Blog

Blogbeiträge

Press releases

Um Blogbeiträge zu einem bestimmten Thema zu finden, klicken Sie auf eines der gängigsten Schlüsselwörter.

blog-open-banking-the-3-main-focus-areas-for-banks-and-fintech
Blog post

Open Banking  - The 3 Main Focus Areas for Banks and FinTech

2019 has set the stage for the next round of the match-up between Banks and FinTechs and the requirements for Strong Customer Authentication will come into play.
blog-benefits-of-the-atalla-key-block
Blog post

The Benefits of the Atalla Key Block

HSMs use key block structures as basic structures to achieve secure key management. Read about the Atalla Key Block to know more about principles and details why protecting keys is so important.
Puzzle piece missing
Blog post

Why is the choice of the right HSM prerequisite for a crypto agile architecture

Organizations have to put serious consideration into the future of cryptography. This is why the choice of the right Hardware Security Module is a prerequisite for a crypto-agile architecture.
blog-pci-dss-physical-security-requirements-for-hsms
Blog post

PCI DSS - Physical Security Requirements for HSMs - Utimaco

This article summarized and highlighted the 8 core physical security standards for HSMs as per the directions of PCI SSC & PCI DSS.
blog-beyond-just-payments-psd2s-impact-beyond-the-payments-industry
Blog post

Beyond just Payments - PSD2’s impact beyond the Payments Industry

PSD2 is touted as the biggest game changer for the payments industry. PSD2 gives customers more control over their data and options to choose from different service providers.
blog-state-of-symmetric-hash-algorithms-after-quantum-computing
Blog post

State of Symmetric & Hash Algorithms after Quantum Computing

The importance of cryptography is increasing. The formalization of quantum computing platforms poses serious threats to the cryptographic algorithms. Be informed about the omplications of quantum computing on the present cryptography.
blog-how-hsms-support-secure-multi-tenancy
Blog post

How HSMs support secure multi-tenancy?

The use of HSMs for the security of business applications has been mandatory. To secure a large number of clients within an HSM, multi-tenant HSM architectures are getting popular as they promise robust performance.
blog-eidas-advantages-of-qes-compared-to-aes-and-where-qes-is-vital
Blog post

“Ability” – Best Practices For Encryption Key Management

Read six best practices to consider with an encryption solution and its centralized key manager. Use a key manager to minimize the risk of a network or single point of failure and avoid large impacts on overall data security.
blog-leveraging-psd2-the-fintech-edition
Blog post

Leveraging PSD2, The FinTech Edition

With regulations like PSD2 new players and established leaders in the payments industry must not compromise on security and ease of use.
blog-sector-specific-case-studies-for-eidas-part-1
Blog post

Sector Specific Case Studies for eIDAS (Part 1)

eIDAS is a high powerful yet flexible toolset for developers, consultants and companies to build tools to cater to their specific needs. eIDAS helps to meet the unique requirements for each economy sector.
eIDAS & Strong Customer Authentication – Securing Europe’s Digital Payments Landscape
Blog post

eIDAS & Strong Customer Authentication – Securing Europe’s Digital Payments Landscape

With compliance in strong customer authentication requirements and secure communication under PSD2 conditions improve the security of your payment services across the European Union.
blog-it-is-all-about-the-trust
Blog post

It’s all about the Trust – The Role of eIDAS in International Trade and Trade Finance

Banks play a key role in international trade and supply chains are very complex. eIDAS can create trust through qualified electronic signatures and enables different parties to establish a secure trade transaction.

Wie können wir Ihnen helfen?

Sprechen Sie mit einem unserer Spezialisten und erfahren Sie, wie Utimaco Sie unterstützen kann.
Sie haben zwei verschiedene Arten von Downloads ausgewählt, so dass Sie verschiedene Formulare absenden müssen, die Sie über die beiden Tabs auswählen können.

Ihre Download-Sammlung:

    Direkt nach dem Absenden des Formulars erhalten Sie die Links zu den von Ihnen ausgewählten Downloads.

    Ihre Download-Sammlung:

      Für diese Art von Dokumenten muss Ihre E-Mail Adresse verifiziert werden. Sie erhalten die Links für die von Ihnen ausgewählten Downloads per E-Mail, nachdem Sie das unten stehende Formular abgeschickt haben.

      Downloads von Utimaco

      Besuchen Sie unseren Download-Bereich und wählen Sie aus: Broschüren, Datenblätter, White-Papers und vieles mehr. 

      Fast alle können Sie direkt ansehen und speichern (indem Sie auf den Download-Button klicken).

      Für einige Dokumente muss zunächst Ihre E-Mail-Adresse verifiziert werden. Der Button enthält dann ein E-Mail-Symbol.

      Download via e-mail

       

      Der Klick auf einen solchen Button öffnet ein Online-Formular, das Sie bitte ausfüllen und abschicken. Sie können mehrere Downloads dieser Art sammeln und die Links per E-Mail erhalten, indem Sie nur ein Formular für alle gewählten Downloads ausfüllen. Ihre aktuelle Sammlung ist leer.