Blog

Entradas de blog

Press releases

Para encontrar entradas de blog con un tema específico, haga clic en una de las palabras clave más populares.

a digital sign
Entrada de blog

Choosing The Right Cybersecurity Tools To Comply With The Digital Operational Resilience Act (DORA)

Choosing The Right Cybersecurity Tools To Comply With The Digital Operational Resilience Act (DORA)
blog-how-to-select-an-hsm
Entrada de blog

How to select an HSM vendor

As the choice of HSMs is dependent on the specific application it is used for, we make some general recommendations by providing a list of potential criteria to take into account, irrespective of what you intend to use it for.
digital key on a dark background
Entrada de blog

What is Key Escrow, and how can it be used properly?

Key Escrow will ensure the data you have lost, will be recoverable. Unlike an emergency cash reserve hidden under the mattress, a cryptographic Key Escrow must be established and handled properly in order to remain effective.
eInvoicing teaser
Entrada de blog

eInvoicing - ensuring compliance with the EU VAT Directive

eInvoicing is a digital solution that enables public sector contractors and companies to receive and process electronic invoices that comply with the European standard.
blog-hardware-security-modules-according-to-iso-13491
Entrada de blog

Hardware Security Modules According to ISO 13491 and the Relation to ANSI x9.24-1-2017

This article will examine Hardware Security Modules (HSMs) according to ISO 13491 and how their relationship to ANSI x9.24-1-2017.
blog-why-does-the-shift-from-pci-pts-v1-to-v3
Entrada de blog

Why does the Shift from PCI PTS v1 to v3 and PCI PIN Security Mandate a Key Block-Oriented Architecture?

This article highlights the use of key blocks for securing cryptographic keys under the latest versions of PCI PTS and PCI PIN Security. 
blog-pci-pin-transaction-security-pts-hsm-v3-requirements
Entrada de blog

PCI PIN Transaction Security (PTS) HSM v3 Requirements

HSM's are a critical component in data integrity and confidentiality assurance of business transactions. Organizations and banks employ security services such as encryption, decryption and strong authentication between identities and applications.
blog-atalla-at1000-utimacos-pci-pts-hsm-v3-compliant-hsm
Entrada de blog

Atalla AT1000: Utimaco’s PCI PTS HSM v3 compliant HSM

Since the release of PCI PIN Transaction Security (PTS) Hardware Security Module (HSM) version 3.0 in June 2016, companies had started working on v3.0 compliant HSMs which is necessary for security and legal obligations.
blog-distinctive-requirements-between-pci-pts
Entrada de blog

Distinctive Requirements between PCI PTS HSM v2.0 and v3.0

Since the release of PCI PIN Transaction Security (PTS) Hardware Security Module (HSM) version 3, companies have started working on v3 compliant HSMs. See the differences between v2 and v3.
blog-an-introduction-to-the-regulatory-technical-standards-part-3
Entrada de blog

An Introduction to the Regulatory Technical Standards for Strong Customer Authentication – Part 3: Achieving Transactional & Account Security

eIDAS has been designed to allow for seamless (cross-border) operations while ensuring technological neutrality and flexibility in terms of how its minimum standards need to be met.
blog-an-introduction-to-the-regulatory-technical-standards-part-2
Entrada de blog

An Introduction to the Regulatory Technical Standards for Strong Customer Authentication – Part 2: PSD2

eIDAS has been designed to allow for seamless (cross-border) operations while ensuring technological neutrality and flexibility in terms of how its minimum standards need to be met.
blog-an-introduction-to-the-regulatory-technical-standards-part-1
Entrada de blog

An Introduction to the Regulatory Technical Standards for Strong Customer Authentication – Part 1: eIDAS

eIDAS has been designed to allow for seamless (cross-border) operations while ensuring technological neutrality and flexibility in terms of how its minimum standards need to be met.

¿En qué podemos ayudarle?

Hable con uno de nuestros especialistas y descubra cómo Utimaco puede ayudarle hoy mismo.
Ha seleccionado dos tipos diferentes de Download, por lo que necesita presentar formularios diferentes que puede seleccionar a través de las dos pestañas.

Su(s) solicitud(es) de Download:

    Al enviar el siguiente formulario, recibirá enlaces a las descargas seleccionadas.

    Su(s) solicitud(es) de Download:

      Para este tipo de documentos, es necesario verificar su dirección de correo electrónico. Recibirá los enlaces a las Download seleccionadas por correo electrónico después de enviar el siguiente formulario.

      Su colección de solicitudes de Download está vacía. Visite nuestra sección Download y seleccione recursos como fichas técnicas, White Paper, grabaciones de seminarios web y mucho más.

      Downloads