Utimaco ESKM and the Data-Centric Security Problem

Data-centric security is a general concept of software and IT architecture where the data are at the center of the system and prevail over application and network. 

Read more

Utimaco Atalla AT1000 and PIN Translation

Here we will explain the different environments that may exist around pin translation and answer such questions as:

Read more

The PCI PTS HSM v1 expires - Guidelines for the Transition Towards v3

Corporate organizations and banks have expanded their businesses around the world by using e-commerce which is secured by various security services such as encryption, decryption and strong authentication between identities and applications. Main cryptographic security control for the protection of business transactions is the Hardware Security Module (HSM).

Read more

The Benefits of the Atalla Key Block

HSMs use key block structures as basic structures to achieve secure key management. This article introduces into the Atalla Key Block, explains its principle and details why protecting keys is so important.

Read more

What is an HSM-based Payment Server

The Banking and financial services industry is challenged - for example by  PSD2. On top of this, they need to manage Identity and access management, cryptographic key management, use blockchains, go to the cloud and stay compliant. 

Read more

PCI DSS - Physical Security Requirements for HSMs

Organizations have been crucially reliant on the internet for their business workflows. Due to this enhanced exposure, organizations are facing new threats on a daily basis that dictates the incorporation of cryptographic services.

Read more

How HSMs support secure multi-tenancy?

 As business grew, so did the threat of compromise or theft of data.  To address these risks, both software methods and hardware devices were produced to secure networks, systems and data.  HSMs are dedicated devices, incorporated with both logical and physical protection mechanisms, designed to provide separate, secure operating environments where confidential or sensitive information could be treated without risk of exposure.   

Read more

Making Blockchain Technology Secure and Auditable

Modern society and commerce are based on trust and digital identities. Companies and organizations build a reputation for being trustworthy. Consequently, the trust in their products is based on the trust in the organization.

Read more

eIDAS: The Advantages of QES as compared to AES

Advanced and Qualified Electronic Signatures are electronic signatures that comply with EU Regulation 910/2014 on eIDAS electronic transactions in the European internal market. They enable long-term verification of electronic signatures. Today, we explain the difference between Qualified and Advanced Electronic Signatures, both in terms of legal status and technical requirements.

Read more

Ready to take off?

Download our HSM simulator!

Register for free