Utimaco’s Hardware Security Module as a Service - hosted in a Secure, Certified Datacenter
Our General Purpose HSM as a Service provides access to a FIPS 140-2 Level 3 HSM that is fully hosted by Utimaco and under your sole remote control. This enables secure key generation, storage, and management without the need for setup, maintenance, or implementation efforts, ultimately reducing the total cost of ownership.
- HSM as a Service – hosted by UTIMACO in a secure, certified datacenter
- Secure key generation and storage in a FIPS 140-2 Level 3 certified HSM
- Works with all major cloud service providers
The HSM as a Service includes a dedicated HSM for each customer, ensuring exclusive access and full administrative privileges while providing optimal security. By opting for HSM as a Service, you significantly reduce capital and labor costs without the need for a dedicated server room, secure environment set-up, or data center selection.
Our General Purpose HSM as a Service seamlessly integrates with all major cloud service providers, making it an ideal solution for your existing cloud applications. Benefit from multiple migration options without the constraints of vendor lock-in, ensuring flexibility and ease of transition.
Try it now with our free, fully functional HSM simulator
Product Type:
As-a-serviceDelivery Time:
Key Benefits
Details
Cryptographic algorithms
- RSA, DSA, ECDSA with NIST and Brainpool curves, EdDSA
- DH, ECDH with NIST, Brainpool and Montgomery curves
- Edwards curves Ed25519 and Ed448
- AES, Triple-DES, DES
- MAC, CMAC, HMAC
- SHA-1, SHA-2, SHA-3, RIPEMD
- Hash-based deterministic random number generator (DRG.4 acc. AIS 31)
- True random number generator (PTG.2 acc. AIS 31)
- Chinese Algorithms
- Can be upgraded with blockchain-specific algorithms such as BIP32/44 and SLIP-010 on request
Cryptographic Interfaces (APIs)
- PKCS #11
- Java Cryptography Extension (JCE)
- Microsoft Crypto API (CSP), Cryptography Next Generation (CNG), and SQL
- Extensible Key Management (SQLEKM)
- OpenSSL
- Utimaco‘s comprehensive Cryptographic eXtended services Inter-face (CXI)
Hosted in a secure, carefully selected datacenter
- Hosted in an ISO/IEC 27001, HIPAA, PCI, and GSMA SAS-SM compliant data center
- Provision of all hardware and software in the datacenter
- Maintenance of equipment in the datacenter and replacing failed units
- Setup and additional hardware included
- Secure server room with dedicated HSM per customer
- All relevant security and regulatory certifications
- Current regions: Europe & Americas
Quantum Protect | Applying Quantum-resistance to applications and use cases. |
Blockchain Protect | Securing sensitive assets in blockchain processes |
Double Key Encryption | Two-tier security for the most sensitive data in Azure |
Software Development Kit | Enables custom firmware development based on algorithms and functions of choice |