Blog

ブログ

Press releases

特定のトピックのブログ投稿を検索するには、最も人気のあるキーワードのいずれかをクリックします。

 digital pattern
Blog post

Understanding and planning for a post-quantum security ecosystem

Although we cannot predict exactly when digital crime will become a threat, we can realistically expect that the majority of companies will have at least five years to prepare.
numbers on a black background
Blog post

Concrete Applications of Tokenization in Payment Processes (2/2)

In this article, we describe various applications of tokenization in card-not-present transactions – when plastic cards become digital tokens.
digital key on a dark background
Blog post

What is Key Escrow, and how can it be used properly?

Key Escrow will ensure the data you have lost, will be recoverable. Unlike an emergency cash reserve hidden under the mattress, a cryptographic Key Escrow must be established and handled properly in order to remain effective.
digital key on a dark background
Blog post

Encryption, Key Escrow and Cryptographic Key management in the Cloud  

As the world moves forward, we are forced to address availability of both personnel and physical resources. The Cloud seems like the ideal solution. But how do we find assurance that our data is secure if our infrastructure is now in the cloud?
numbers on a black background
Blog post

The main principles of Tokenization and application to payments (1/2)

In this article, we outline and explain the principles behind tokenization and how this is used by financial institutions in transaction processing all over the world.
Blog Time is Money
Blog post

Banking & Payments: How Buy Now, Pay Later is Redefining the Payment Landscape

As Buy Now, Pay Later levels of growth are only set to increase, banks should take note of the growth that is anticipated in the next generation of consumers.
Keymanagement for walltes, blockchain
Blog post

Key management for wallets/blockchain

When dealing with cryptocurrencies and blockchain applications, users and companies are directly or indirectly forced to deal with cryptography.
blog-from-egde-to-fog-to-cloud
Blog post

From edge to fog to cloud

In the last few months, edge and fog computing in the Industrial IoT have become a hype topic. But what is the truth behind the hype? And does edge and fog computing really solve the major challenges of the future?
Absicherung von Medizingeräten
Blog post

IT security requirements and tools for securing the functional security of medical devices

Functional safety is an important aspect of the approval of medical devices. The aim of functional safety is to design medical devices in such a way that any probable technical malfunction is detected in advance and does not pose a risk to humans.
eInvoicing teaser
Blog post

eInvoicing - ensuring compliance with the EU VAT Directive

eInvoicing is a digital solution that enables public sector contractors and companies to receive and process electronic invoices that comply with the European standard.
chip shortage
Blog post

How Utimaco is addressing the global supply chain chip shortage

The severity of the global chip shortage has disrupted companies throughout 2021 and as we enter 2022, the shortage isn’t going to disappear. As a result, the current processor-chip shortage and supply-chain disruption may have a long-term impact on price and availability.
payment card with digital wires
Blog post

Understanding the Role of Hardware Security Modules in Fleet Cards

Fleet cards are given by a company to their employees; for example, truck drivers delivering the company’s goods to where they will be sold. Here we will explain how fleet cards/fuel cards work and the role that hardware security modules can play in providing more secure features for these cards under PCI-DSS compliance.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      Utimacoのダウンロードについて

      ダウンロードセクションをご覧ください。

      パンフレット、データシート、ホワイトペーパーなどのリソースからお選びいただけます。ほぼすべての資料を直接(ダウンロードボタンをクリックして)閲覧・保存することができます。

      一部の資料については、電子メールアドレスの確認が必要です。ボタンにはEメールのアイコンがあります。

      Download via e-mail

       

      ボタンをクリックすると、オンラインフォームが開きますので、必要事項をご記入の上、送信してください。このタイプのダウンロードをいくつか収集し、1つのフォームをすべてのダウンロードに対して送信するだけで、リンクを電子メールで受け取ることができます。現在のコレクションは空です。