Blog

Blog posts

Press releases

To find blog posts with a specific topic, click on one of the most popular keywords.

Code-signing_HSM-Graphic
Blog post

The Role of HSMs in Code Signing

Code signing is a process of signing a software file with a digital signature.
digital cloud
Blog post

General Purpose HSMs as a Service securing your Cloud Environment

Discover how GP HSMaaS secures cloud infrastructure, offering enhanced cybersecurity, cost-effectiveness, and flexibility over traditional setups.
mobile payment with a credit card
Blog post

Enabling Secure Online Payments with 3D Secure and Payment HSM

In this blog, we will focus primarily on the payment authentication aspect of 3D Secure.
Data center
Blog post

The role of HSMs for Certificate Lifecycle Management

We explore why robust certificate lifecycle management is crucial for sustaining trust in growing networks.
a girl is holding a phone
Blog post

The Role of HSMs for Digital Signatures

The standards mandated by eIDAS work to ensure the integrity of electronic signatures. However, what is also mandated is the need for sufficiently protecting the cryptographic processes.
man holding a phone
Blog post

Why African Countries Urgently Need Public Warning Systems and How to Implement Them

We explore why public warning systems are essential for African countries and what it takes to establish and operate them effectively.
HSMaaS
Blog post

General Purpose HSMs as a Service explained: Unique Capabilities of the as a Service Deployment Model

General Purpose Hardware Security Modules (HSMs) are highly secure, physical devices designed to perform a variety of cryptographic operations.
digital cloud
Blog post

 How to Secure Your Cloud-stored Data with Data Encryption

Shift to cloud-stored data is inevitable for business success; however, your data might not be as secure as you may assume.
somebody is clicking on the phone
Blog post

Understanding the Role of Hardware Security Modules in Public Key Infrastructure (PKI)

Public key infrastructure protects communications between users and website servers. The underlying Hardware Security Modules are the root of trust which protect PKI from being breached.
Digital Cloud Network
Blog post

Achieve Robust Cloud Security: Implementing the Gold Standard for all Cloud Deployment Models

Implementing the Gold Standard for all Cloud Deployment Models
POS
Blog post

Point-of-Sale (POS) Security: Utilizing Cryptographic Keys for Payment Security in Retail

Point-of-sale (POS) terminals are the essential backbone of modern businesses, from bustling restaurants to dynamic retail merchants.
NIS2 compliance Teaser
Blog post

The role of cryptography and encryption in NIS2

The NIS2 Directive aims to improve risk management, incident response, and information sharing among essential service providers and digital infrastructure.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      About Utimaco's Downloads

      Visit our Downloads section and select from resources such as brochures, data sheets, white papers and much more. You can view and save almost all of them directly (by clicking the download button).

      For some documents, your e-mail address needs to be verified. The button contains an e-mail icon.

      Download via e-mail

       

      A click on such a button opens an online form which we kindly ask you to fill and submit. You can collect several downloads of this type and receive the links via e-mail by simply submitting one form for all of them. Your current collection is empty.