ROOT-OF-TRUST
For your digital infrastructure.
HSM
HARDWARE SECURITY MODULE
AN HSM
is a hardened and tamper-proof device for cryptographic processing, such as key generation, digital signatures and encryption.
The HSM ensures that keys can only be used via defined access mechanisms and subject to appropriate authentication, authorization, and logging.
TYPICAL HSM APPLICATIONS
-
Public Key Infrastructures (PKI)
-
Cryptographic Key Management
-
Electronic payment transactions
-
Digital signatures
-
Code Signing
-
Load Balancer
Performance and (high) availability are
important features of an HSM solution.
TRUST
not just the manufacturer's statements. Certifications give you the guarantee that independent test laboratories have analyzed, tested and approved the security of the respective products according to standardized specifications.
The most important certification schemes for HSMs are NIST FIPS 120-2/3 and Common Criteria EAL4+. There are also industry-specific certifications and official approvals.
CRYPTAS
helps you to formulate your hardware security requirements. We work together with the market-leading HSM manufacturers and support you in the selection, installation and operation of a suitable solution.
Do you have any questions or need more information?