The Utimaco General Purpose Hardware Security Module
The Utimaco SecurityServer is a broadly useful Hardware Security Module that guarantees the security of cryptographic key material for workers and applications. Anyplace your information is put away, used or got to you can confide in Utimaco for it's elite encryption procedures to shield endeavors from information breaks, accomplish consistence, and consistently give consistency.
Data Encryption Defined
Data encryption is a security technique where data is encoded and must be gotten to or unscrambled
by a client with the right encryption key.
Encoded information, otherwise called ciphertext, seems mixed or muddled to an individual or element
getting to without consent.
Information Encryption is utilized to prevent pernicious or careless gatherings from getting to
touchy information.
A significant line of protection in a network safety design, encryption makes utilizing caught
information as troublesome as could reasonably be expected.
It tends to be applied to all sorts of information security requires going from grouped government
intel to individual Visa exchanges.
Information encryption programming, otherwise called an encryption calculation or code, is utilized
to build up an encryption plot which hypothetically must be broken with a lot of registering power.
General Purpose HSM
The Utimaco SecurityServer is a universally useful Hardware Security Module that guarantees the security of cryptographic key material for workers and applications.
Public Key Infrastructure (PKI)
Utilize public key framework (PKI) with Utimaco HSMs as the Root Of Trust to make sure about
the Internet Of Things.
A PKI can give secrecy, trustworthiness, validness and non-disavowal of your data, code and
gadgets.
Payment HSM
Utimaco offers Hardware Security Modules for Payment use cases:
Utimaco Atalla AT 1000
installments Security Module for ensuring sensitive information and related keys
PaymentServer Se Gen 2 and PaymentServer CSe to arrive at full PCI consistence for your
answers.
Key Injection
Key injection is the beginning stage for safely dealing with a device over its item lifetime
in the IoT.
Key injection gives each device a personality.
To ensure gadget personalities can not be hacked, the keys should be created by a HSM.
Database Encryption
With database encryption, an encryption calculation changes information inside a data set
from a meaningful state into a ciphertext of indistinguishable characters.
With a key created by the calculation, a client can unscramble the information and recover
the usable data varying.
LAN Appliance
Utimaco Hardware Security Modules are available as 19” network appliance (or “LAN appliance”), which is ideal for the immediate installation in data centers.
PCIe Card
Utimaco offers two series of PCIe cards which fit into your server architecture or
customized chassis:
the Se-Series Gen2 meets standard physical security and
anti-tampering
requirements and the CSe-Series provides strongest tamper-detection and tamper-response
technology.
Code Signing
Make sure to store your code signing certificate in an HSM to ensure the integrity and authenticity of your software and subsequent updates.
Document Signing
Store your certificates and keys for the signing process in an HSM to prevent others from signing documents with your keys.
Certifications & Аpprovals Utimaco
Common Criteria (CC)
FIPS 140-2
FISMA, FedRAMP, and
FICAM
To combat outsider attacks and insider threats and ensure all sensitive information is
secure,
there are a number of information security regulations and processes that
government
agencies must follow, including FISMA, FedRAMP, and FICAM.
Certificate Policy of the Smart Metering PKI
This German Certificate Policy and Technical Guideline BSI TR-03109 define specifications
related to the “Smart Metering PKI”.
A PKI ensures the integrity, confidentiality and authenticity of data circulating around the
smart metering gateway (SMGW).
Utimaco HSMs are particularly suited in this context. The Utimaco CryptoServer CSe has been
successfully evaluated and found to fulfill the requirements of the Certificate Policy.
PCI DSS
The Payment Card Industry Data Security Standard (PCI DSS) defines a set of security
standards.
With these companies that accept, process, store or transmit credit/debit card
information can maintain a secure environment
and protect cardholders against misuse of their personal information.
One of the most efficient ways of complying with PCI DSS is to use HSMs.
eIDAS
On July 1st 2016, the electronic identification and trust services regulation, more commonly
known as eIDAS, replaced the 17-year old eSignature Directive 1999/93/EC and became directly
applicable in 28 EU member states.
As an HSM manufacturer, Utimaco is at the forefront of defining related technical
requirements and achieves conformity with eIDAS requirements.
Cloud Security
Utimaco CryptoServer Cloud gives you a strategic architectural fit & risk management for your high value assets in a multi-cloud environment!