The Key Role of HSMs and Key Management in Secure Permissioned Blockchains for Banking and Payment Services - An Overview

Blockchains are ruled almost entirely by cryptographic mechanisms. These mechanisms mostly involve digital signatures & PKI, hashes, and key derivation.

Read more

Why is the Design of Notary Services in Permissioned Blockchains Key to Their Success in Banking?

What is a Notary Service in a Blockchain Network? A notary system is at the root of blockchain, where transactions need to be time-stamped by a trusted authority.

Read more

Utimaco ESKM and the Data-Centric Security Problem

Data-centric security is a general concept of software and IT architecture where the data are at the center of the system and prevail over application and network. 

Read more

Utimaco Atalla AT1000 and PIN Translation

Here we will explain the different environments that may exist around pin translation and answer such questions as:

Read more

The PCI PTS HSM v1 expires - Guidelines for the Transition Towards v3

Corporate organizations and banks have expanded their businesses around the world by using e-commerce which is secured by various security services such as encryption, decryption and strong authentication between identities and applications. Main cryptographic security control for the protection of business transactions is the Hardware Security Module (HSM).

Read more

The Benefits of the Atalla Key Block

HSMs use key block structures as basic structures to achieve secure key management. This article introduces into the Atalla Key Block, explains its principle and details why protecting keys is so important.

Read more

What is an HSM-based Payment Server

The Banking and financial services industry is challenged - for example by  PSD2. On top of this, they need to manage Identity and access management, cryptographic key management, use blockchains, go to the cloud and stay compliant. 

Read more

PCI DSS - Physical Security Requirements for HSMs

Organizations have been crucially reliant on the internet for their business workflows. Due to this enhanced exposure, organizations are facing new threats on a daily basis that dictates the incorporation of cryptographic services.

Read more

How HSMs support secure multi-tenancy?

 As business grew, so did the threat of compromise or theft of data.  To address these risks, both software methods and hardware devices were produced to secure networks, systems and data.  HSMs are dedicated devices, incorporated with both logical and physical protection mechanisms, designed to provide separate, secure operating environments where confidential or sensitive information could be treated without risk of exposure.   

Read more

Ready to take off?

Download our HSM simulator!

Register for free