TeamLogic Systems Ltd

GeDaP KeyTalk Certificate and Key Management System

KeyTalk’ s crypto Certificate and Key Management System (CKMS) is capable of managing, distributing and installing certificates (PKI) from multiple public and internal CA’s to any endpoint device running on any OS. Patented software automates short-lived certificate distribution Build-in hardware recognition of endpoint devices provides optional extra authentication factor.


  • Certificate encryption 2048-8192 bit RSA , or <512bit ECC
  • Short-lived digital certificates combined with trusted device recognition
  • Goes beyond PKI, seamless shortlived certificates require minimal administratio
  • Binds user's identity to trusted devices up to 20
  • Facilitates single sign-on (SSO) to your IT environment
  • Patented, on-demand, short-lived automated client certificate distribution
  • Configurable key lengths & times automatic lifecycle management
  • Key roll-over facilitates user use of certificate on multi-devices
  • Facilitates compliance with elDAS and EUGDPR
  • Unifies the authentication solution into a single secure standard


  • Protects against Man-in-the-Middle, Phishing & Brute Force cyber attacks
  • Creates unique device hardware signature superceding 2FA authentication
  • Security of PKI coupled with minimal administration.
  • Provides secure connectivity for Azure/365, SAP or other ERP
  • Allows secure re-enroll of certificates and key-pairs
  • Ensures key-roll-over and key-escrow become secure reality
  • Short-lived certificates (1/2 second upward) ensure data security
  • Protects end-user, IoT & M2M devices from cyber attack
  • Ease of integration for multiple network infrastructure
  • Works with virtually any device and operating system


£0.34 to £2.55 per user per month

  • Free trial available

Service documents

G-Cloud 10


TeamLogic Systems Ltd

Ian Young

0151 342 4490

Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to Existing Single Sign On (SSO) and authentication solutions (2FA etc)
Worldwide patented technology fully automates enrolment and installation of non-public internal certificates and public certificates from any trusted CA, to any network domain, on virtually any device running on any OS.
Provides PKI without creating a significant administrative overhead
Cloud deployment model Private cloud
Service constraints Conventionally the service would be hosted on a UKCloud Server providing an appropriate level of availability for the customer's needs. UKCloud provides high availability up to 99.9%
System requirements
  • Users authenticate against the IAM (AzureAD, LDAP, Radius etc)
  • End users will have been already created
  • Users may have upto a maximum of 20 devices
  • KeyTalk is not demanding requires only an entry level server
  • Can operate in Hybrid environment with inhouse IAM

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Support response times Basic contract is 9.00am to 5.30pm weekdays (not Bank Holidays) Extended support is available at an extra cost by negotiation
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels Standard support is covered in the basic SaaS cost and is based on a maximum 2 hour response and we will endeavour to provide a solution or work-around within a further 2 hours maximum. If the problem is not resolved it will be escalated to the developers. During the incident support will use the appropriate medium and customers are advised of progress. On-site support is available by arrangement and is charged on a time and materials basis (see Rate Card)
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started KeyTalk is simple to install and has been designed to create a minimal administration overhead. GeDaP can provide web-based or on site services during the installation process.Full user/administrator documentation is readily available. Pre-installation consultancy advice and training is readily available at the relevant daily rate.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction KeyTalk works to authenticate access and encrypt data in transit. Any data is therefore most likely to be attributable to and part of one of the applications. Data accumulated by KeyTalk can be exported in an agreed format for input into the new system. KeyTalk is designed for security (authentication & encryption) there will therefore not be large quantities of data
End-of-contract process The content required together with its format will be determined by your plans at the time. GeDaP will provide the appropriate quotation based on volumes and content required if you decide to migrate the data. As KeyTalk authenticates users and encrypts the data in transit, volumes for KeyTalk are likely to be small.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
  • Other
Designed for use on mobile devices Yes
Differences between the mobile and desktop service KeyTalk is installed to secure a device and its applications with strong authentication and encryption. It is transparent to the end user regardless of the device in use. There is thus no difference in the operation of KeyTalk when accessing by the user
Accessibility standards None or don’t know
Description of accessibility KeyTalk is transparent to the device installed and is there to verify the authenticity of the device and to handle the encryption decryption of the data using frequently changed certificates. It is therefore totally transparent for the end-user. The only user requiring access to the system is the administrator. KeyTalk provides the strengths of PKI but requires virtually zero administration
Accessibility testing KeyTalk can work with virtually any device with intelligent capability attached to the network. As it authenticates and encrypts any data entry is undertaken by applications which would offer assistive facilities
What users can and can't do using the API The api is distributed to authorised users of the IAM and installs on the approved device. Thereafter the application is transparent to the end user
API documentation Yes
API documentation formats PDF
API sandbox or test environment No
Customisation available No


