Blog

Entradas de blog

Press releases

Para encontrar entradas de blog con un tema específico, haga clic en una de las palabras clave más populares.

blog-distinctive-requirements-between-pci-pts
Entrada de blog

Distinctive Requirements between PCI PTS HSM v2.0 and v3.0

Since the release of PCI PIN Transaction Security (PTS) Hardware Security Module (HSM) version 3, companies have started working on v3 compliant HSMs. See the differences between v2 and v3.
blog-technical-and-financial-advantages-of-permissioned-blockchains
Entrada de blog

The Key Role of HSMs and Key Management in Secure Permissioned Blockchains for Banking and Payment Services - An Overview

Blockchains are ruled almost entirely by cryptographic mechanisms. These mechanisms mostly involve digital signatures & PKI, hashes, and key derivation.
blog-permissioned-blockchains-technology-and-security-aspects
Entrada de blog

Permissioned Blockchains for Banking - Understanding the Technology and Security Aspects

The banking industry is currently rolling out several permissioned blockchain projects.
blog-why-are-permissioned-blockchains-a-great-fit-for-banking
Entrada de blog

Why Are Permissioned Blockchains a Great Fit for Banking - A Case Study of the Corda Architecture

Permissioned blockchain networks are blockchain networks that are not public, e.g., they require users to apply for membership in order to gain access to them. Such blockchain networks use specific software to operate.
blog-why-is-the-design-of-notary-services-in-permissioned-blockchains
Entrada de blog

Why is the Design of Notary Services in Permissioned Blockchains Key to Their Success in Banking?

What is a Notary Service in a Blockchain Network? A notary system is at the root of blockchain, where transactions need to be time-stamped by a trusted authority.
blog-understanding-the-atalla-command-language
Entrada de blog

Understanding the Atalla Command Language

Atalla has created a way to communicate with HSMs in a very smart way. In this article, we will discuss the Atalla Command Language.
blog-using-blockchains-and-ecosystem-integrated-hsms
Entrada de blog

Using Blockchains and Ecosystem-Integrated HSMs to achieve Compliant Digital Identity Security

In this article, we shall analyze the way blockchain technology can improve data protection and create a better, and smarter digital identity when used with HSMs.
blog-nists-hybrid-mode-approach-to-post-quantum-computing
Entrada de blog

NIST's Hybrid Mode Approach to Post-Quantum Computing - why crypto agility is crucial

The importance of cryptography has acquired considerable prominence due to the requirement of security mechanisms such as confidentiality, integrity, authenticity, and non-repudiation in modern data communications.
blog-utimaco-eskm-and-the-data-centric-security-problem
Entrada de blog

Utimaco ESKM and the Data-Centric Security Problem

Data-centric security is a general concept of software and IT architecture where the data are at the center of the system and prevail over application and network.
blog-utimaco-atalla-at1000-and-pin-translation
Entrada de blog

Utimaco Atalla AT1000 and PIN Translation

There are different environments that may exist around pin translation and what they are used for.
blog-the-pci-pts-hsm-v1-expires-guidelines
Entrada de blog

The PCI PTS HSM v1 expires - Guidelines for the Transition Towards v3

HSMs are importand for enterprises for the protection of clients and business transactions. This article enlightens the expiry of version 1.0 of the PCI PTS HSM validation and the latest standard available version 3.0.
blog-eidas-psd2-the-new-payments-industry-paradigm-in-europe
Entrada de blog

eiDAS & PSD2 - The New Payments Industry Paradigm in Europe

The Revised Payment Services Directive (PSD2) is poised to revolutionize the payment services industry. When it comes to payment transactions, the key elements of Strong Customer Authentication must be achieved.

¿En qué podemos ayudarle?

Hable con uno de nuestros especialistas y descubra cómo Utimaco puede ayudarle hoy mismo.
Ha seleccionado dos tipos diferentes de Download, por lo que necesita presentar formularios diferentes que puede seleccionar a través de las dos pestañas.

Su(s) solicitud(es) de Download:

    Al enviar el siguiente formulario, recibirá enlaces a las descargas seleccionadas.

    Su(s) solicitud(es) de Download:

      Para este tipo de documentos, es necesario verificar su dirección de correo electrónico. Recibirá los enlaces a las Download seleccionadas por correo electrónico después de enviar el siguiente formulario.

      Descargas de Utimaco

      Visite nuestra sección de descargas y seleccione recursos como folletos, fichas técnicas, libros blancos y mucho más. Puede ver y guardar casi todos ellos directamente (pulsando el botón de descarga).

      Para algunos documentos, es necesario verificar su dirección de correo electrónico. El botón contiene un icono de correo electrónico.

      Download via e-mail

      Al hacer clic en dicho botón se abre un formulario en línea que le rogamos rellene y envíe. Puede recopilar varias descargas de este tipo y recibir los enlaces por correo electrónico simplemente enviando un formulario para todas ellas. Su colección actual está vacía.