Blog

ブログ

Press releases

特定のトピックのブログ投稿を検索するには、最も人気のあるキーワードのいずれかをクリックします。

a digital sign
ブログ記事

Choosing The Right Cybersecurity Tools To Comply With The Digital Operational Resilience Act (DORA)

Choosing The Right Cybersecurity Tools To Comply With The Digital Operational Resilience Act (DORA)
Compliance
ブログ記事

How To Be Prepared for the NIS2 Directive

In this article, we outline how organizations and companies can effectively prepare for NIS2 compliance.
blog-how-to-select-an-hsm
ブログ記事

How to select an HSM vendor

As the choice of HSMs is dependent on the specific application it is used for, we make some general recommendations by providing a list of potential criteria to take into account, irrespective of what you intend to use it for.
digital key on a dark background
ブログ記事

What is Key Escrow, and how can it be used properly?

Key Escrow will ensure the data you have lost, will be recoverable. Unlike an emergency cash reserve hidden under the mattress, a cryptographic Key Escrow must be established and handled properly in order to remain effective.
eInvoicing teaser
ブログ記事

eInvoicing - ensuring compliance with the EU VAT Directive

eInvoicing is a digital solution that enables public sector contractors and companies to receive and process electronic invoices that comply with the European standard.
blog-hardware-security-modules-according-to-iso-13491
ブログ記事

Hardware Security Modules According to ISO 13491 and the Relation to ANSI x9.24-1-2017

This article will examine Hardware Security Modules (HSMs) according to ISO 13491 and how their relationship to ANSI x9.24-1-2017.
blog-why-does-the-shift-from-pci-pts-v1-to-v3
ブログ記事

Why does the Shift from PCI PTS v1 to v3 and PCI PIN Security Mandate a Key Block-Oriented Architecture?

This article highlights the use of key blocks for securing cryptographic keys under the latest versions of PCI PTS and PCI PIN Security. 
blog-pci-pin-transaction-security-pts-hsm-v3-requirements
ブログ記事

PCI PIN Transaction Security (PTS) HSM v3 Requirements

HSM's are a critical component in data integrity and confidentiality assurance of business transactions. Organizations and banks employ security services such as encryption, decryption and strong authentication between identities and applications.
blog-atalla-at1000-utimacos-pci-pts-hsm-v3-compliant-hsm
ブログ記事

Atalla AT1000: Utimaco’s PCI PTS HSM v3 compliant HSM

Since the release of PCI PIN Transaction Security (PTS) Hardware Security Module (HSM) version 3.0 in June 2016, companies had started working on v3.0 compliant HSMs which is necessary for security and legal obligations.
blog-distinctive-requirements-between-pci-pts
ブログ記事

Distinctive Requirements between PCI PTS HSM v2.0 and v3.0

Since the release of PCI PIN Transaction Security (PTS) Hardware Security Module (HSM) version 3, companies have started working on v3 compliant HSMs. See the differences between v2 and v3.
blog-an-introduction-to-the-regulatory-technical-standards-part-3
ブログ記事

An Introduction to the Regulatory Technical Standards for Strong Customer Authentication – Part 3: Achieving Transactional & Account Security

eIDAS has been designed to allow for seamless (cross-border) operations while ensuring technological neutrality and flexibility in terms of how its minimum standards need to be met.
blog-an-introduction-to-the-regulatory-technical-standards-part-2
ブログ記事

An Introduction to the Regulatory Technical Standards for Strong Customer Authentication – Part 2: PSD2

eIDAS has been designed to allow for seamless (cross-border) operations while ensuring technological neutrality and flexibility in terms of how its minimum standards need to be met.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      Your collection of download requests is empty. Visit our Downloads section and select from resources such as data sheets, white papers, webinar recordings and much more.

      Downloads
      0