Skip to content
CORPORATE TRUST SERVICES

Cryptography-based trust services to protect your digital identities, data and business secrets.

QUALIFIED TRUST SERVICES

Legally compliant digital signatures (eIDAS) to drive forward the digitalization of your business processes.

TRUST COMPONENTS

Everything to do with smartcards, tokens, readers, certificates and signatures.

INNOVATIVE AND SECURE PERSPECTIVES FOR A DIGITAL WORLD.

PKI & CRYPTOGRAPHY SOLUTIONS

STRONG AUTHENTICATION
Phishing-resistant with certificates or FIDO

ENTERPRISE PKI
for Zero-Trust & IoT

ENCRYPTION & KEY MANAGEMENT
for on-premise & Cloud

PKI & CRYPTOGRAPHY PRODUCTS

egofy CARD
Smart Cards & Token

primeID VSC
Virtual Smard Card

primeID ONDEMAND
Remote VSC platform

primeID SELF SERVICE
Self Service for Smart Cards

primeID DISCOVER
Monitor certificates

primeID VALIDATE
Enterprise OCSP

eIDAS / QUALIFIED SIGNATURES & SEALS

Signatures & seals for your employees
with primesign as an enterprise solution

Sign a document online & instantly
for individuals and as an entry point for companies

SUPPORT

Simply integrate our experts into your ITSM structure / remote support up to 24/7

MANAGED SERVICES

We take care of the complete operation of your trust services in our data centers, you take care of your business.

THE USABILITY OF OUR SOLUTIONS ENSURES HIGH ACCEPTANCE.

Everything to do with smartcards, tokens, readers, certificates and signatures.
GENERAL

We are happy
to help.
T +43 1 35553 - 0

SALES

We are happy to support you.
T +43 1 35553 - 200

SHOP

You are a store customer and have a question or need support.
T +43 1 35553 - 300

STANDARD SUPPORT

You have a standard support contract and need assistance.
T +43 1 35553 - 800

SUPPORT PORTAL PREMIUM

You have a Premium Support contract and need assistance.

LOCATIONS
HSM Hardware Security Module

ROOT-OF-TRUST

For your digital infrastructure.

HSM

HARDWARE SECURITY MODULE

AN HSM
is a hardened and tamper-proof device for cryptographic processing, such as key generation, digital signatures and encryption.

The HSM ensures that keys can only be used via defined access mechanisms and subject to appropriate authentication, authorization, and logging.

TYPICAL HSM APPLICATIONS

  • Public Key Infrastructures (PKI)

  • Cryptographic Key Management

  • Electronic payment transactions

  • Digital signatures

  • Code Signing

  • Load Balancer

HSM Hardware Security Module

Performance and (high) availability are
important features of an HSM solution.

HSM Root of Trust

TRUST
not just the manufacturer's statements. Certifications give you the guarantee that independent test laboratories have analyzed, tested and approved the security of the respective products according to standardized specifications.

The most important certification schemes for HSMs are NIST FIPS 120-2/3 and Common Criteria EAL4+. There are also industry-specific certifications and official approvals.

CRYPTAS
helps you to formulate your hardware security requirements. We work together with the market-leading HSM manufacturers and support you in the selection, installation and operation of a suitable solution.

Do you have any questions or need more information?