Independence of resources GeDaP work closely with UKCloud whose resources are highly scalable. KeyTalk is itself highly scalable, capable of handling demands for over 1,000,000 certificates and potentially much more


Service usage metrics Yes
Metrics types A range of standard reports is provided together with a range of audit reports to help meet the requirements of the EUGDPR. Customized reports can be readily provided and GeDaP are happy to quote based on the standard rates.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type Reseller providing extra features and support
Organisation whose services are being resold GeDaP is the KeyTalk distributor for the UK & Ireland

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least every 6 months
Penetration testing approach ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process No
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach As KeyTalk is authenticating and encrypting data belonging to applications; users are highly unlikely to have data to export.
Data maintained is logs on activity which would be the administrators responsibility
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
  • XML
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats XML

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Bonded fibre optic connections
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience
Guaranteed availability GeDaP uses the computing power of UKCloud which provides a guaranteed 99.90% availability for its users
Approach to resilience GeDaP uses UKCloud Service which is designed for deployment across a number of sites, regions and zones. Each zone is designed to eliminate single points of failure (like power, network & hardware). GeDaP encourages customers to ensure that their solution spans multiple sites, regions or zones to ensure continuity of service even if a failure occurs.
Outage reporting All outages will be reported via the Software Service Status page and the notifications service within the UKCloud portal. Outages are identified as Planned Maintenance, Emergency Maintenance and platform issues. In addition the GeDaP Technical Support Manager will contact the designated customer contact,

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Public key authentication (including by TLS client certificate)
  • Other
Other user authentication KeyTalk authenticates using the existing system (LDAP, Radius, Active Directory etc). In addition to the user name and password, it uses the device footprint. This footprint consists of a unique identifier constructed from a number of components, hashed and salted to a formula selected by the installation.
Access restrictions in management interfaces and support channels KeyTalk is integrated to the appropriate system in use (LDAP, Radius Active Directory etc). The system which is currently in use will be controlling the user access.
Access restriction testing frequency At least every 6 months
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Other

Audit information for users

Audit information for users
Access to user activity audit information You control when users can access audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information You control when users can access audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Though an SME, GeDaP has its own security policies in place and regularly reviews its capability against both the current Data Protection requirements and EUGDPR. Customer data is processed on UKCloud which is dedicated to customer processing and which is regularly assessed against ISO20000, ISO27002, and ISO27018 by LRQA a UKAS certified audit body.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach GeDaP works closely with the developers of KeyTalk, who operate a system which tracks changes and provides the input to GeDaP's own change management. If sites require, a test bed can be provided allowing a short period of testing and approval prior to the update's incorporation in the production system.
Vulnerability management type Supplier-defined controls
Vulnerability management approach GeDaP provides their service based on UKCloud servers which offer a high degree of security. As KeyTalk is an internal application and sits between the user application and the devices to verify authentication and encryption it is not an application. GeDaP is established in Cyber Security and are members of Cyber Exchange
Protective monitoring type Supplier-defined controls
Protective monitoring approach GeDaP has a documented approach based on ISO20000 and ISO27001. Any potential incidents identified by staff or customers are monitored, controlled and resolved as high priority.
Incident management type Supplier-defined controls
Incident management approach GeDaP has an incident management and reporting system based on the requirements of ISO20000 and ISO 27001. Any incident raised is resourced, tracked, and resolved

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks Yes
Connected networks
  • Public Services Network (PSN)
  • Police National Network (PNN)
  • New NHS Network (N3)
  • Joint Academic Network (JANET)
  • Scottish Wide Area Network (SWAN)
  • Other


Price £0.34 to £2.55 per user per month
Discount for educational organisations No
Free trial available Yes
Description of free trial GeDaP provide a 30 day "Proof of Concept" to allow customers to evaluate the software against established and agreed criteria. On completion of the POC there would be a review with GeDaP


Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