Blog

Blogbeiträge

Press releases

Um Blogbeiträge zu einem bestimmten Thema zu finden, klicken Sie auf eines der gängigsten Schlüsselwörter.

blog-distinctive-requirements-between-pci-pts
Blogbeitrag

Distinctive Requirements between PCI PTS HSM v2.0 and v3.0

Since the release of PCI PIN Transaction Security (PTS) Hardware Security Module (HSM) version 3, companies have started working on v3 compliant HSMs. See the differences between v2 and v3.
blog-technical-and-financial-advantages-of-permissioned-blockchains
Blogbeitrag

The Key Role of HSMs and Key Management in Secure Permissioned Blockchains for Banking and Payment Services - An Overview

Blockchains are ruled almost entirely by cryptographic mechanisms. These mechanisms mostly involve digital signatures & PKI, hashes, and key derivation.
blog-permissioned-blockchains-technology-and-security-aspects
Blogbeitrag

Permissioned Blockchains for Banking - Understanding the Technology and Security Aspects

The banking industry is currently rolling out several permissioned blockchain projects.
blog-why-are-permissioned-blockchains-a-great-fit-for-banking
Blogbeitrag

Why Are Permissioned Blockchains a Great Fit for Banking - A Case Study of the Corda Architecture

Permissioned blockchain networks are blockchain networks that are not public, e.g., they require users to apply for membership in order to gain access to them. Such blockchain networks use specific software to operate.
blog-why-is-the-design-of-notary-services-in-permissioned-blockchains
Blogbeitrag

Why is the Design of Notary Services in Permissioned Blockchains Key to Their Success in Banking?

What is a Notary Service in a Blockchain Network? A notary system is at the root of blockchain, where transactions need to be time-stamped by a trusted authority.
blog-understanding-the-atalla-command-language
Blogbeitrag

Understanding the Atalla Command Language

Atalla has created a way to communicate with HSMs in a very smart way. In this article, we will discuss the Atalla Command Language.
blog-using-blockchains-and-ecosystem-integrated-hsms
Blogbeitrag

Using Blockchains and Ecosystem-Integrated HSMs to achieve Compliant Digital Identity Security

In this article, we shall analyze the way blockchain technology can improve data protection and create a better, and smarter digital identity when used with HSMs.
blog-nists-hybrid-mode-approach-to-post-quantum-computing
Blogbeitrag

NIST's Hybrid Mode Approach to Post-Quantum Computing - why crypto agility is crucial

The importance of cryptography has acquired considerable prominence due to the requirement of security mechanisms such as confidentiality, integrity, authenticity, and non-repudiation in modern data communications.
blog-utimaco-eskm-and-the-data-centric-security-problem
Blogbeitrag

Utimaco ESKM and the Data-Centric Security Problem

Data-centric security is a general concept of software and IT architecture where the data are at the center of the system and prevail over application and network.
blog-utimaco-atalla-at1000-and-pin-translation
Blogbeitrag

Utimaco Atalla AT1000 and PIN Translation

There are different environments that may exist around pin translation and what they are used for.
blog-the-pci-pts-hsm-v1-expires-guidelines
Blogbeitrag

The PCI PTS HSM v1 expires - Guidelines for the Transition Towards v3

HSMs are importand for enterprises for the protection of clients and business transactions. This article enlightens the expiry of version 1.0 of the PCI PTS HSM validation and the latest standard available version 3.0.
blog-eidas-psd2-the-new-payments-industry-paradigm-in-europe
Blogbeitrag

eiDAS & PSD2 - The New Payments Industry Paradigm in Europe

The Revised Payment Services Directive (PSD2) is poised to revolutionize the payment services industry. When it comes to payment transactions, the key elements of Strong Customer Authentication must be achieved.

Wie können wir Ihnen helfen?

Sprechen Sie mit einem unserer Spezialisten und erfahren Sie, wie Utimaco Sie unterstützen kann.
Sie haben zwei verschiedene Arten von Downloads ausgewählt, so dass Sie verschiedene Formulare absenden müssen, die Sie über die beiden Tabs auswählen können.

Ihre Download-Sammlung:

    Direkt nach dem Absenden des Formulars erhalten Sie die Links zu den von Ihnen ausgewählten Downloads.

    Ihre Download-Sammlung:

      Für diese Art von Dokumenten muss Ihre E-Mail Adresse verifiziert werden. Sie erhalten die Links für die von Ihnen ausgewählten Downloads per E-Mail, nachdem Sie das unten stehende Formular abgeschickt haben.

      Downloads von Utimaco

      Besuchen Sie unseren Download-Bereich und wählen Sie aus: Broschüren, Datenblätter, White-Papers und vieles mehr. 

      Fast alle können Sie direkt ansehen und speichern (indem Sie auf den Download-Button klicken).

      Für einige Dokumente muss zunächst Ihre E-Mail-Adresse verifiziert werden. Der Button enthält dann ein E-Mail-Symbol.

      Download via e-mail

       

      Der Klick auf einen solchen Button öffnet ein Online-Formular, das Sie bitte ausfüllen und abschicken. Sie können mehrere Downloads dieser Art sammeln und die Links per E-Mail erhalten, indem Sie nur ein Formular für alle gewählten Downloads ausfüllen. Ihre aktuelle Sammlung ist leer.