Blog

ブログ

Press releases

特定のトピックのブログ投稿を検索するには、最も人気のあるキーワードのいずれかをクリックします。

a women typing on laptop
Blog post

The role of TLS/SSL certificates and Certificate Authorities for online communication and identities

We explore how SSL/TLS certificates and CAs work together to create a secure online environment, the historical evolution of web security, and the potential risks when this trust is compromised.
Lawful interception Test Suite (LITS)
Blog post

The role of lawful interception activities in intelligence services, law enforcement agencies and their monitoring centers

We explore the requirements and significance of LI activities, highlighting their indispensable role in modern policing and intelligence operations.
a digital sign
Blog post

Choosing The Right Cybersecurity Tools To Comply With The Digital Operational Resilience Act (DORA)

Choosing The Right Cybersecurity Tools To Comply With The Digital Operational Resilience Act (DORA)
Trsut as a service teaser
Blog post

The As a Service Business Model - A New Way to Consume Cybersecurity

Fully managed as-a-service offerings are now at the forefront of the cybersecurity landscape.
pqc general
Blog post

Types of Post Quantum Cryptography Public Key Schemes and what to expect from the NIST Standardization Process

We're looking at the type of cryptography based on certain “hard mathematical problems” that are considered secure against quantum computers.
HSM as a root of trust
Blog post

How HSMs support secure multi-tenancy?

The use of HSMs for the security of business applications has been mandatory. To secure a large number of clients within an HSM, multi-tenant HSM architectures are getting popular as they promise robust performance.
File and Folder Encryption as a Service
Blog post

暗号化の重要性を理解する:様々な規制における使用例

データ保護と規制コンプライアンスにおける暗号化の重要な役割を探る。
 digital pattern
Blog post

Discussing NSA's Commercial National Security Algorithm Suite 2.0 against Cryptanalytically Relevant Quantum Computers

Recently, the U.S. National Security Agency (NSA) briefed NSS operators, owners and vendors on what the future requirements are for quantum-resistant algorithms.
Data protection
Blog post

5 Wichtige Aspekte für die Datensicherheit gemäß VS-NfD

Die Digitalisierung Ihrer Verwaltung erfordert digitale Sicherheitslösungen.
post quantum cryptography
Blog post

Stateful Hash-Based Signature Schemes – Hidden Champions of Post Quantum Cryptography

A light introduction to stateful hash-based signatures, their suitability for quantum-resistance and how to solve the state handling challenge.
zero trust sign on lockers
Blog post

Navigating Security: Understanding The Zero Trust Maturity Model

Zero Trust Maturity Model – a roadmap for organizations to fortify their defenses and embrace a proactive approach to security.
RSA 2024 promo graphic
Blog post

RSA 2024: The latest updates from cybersecurity’s biggest conference

The stand-out topics and industry trends, based on the presentations and the general talk around the conference.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      Utimacoのダウンロードについて

      ダウンロードセクションをご覧ください。

      パンフレット、データシート、ホワイトペーパーなどのリソースからお選びいただけます。ほぼすべての資料を直接(ダウンロードボタンをクリックして)閲覧・保存することができます。

      一部の資料については、電子メールアドレスの確認が必要です。ボタンにはEメールのアイコンがあります。

      Download via e-mail

       

      ボタンをクリックすると、オンラインフォームが開きますので、必要事項をご記入の上、送信してください。このタイプのダウンロードをいくつか収集し、1つのフォームをすべてのダウンロードに対して送信するだけで、リンクを電子メールで受け取ることができます。現在のコレクションは空です。