Blog

Entradas de blog

Press releases

Para encontrar entradas de blog con un tema específico, haga clic en una de las palabras clave más populares.

pqc general
Blog post

Types of Post Quantum Cryptography Public Key Schemes and what to expect from the NIST Standardization Process

We're looking at the type of cryptography based on certain “hard mathematical problems” that are considered secure against quantum computers.
HSM as a root of trust
Blog post

How HSMs support secure multi-tenancy?

The use of HSMs for the security of business applications has been mandatory. To secure a large number of clients within an HSM, multi-tenant HSM architectures are getting popular as they promise robust performance.
File and Folder Encryption as a Service
Blog post

Comprendiendo la importancia del cifrado: Casos de uso para diversas regulaciones

Explore el papel fundamental del cifrado en la protección de datos y el cumplimiento de la normativa.
 digital pattern
Blog post

Discussing NSA's Commercial National Security Algorithm Suite 2.0 against Cryptanalytically Relevant Quantum Computers

Recently, the U.S. National Security Agency (NSA) briefed NSS operators, owners and vendors on what the future requirements are for quantum-resistant algorithms.
a digital key
Blog post

Las 5 consideraciones más importantes para elegir proveedor para la migración de administración de claves criptográficas

La migración a un nuevo sistema de gestión de claves (KMS) puede ofrecer una mayor seguridad, conformidad y eficacia operativa.
Data protection
Blog post

5 Wichtige Aspekte für die Datensicherheit gemäß VS-NfD

Die Digitalisierung Ihrer Verwaltung erfordert digitale Sicherheitslösungen.
post quantum cryptography
Blog post

Stateful Hash-Based Signature Schemes – Hidden Champions of Post Quantum Cryptography

A light introduction to stateful hash-based signatures, their suitability for quantum-resistance and how to solve the state handling challenge.
zero trust sign on lockers
Blog post

Navigating Security: Understanding The Zero Trust Maturity Model

Zero Trust Maturity Model – a roadmap for organizations to fortify their defenses and embrace a proactive approach to security.
RSA 2024 promo graphic
Blog post

RSA 2024: The latest updates from cybersecurity’s biggest conference

The stand-out topics and industry trends, based on the presentations and the general talk around the conference.
defense
Blog post

The Triple Defense: Zero Trust, TLS with Mutual Authentication, and HSMs Join Forces

These joined forces are changing the way we protect our digital assets, ensuring that trust is earned, not assumed.
pqc general
Blog post

Preparing for the Post Quantum World: Key Insights for Cybersecurity Professionals

As quantum computers become capable of breaking asymmetric cryptographic algorithms that underpin our digital security, there is a need for new, quantum-resistant standards.
HSM shield
Blog post

11 razones por las que los HSM de Propósito General de Utimaco son la mejor opción

We continuously innovate to provide products, solutions, and services that uphold the highest levels of security and certification.

¿En qué podemos ayudarle?

Hable con uno de nuestros especialistas y descubra cómo Utimaco puede ayudarle hoy mismo.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      About Utimaco's Downloads

      Visit our Downloads section and select from resources such as brochures, data sheets, white papers and much more. You can view and save almost all of them directly (by clicking the download button).

      For some documents, your e-mail address needs to be verified. The button contains an e-mail icon.

      Download via e-mail

       

      A click on such a button opens an online form which we kindly ask you to fill and submit. You can collect several downloads of this type and receive the links via e-mail by simply submitting one form for all of them. Your current collection is empty.