Blog

Blogbeiträge

Press releases

blog-why-businesses-cannot-ignore
Blogbeitrag

Why businesses can’t ignore crypto agility - facing the facts before we’re in a post-quantum world

Today’s encryption algorithms, when pitted against quantum tools, will be considerably less resilient and leave huge amounts of data vulnerable as a result.
HSM to cloud geobridge
Blogbeitrag

Moving Your HSMs To The Cloud

Enterprises, especially those who manage sites in multiple geographical locations, have the most to gain by centralizing and virtualizing their HSM resources.
Quo vadis it-sa?
Blogbeitrag

Quo vadis it-sa?

it-sa is considered one of Europe´s largest IT security fairs, has grown tremendously and attracts more and more foreign guests as well.
What are the common criteria for HSMs
Blogbeitrag

What are the common criteria for hardware security modules (HSMs)?

All the critical banking and payment systems incorporate Hardware Security Modules (HSMs) for the protection of user information and business transactions.
HSM as a service
Blogbeitrag

PCI DSS requirements for building and maintaining a secure network and systems

When building and then subsequently maintaining a secure payment network, the Payment Card Industry Data Security Standard (#PCIDSS) recommends that 12 security requirements be met to secure payment data.
pci hsm certificate
Blogbeitrag

What is the PCI-HSM certification?

As new threats emerge on a daily basis, it is critical for CIOs, CISOs, and IT Managers to ensure they remain diligent when it comes to safeguarding their environments.
blockchain sunset
Blogbeitrag

Blockchain - the next 10 years

A decade ago, Satoshi Nakamoto published the bitcoin whitepaper, the spark that started the blockchain fire engulfing us today. Since then the options available and uses of blockchain technology have dramatically expanded.
bucking the trend
Blogbeitrag

Bucking the trend – how cloud HSM services can help banks team up with fintech challengers

This article shows how FinTech firms can team up, with cloud-based HSMs as keystone.

Wie können wir Ihnen helfen?

Sprechen Sie mit einem unserer Spezialisten und erfahren Sie, wie Utimaco Sie unterstützen kann.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      About Utimaco's Downloads

      Visit our Downloads section and select from resources such as brochures, data sheets, white papers and much more. You can view and save almost all of them directly (by clicking the download button).

      For some documents, your e-mail address needs to be verified. The button contains an e-mail icon.

      Download via e-mail

       

      A click on such a button opens an online form which we kindly ask you to fill and submit. You can collect several downloads of this type and receive the links via e-mail by simply submitting one form for all of them. Your current collection is empty.