Public Key Infrastructure

Public Key Infrastructure

Securing Public Key Infrastructure. Build a trusted and secure business environment by authenticating users and devices.

Data has become the most targeted asset of fraud, as it often represents financial, commercial, personal or even political value. Public Key Infrastructures are a powerful technology to protect data at rest, in transit and even in use. Through encryption and decryption, PKI is based on digital certificates that verify the identity of the devices and/or users.

Using PKI alongside Utimaco’s HSMs provides confidentiality, integrity, authenticity and non-repudiation of information, code and devices.

Business value

Business value


Maximum Security

  • Secures key storage and processing inside the secure boundary of the HSM
  • Extensive key management with key authorization

eIDAS Compliant & Common Criteria Certified

  • Supports companies and trust service providers (TSPs) in fulfilling policy and security requirements defined in various ETSI technical standards (ETSI EN 319 401, EN 319 411, EN 319 421).
  • Ideally suited for eIDAS-compliant qualified signature creation and remote signing.
  • Convenient issuing of (qualified) certificates, OCSP (Online Certificate Status Protocol) and time stamping.
  • Common Criteria (CC) certified based on the eIDAS Protection Profile (PP) EN 419 241-2 & available as a PCIe plug-in card or as a network-attached appliance.

Scalable and flexible

  • Multiple integrations with PKI applications, database encryption
  • PKI can be managed on-premise or cloud-based.

Remote Access

  • Extensive mechanisms for remote administration
  • Efficient key management and firmware updates via remote access
  • Automation of remote diagnosis via SNMP (Simple Network Management Protocol)

Software Simulator included

Included simulator allowing for evaluation and integration testing to benchmark the best possible solution for each specific case

Deployment options

Deployment options


On Premise

  • Useful for centralized use cases without a requirement of scalability or remote accessibility and existing legacy infrastructure
  • Defined total cost of ownership
  • Complete control on hardware and software, including configuration and upgrades
  • Secured uptime in areas with insatiable internet connectivity
  • Preferred choice in industry-segments where regulation imposes restrictions

In the Cloud

  • Strategic architectural fit & risk management for your high value assets
  • Provides flexibility, scalability and availability of HSM-as-a-service
  • Ideal for a multi-cloud strategy, supporting multi-cloud deployments & allows for migration flexibility
  • Allows you to seamlessly work with any Cloud Service Provider
  • Easy-to-use remote management and on-site key ceremony service option
  • Full control over data through  encryption key life-cycle and key administration
  • Secured data privacy through Bring-Your-Own-Key procedures


Ihre Fragen beantworten wir sehr gerne.

Wie können wir Ihnen helfen?

Sprechen Sie mit einem unserer Spezialisten und erfahren Sie, wie Utimaco Sie unterstützen kann.