Skip to main content
  • Search
  • My Utimaco
  • 0Downloads
en
  • English
  • Deutsch
  • 日本
Logo Claim

Main navigation

  • Home
    • Solutions
      • Industries
        • Automotive & Integrated Mobility
        • Banking & Financial Services
        • eHealth
        • Government & Public Sector
        • Insurance Sector
        • Manufacturing & IoT
        • Cloud Services
        • Energy & Utilities
        • Lottery & Gaming
        • Media & Entertainment
        • Telecommunications
      • Applications
        • 5G Lawful Interception
        • 5G Security
        • Authentication
        • Blockchain
        • Cloud Service Architecture
        • Code Signing
        • Cryptographic Key Management
        • Data and Database Encryption
        • Deep and Dark Web Monitoring
        • Double Key Encryption
        • Key Injection
        • Monitoring the Internet of Things (IoT)
        • Multi-cloud Key Management
        • Payment HSM as a Service
        • Public Key Infrastructure
        • PCI Compliant Payment Card Processing
        • Post Quantum Crypto Agility
        • Qualified Electronic Signatures & Seals
        • Security of IoT Components
        • Tokenization
    • Products
      • Categories
        • Data Protection Solutions
        • Financial Service Solutions
        • General Purpose Solutions
        • HSM & Key Management
        • KeyBRIDGE
        • u.trust Anchor
        • Mobile Networks
        • Government Solutions
        • PKI Solutions
        • IoT Security Management
        • Lawful Interception
        • Data Retention
        • Cyber Crime Protection
      • Technologies for
        • Americas Compliance
        • Data Protection & Compliance
        • Deep & Dark Web
        • Digital Signing
        • EMEA Compliance
        • Encryption
        • Global Compliance
        • Hardware Security Modules
        • Keys & Secrets Management
        • Public Key Infrastructure
    • Compliance
      • Certifications & approvals
        • Common Criteria (CC)
        • FIPS 140-2
        • ISO 14001 Certification
        • ISO 9001 Certification
      • Compliance & standardization
        • Memberships and Certifications
        • FISMA, FedRAMP, and FICAM
        • Certificate Policy Smart Metering PKI
        • eIDAS
        • GDPR
        • PCI DSS
    • Support
      • Consultancy
        • Get a quote
        • Utimaco Academy
        • Professional services
        • PQC consultancy
      • Support
        • for Telecommunication Solutions
        • for HSMs, Atalla and ESKM
        • for u.trust Data File
        • Key Exchange & Escrow Service (KEES™)
        • Utimaco Portal
    • Downloads
      • Free Simulators and Software Development Kits
        • Block-safe HSM Simulator
        • CryptoServer CP5 Simulator
        • SecurityServer Simulator
        • Q-safe HSM Simulator
        • CryptoServer SDK
        • CryptoScript SDK
      • Resources
        • Application Notes
        • Brochures
        • Case Studies
        • Data Sheets
        • E-books
        • Solution Briefs
        • Webinars
        • White Papers
        • Utimaco Portal
    • Current topics
      • Press releases
      • Blog
      • Events

Right Menu

  • Company
  • Careers
  • Partners
en
  • English
  • Deutsch
  • 日本
Blog

FIPS 140-2

Digital Transformation: Scaling Security Processes based on a Converged Crypto Platform
Blog
Feb 11, 2021

Digital Transformation: Scaling Security Processes based on a Converged Crypto Platform - Utimaco

Digital transformation is on the rise and so is the need for HSMs. This requires a cloud-agnostic HSM solution that is able to seamlessly bridge the gap between on-premise and cloud deployments.
blog-technical-and-financial-advantages-of-permissioned-blockchains
Blog
Dec 05, 2019

The Key Role of HSMs in Secure Permissioned Blockchains for Banking and Payment Services

In many permissioned blockchain networks like Corda, notaries are dedicated nodes. They replace the role that miners play in other blockchains like the Bitcoin blockchain.
blog-eidas-advantages-of-qes-compared-to-aes-and-where-qes-is-vital
Blog
May 28, 2019

“Ability” – Best Practices For Encryption Key Management

Read six best practices to consider with an encryption solution and its centralized key manager. Use a key manager to minimize the risk of a network or single point of failure and avoid large impacts on overall data security.
blog-pci-dss-technological-requirements
Blog
Dec 18, 2018

PCI DSS technological requirements for Certified Devices

The payment card industry data security standard (PCI DSS) has a large security baseline that it requires for all financial institutions to comply with. Read in this article more about the PCI compliance.
Introductiuon into hsm
Blog
Oct 05, 2018

Introduction to hardware security modules (HSM): “FIPS 140-2 tested and certified”

Learn about the requirements specified in the Federal Information Processing Standard (FIPS) PUB 140- 2 outline a total of 11 areas of design and implementation of products in applied cryptography.

Stay up to date with our newsletter

Register
  • https://www.kununu.com/de/utimaco
  • https://twitter.com/utimaco
  • https://www.linkedin.com/company/utimaco
  • https://www.xing.com/pages/utimaco
Logo Claim
For over 30 years now, Utimaco products have been protecting people around the world against terrorism and organized crime and have secured private and sensitive data against theft or abuse.
ABI Research competitive ranking (HSM, OEM): Overall Leader ABI Research competitive ranking (HSM, OEM): Top Implementer

Current Topics
Press releases & Events
Blog

Utimaco Portal
Sign in
Register

Solutions
Industries
Applications

Products
Categories

Services
Consultancy
Support

Downloads
Free Simulators and SDKs
Resources

Information for
Applicants
Investors
Partners

  • © utimaco GmbH
  • Legal notice
  • Terms & conditions
  • Privacy
  • Cookie policy
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.
  • Direct download
  • Download via email

Your download collection:

    You will be provided with links for your selected downloads directly after submitting below form.

    Your download collection:

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      Your download collection is empty. Visit our Downloads section and select from resources such as data sheets, white papers, webinar recordings and much more. 

      Downloads

       

      0