Blog

Blogbeiträge

Press releases

Um Blogbeiträge zu einem bestimmten Thema zu finden, klicken Sie auf eines der gängigsten Schlüsselwörter.

Michael Engel (Diebold-Nixdorf) - Encrypting Retail Banking Services for End-to-End Security (video)
Blog post

Michael Engel (Diebold-Nixdorf) - Encrypting Retail Banking Services for End-to-End Security (video)

In this video, Michael Engel explains, why he is partners with Utimaco for that critical element of encryption technology in the financial services across the globe.
blog-atalla-secure-configuration-assistant-hyper-security
Blog post

The Atalla Secure Configuration Assistant and Concepts of Hyper-Security

The Atalla Secure Configuration Assistant, also named the SCA-W, is a secure system dedicated to interfacing Atalla HSMs.
blog-integration-automation-open-api
Blog post

Integration, Automation and Open API in Banking Infrastructure to Accelerate Service Innovation - How Crypto paves the way

Banks have started a process of reinventing their value proposition as a highly automated and integrated platform for a continuously innovating portfolio of financial services. Payment is key to this and is threat by external market entrants.
blog-permissioned-blockchains-technology-and-security-aspects
Blog post

Permissioned Blockchains for Banking - Understanding the Technology and Security Aspects

The banking industry is currently rolling out several permissioned blockchain projects.
blog-an-introduction-to-the-regulatory-technical-standards-part-3
Blog post

An Introduction to the Regulatory Technical Standards for Strong Customer Authentication – Part 3: Achieving Transactional & Account Security

eIDAS has been designed to allow for seamless (cross-border) operations while ensuring technological neutrality and flexibility in terms of how its minimum standards need to be met.
blog-an-introduction-to-the-regulatory-technical-standards-part-2
Blog post

An Introduction to the Regulatory Technical Standards for Strong Customer Authentication – Part 2: PSD2

eIDAS has been designed to allow for seamless (cross-border) operations while ensuring technological neutrality and flexibility in terms of how its minimum standards need to be met.
blog-an-introduction-to-the-regulatory-technical-standards-part-1
Blog post

An Introduction to the Regulatory Technical Standards for Strong Customer Authentication – Part 1: eIDAS

eIDAS has been designed to allow for seamless (cross-border) operations while ensuring technological neutrality and flexibility in terms of how its minimum standards need to be met.
blog-eidas-advantages-of-qes-compared-to-aes-and-where-qes-is-vital
Blog post

“Ability” – Best Practices For Encryption Key Management

Read six best practices to consider with an encryption solution and its centralized key manager. Use a key manager to minimize the risk of a network or single point of failure and avoid large impacts on overall data security.
blog-hsm-as-a-service-pci-dss-requirements
Blog post

HSM as a Service – meeting PCI data security standards

Looking at the cost of PCI-DSS compliance and how HSM as a Service can help FinTech companies really save on those compliance costs while still making use of the best-in-class security mechanisms.
PSD2 and HSM-as-a-Service
Blog post

PSD2 and HSM-as-a-Service - part 3 - the opportunity for banks

The Revised Payment Services Directive (PSD2) mandates certain changes that has the potential to significantly alter how the payments industry operates in the EU.
PSD2 and HSM-as-a-Service
Blog post

PSD2 and HSM-as-a-Service - part 2: FinTech opportunities

In this article, we look at the potential opportunities that this creates for FinTech companies and other Third-Party Partners (TPPs).
PSD2 and HSM as a Service
Blog post

PSD2 and HSM as a Service - part 1: leveling the playing field

Payment Services Directive (PSD2) mandates certain changes that has the potential to significantly alter how the payments industry operates in the EU.

Wie können wir Ihnen helfen?

Sprechen Sie mit einem unserer Spezialisten und erfahren Sie, wie Utimaco Sie unterstützen kann.
Sie haben zwei verschiedene Arten von Downloads ausgewählt, so dass Sie verschiedene Formulare absenden müssen, die Sie über die beiden Tabs auswählen können.

Ihre Download-Sammlung:

    Direkt nach dem Absenden des Formulars erhalten Sie die Links zu den von Ihnen ausgewählten Downloads.

    Ihre Download-Sammlung:

      Für diese Art von Dokumenten muss Ihre E-Mail Adresse verifiziert werden. Sie erhalten die Links für die von Ihnen ausgewählten Downloads per E-Mail, nachdem Sie das unten stehende Formular abgeschickt haben.

      Downloads von Utimaco

      Besuchen Sie unseren Download-Bereich und wählen Sie aus: Broschüren, Datenblätter, White-Papers und vieles mehr. 

      Fast alle können Sie direkt ansehen und speichern (indem Sie auf den Download-Button klicken).

      Für einige Dokumente muss zunächst Ihre E-Mail-Adresse verifiziert werden. Der Button enthält dann ein E-Mail-Symbol.

      Download via e-mail

       

      Der Klick auf einen solchen Button öffnet ein Online-Formular, das Sie bitte ausfüllen und abschicken. Sie können mehrere Downloads dieser Art sammeln und die Links per E-Mail erhalten, indem Sie nur ein Formular für alle gewählten Downloads ausfüllen. Ihre aktuelle Sammlung ist leer.