices

Access to cloud services can be allowed only from PCs and smart devices owned and provided by the company. By installing a device certificate on the device in advance, CloudGate UNO checks whether the accessing device holds the device certificate and blocks access from devices that do not. Even if the login ID and password are known to a malicious third party, unauthorized access from a device that does not hold a device certificate can be prevented. In addition, if a device is lost, the administrator can revoke the certificate to deny access from that device.

Device cert
Device restriction

Certificate management functions according to your needs

You can choose from two types of device certificates, each with its own characteristics, to select the certificate issuance and installation method best suited to your company’s operations.

CloudGate Certificate

based on Secure Element

Manager Icon

• Certificates can be issued and installed by administrator authentication on the device to be authorized.

• The risk of unauthorized copying or exporting of certificates is dramatically reduced by keeping the private key outside the device and out of the network path.

Remote Terminal Designation

Cybertrust Certificate

(formerly secured by Cybertrust)

User Icon

• Strict control of which device are allowed to install certificates by specifying unique device identifiers such as MAC addresses and UDIDs in advance.

• Send the certificate installation method to the user’s e-mail address and download it by the user himself/herself. The certificate is tied to the unique identifier of the device, so it can be strictly identified.

Security profile Icon

Flexible access rule settings

CloudGate UNO’s security profile function allows security rules to be applied to individual users, departments, and positions. For example, if a department needs access from outside the company, or if a user needs access only from a specific device, flexible access rules can be set by combining other security rules and device authentication using device certificates.

Device cert
SSO Icon

Multiple SSO Support

CloudGate UNO supports multiple cloud services. Device certificates can limit the devices that can be used, but they can also be used for cloud services such as the ones you see here, and the same policy can be applied to each cloud service as well as improving convenience with single sign-on.

*When using a smartphone, some services do not allow the use of certificates.

SSO Logos

CloudGate Certificate Option FAQ

To which plans is it added?

Available with the purchase of a Smart Pack plan or the Device Certificate Option.

Do I need to specify the number of CloudGate certificates and Cybertrust certificates to use?

There is no need to specify the number of certificates to be used for each. If you purchase a device certificate, CloudGate certificates and Cybertrust certificates can be issued for the number of licenses you have purchased. For example, if you purchase 100 device certificates, 50 CloudGate certificates and 50 Cybertrust certificates can be issued.

CloudGate UNO helps organizations implement a Zero Trust approach to security.