Blog

Entradas de blog

Press releases

Lawful interception Test Suite (LITS)
Entrada de blog

The role of lawful interception activities in intelligence services, law enforcement agencies and their monitoring centers

We explore the requirements and significance of LI activities, highlighting their indispensable role in modern policing and intelligence operations.
Trsut as a service teaser
Entrada de blog

The As a Service Business Model - A New Way to Consume Cybersecurity

Fully managed as-a-service offerings are now at the forefront of the cybersecurity landscape.
Utimaco and InfoSec Global
Entrada de blog

The Looming Quantum Migration: Why Cryptography Inventory is Essential

The cryptography landscape is on the verge of a seismic shift. The rise of quantum computing threatens to render these classical algorithms obsolete.
pqc general
Entrada de blog

Types of Post Quantum Cryptography Public Key Schemes and what to expect from the NIST Standardization Process

We're looking at the type of cryptography based on certain “hard mathematical problems” that are considered secure against quantum computers.
File and Folder Encryption as a Service
Entrada de blog

Comprendiendo la importancia del cifrado: Casos de uso para diversas regulaciones

Explore el papel fundamental del cifrado en la protección de datos y el cumplimiento de la normativa.
 digital pattern
Entrada de blog

Discussing NSA's Commercial National Security Algorithm Suite 2.0 against Cryptanalytically Relevant Quantum Computers

Recently, the U.S. National Security Agency (NSA) briefed NSS operators, owners and vendors on what the future requirements are for quantum-resistant algorithms.
a digital key
Entrada de blog

Las 5 consideraciones más importantes para elegir proveedor para la migración de administración de claves criptográficas

La migración a un nuevo sistema de gestión de claves (KMS) puede ofrecer una mayor seguridad, conformidad y eficacia operativa.
Data protection
Entrada de blog

5 Wichtige Aspekte für die Datensicherheit gemäß VS-NfD

Die Digitalisierung Ihrer Verwaltung erfordert digitale Sicherheitslösungen.

¿En qué podemos ayudarle?

Hable con uno de nuestros especialistas y descubra cómo Utimaco puede ayudarle hoy mismo.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      About Utimaco's Downloads

      Visit our Downloads section and select from resources such as brochures, data sheets, white papers and much more. You can view and save almost all of them directly (by clicking the download button).

      For some documents, your e-mail address needs to be verified. The button contains an e-mail icon.

      Download via e-mail

       

      A click on such a button opens an online form which we kindly ask you to fill and submit. You can collect several downloads of this type and receive the links via e-mail by simply submitting one form for all of them. Your current collection is empty.