Blog

Blogbeiträge

Press releases

Um Blogbeiträge zu einem bestimmten Thema zu finden, klicken Sie auf eines der gängigsten Schlüsselwörter.

Digital ID
Blog post

eIDAS 2.0. Moving Closer - European Digital Identity Wallet (EDIW) and Pilot Implementation

The European Commission has now proceeded to test technical specifications for the Common Toolbox for European Digital Identity and a prototype of a Digital Identity Wallet.
PQC Mnufacturing
Blog post

Leveraging Quantum Computers in Manufacturing Industry: Opportunities and Threats

We explain how the manufacturing industry can leverage the opportunities that quantum computing provides while remaining mindful of the possible threats.
 digital pattern
Blog post

Post Quantum Cryptography: Different Angles to Address an Urgent Matter

In this article, we review post-quantum migration recommendations based on research by security experts from the NSA, BSI, ENISTA and ETSI.
On premise data security in retail
Blog post

Cybersecurity In Retail Payments

This article explores the current state of cybersecurity in retail, the reasons why retailers are vulnerable to cyber crimes, and the various payment security challenges they endure.
skyscrapers
Blog post

Quantum Computing for Banks and Financial Institutions - Transformative Opportunities or a Threat to the IT Security Infrastructure

In this blog, we explain how banks and financial institutions could leverage the opportunities of quantum computing.
 digital pattern
Blog post

A Staged Approach of Migration to Quantum-Safe Schemes - An ETSI Perspective

This article featuring ETSI’s perspective is the fourth in a series of different perspectives on post quantum migration.
 digital pattern
Blog post

Quantum Mitigation and Integration into Existing Protocols - an ENISA perspective

In this article, we focus on ENISA’s perspective on quantum mitigation and integration into existing protocols.
Manag keys virtually
Blog post

Zero Trust with HSM - Secure Key Generation & Protection of Keys

This article explains why and how Hardware Security Modules are the best option for this requirement.
zero trust sign on lockers
Blog post

Data Encryption & Access Management in ZeroTrust

In this article, we explore two vital concepts – Data Encryption and Access Management and how both are critical to a successful Zero Trust strategy.
laptop with bank and atm icons
Blog post

What is an HSM-based Payment Server

The Banking and financial services industry is challenged by PSD2. On top of this, they need to manage Identity and access management, cryptographic key management, use blockchains, go to the cloud and stay compliant.
IDC Studie Cybersecurity
Blog post

Five Questions to Stefan Auerbach on the Business Value of Cybersecurity and What Actions to Take

This interview with Stefan Auerbach, CEO of Utimaco, was conducted by IDC, and was first published in the IDC Executive Brief: Cybersecurity in Germany, Austria, and Switzerland 2022.
Press Release
Press Release
Blog post

Risks of not having cybersecurity in a connected car

At Realsec by Utimaco, we are a cybersecurity company that offers solutions in this area, developing encryption solutions both for general purpose and for the financial sector, digital signature, time stamping, PKI solutions, cybersecurity in Blockchain and Internet of Things (IoT), etc.

Wie können wir Ihnen helfen?

Sprechen Sie mit einem unserer Spezialisten und erfahren Sie, wie Utimaco Sie unterstützen kann.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      About Utimaco's Downloads

      Visit our Downloads section and select from resources such as brochures, data sheets, white papers and much more. You can view and save almost all of them directly (by clicking the download button).

      For some documents, your e-mail address needs to be verified. The button contains an e-mail icon.

      Download via e-mail

       

      A click on such a button opens an online form which we kindly ask you to fill and submit. You can collect several downloads of this type and receive the links via e-mail by simply submitting one form for all of them. Your current collection is empty.