- Overview
- u.trust GP HSM
- CryptoServer GP HSM
- CryptoServer GP HSM CSe-Series
- Product Comparison
- Resources
About General Purpose HSMs
Hardware Security Modules (HSMs) are the root of trust for secure digital communications and applications. Utimaco’s versatile GP HSM portfolio offers security for every use case, from entry-level models to high-performance variants, all certified to meet the highest security standards.
Our HSMs are FIPS 140-2 Level 3 and 4 certified, with FIPS 140-3 Levels 3 and 4 in progress. Specialized models ensure compliance with regulations such as eIDAS or classified environments (VS-NfD). Furthermore, the u.trust GP HSM Se-Series designed crypto-agile and future-proof, enabling upgrades for Post Quantum Cryptography (PQC), blockchain, or 5G-specific algorithms.
All models are available as PCIe cards or LAN appliances.
Application Packages
5G Protect
The solution for subscriber authentication and key agreement in mobile networks.
Blockchain Protect
The solution to create, verify, and protect blockchain transactions and assets.
Double Key Encryption
The Double Key Encryption Solution for data stored in Microsoft Azure Cloud.
Quantum Protect
The Post Quantum Cryptography firmware extension to add quantum resistance to your infrastructure.
Application Packages
CC eIDAS
Certified for the creation of eIDAS-compliant qualified signatures and seals, remote signing and the issuing of qualified certificates.
VS-NfD
Approved for classified environments according to VS-NfD, RESTREINT UE/EU RESTRICTED and NATO RESTRICTED.
HSM Comparison
u.trust General Purpose HSM Se-Series |
CryptoServer General Purpose HSM | CryptoServer General Purpose HSM CSe-Series |
General Purpose HSM as a Service | |
---|---|---|---|---|
FIPS 140-2 Level 3 |
||||
FIPS 140-2 Level 4 |
||||
FIPS 140-3 Level 3 |
In Progress | In Progress | ||
FIPS 140-3 Level 4 |
In Progress | In Progress | ||
Containerization | Yes, up to 31 cHSMs | Yes, up to 31 cHSMs | ||
Performance | Up to 40,000 RSA 2K operations/s | Up to 3,000 RSA 2K operations/s | Up to 100 RSA 2K operations/s | Up to 40,000 RSA 2K operations/s |
Performance Levels | Entry, mid, and high | Medium | Entry | Entry, mid, and high |
PQC | ||||
Blockchain | ||||
CC eIDAS | On the roadmap | On the roadmap | ||
VS-NfD | On the roadmap | On the roadmap | ||
Deployment | On-premises (LAN appliance / PCIe card) | As a Service | ||
Set-Up & Maintenance | Available against surcharge | |||
Learn More | Learn More | Learn More | Learn More |
* available via application package
GP HSMs: Also Available as a Service
Learn MoreResources

The u.trust General Purpose HSM Se-Series combines superior performance with multi-tenancy. From entry-level to high-performance use cases, all models are future-proof with....
u.trust General Purpose HSM Se-Series
The u.trust General Purpose HSM Se-Series combines superior performance with multi-tenancy. From entry-level to high-performance use cases, all models are future-proof with....
Download
The CC eIDAS compliance version for CryptoServer General Purpose HSM supports Trust Service Providers (TSPs) in fulfilling policy and security requirements defined in various ETSI technical standards (ETSI EN 319 401, EN 319 411, EN 319 421).
CC eIDAS
The CC eIDAS compliance version for CryptoServer General Purpose HSM supports Trust Service Providers (TSPs) in fulfilling policy and security requirements defined in various ETSI technical standards (ETSI EN 319 401, EN 319 411, EN 319 421).
Download
Governments and government-like organizations like NATO declare as “classified information” such information that they consider particularly sensitive.
VS-NfD
Governments and government-like organizations like NATO declare as “classified information” such information that they consider particularly sensitive.
DownloadReady to Secure Your Digital Future?
Contact SalesYour download request(s):

Your download request(s):

About Utimaco's Downloads
Visit our Downloads section and select from resources such as brochures, data sheets, white papers and much more. You can view and save almost all of them directly (by clicking the download button).
For some documents, your e-mail address needs to be verified. The button contains an e-mail icon.

A click on such a button opens an online form which we kindly ask you to fill and submit. You can collect several downloads of this type and receive the links via e-mail by simply submitting one form for all of them. Your current collection is empty.