Use case

Blog

Blog posts

Press releases

To find blog posts with a specific topic, click on one of the most popular keywords.

blog-why-is-the-design-of-notary-services-in-permissioned-blockchains
Blog post

Why is the Design of Notary Services in Permissioned Blockchains Key to Their Success in Banking?

What is a Notary Service in a Blockchain Network? A notary system is at the root of blockchain, where transactions need to be time-stamped by a trusted authority.
blog-understanding-the-atalla-command-language
Blog post

Understanding the Atalla Command Language

Atalla has created a way to communicate with HSMs in a very smart way. In this article, we will discuss the Atalla Command Language.
blog-using-blockchains-and-ecosystem-integrated-hsms
Blog post

Using Blockchains and Ecosystem-Integrated HSMs to achieve Compliant Digital Identity Security

In this article, we shall analyze the way blockchain technology can improve data protection and create a better, and smarter digital identity when used with HSMs.
blog-nists-hybrid-mode-approach-to-post-quantum-computing
Blog post

NIST's Hybrid Mode Approach to Post-Quantum Computing - why crypto agility is crucial

The importance of cryptography has acquired considerable prominence due to the requirement of security mechanisms such as confidentiality, integrity, authenticity, and non-repudiation in modern data communications.
blog-utimaco-eskm-and-the-data-centric-security-problem
Blog post

Utimaco ESKM and the Data-Centric Security Problem

Data-centric security is a general concept of software and IT architecture where the data are at the center of the system and prevail over application and network.
blog-utimaco-atalla-at1000-and-pin-translation
Blog post

Utimaco Atalla AT1000 and PIN Translation

There are different environments that may exist around pin translation and what they are used for.
blog-an-introduction-to-the-regulatory-technical-standards-part-3
Blog post

An Introduction to the Regulatory Technical Standards for Strong Customer Authentication – Part 3: Achieving Transactional & Account Security

eIDAS has been designed to allow for seamless (cross-border) operations while ensuring technological neutrality and flexibility in terms of how its minimum standards need to be met.
blog-an-introduction-to-the-regulatory-technical-standards-part-2
Blog post

An Introduction to the Regulatory Technical Standards for Strong Customer Authentication – Part 2: PSD2

eIDAS has been designed to allow for seamless (cross-border) operations while ensuring technological neutrality and flexibility in terms of how its minimum standards need to be met.
blog-an-introduction-to-the-regulatory-technical-standards-part-1
Blog post

An Introduction to the Regulatory Technical Standards for Strong Customer Authentication – Part 1: eIDAS

eIDAS has been designed to allow for seamless (cross-border) operations while ensuring technological neutrality and flexibility in terms of how its minimum standards need to be met.
blog-the-pci-pts-hsm-v1-expires-guidelines
Blog post

The PCI PTS HSM v1 expires - Guidelines for the Transition Towards v3

HSMs are importand for enterprises for the protection of clients and business transactions. This article enlightens the expiry of version 1.0 of the PCI PTS HSM validation and the latest standard available version 3.0.
blog-eidas-psd2-the-new-payments-industry-paradigm-in-europe
Blog post

eiDAS & PSD2 - The New Payments Industry Paradigm in Europe

The Revised Payment Services Directive (PSD2) is poised to revolutionize the payment services industry. When it comes to payment transactions, the key elements of Strong Customer Authentication must be achieved.
blog-open-banking-the-3-main-focus-areas-for-banks-and-fintech
Blog post

Open Banking  - The 3 Main Focus Areas for Banks and FinTech

2019 has set the stage for the next round of the match-up between Banks and FinTechs and the requirements for Strong Customer Authentication will come into play.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      About Utimaco's Downloads

      Visit our Downloads section and select from resources such as brochures, data sheets, white papers and much more. You can view and save almost all of them directly (by clicking the download button).

      For some documents, your e-mail address needs to be verified. The button contains an e-mail icon.

      Download via e-mail

       

      A click on such a button opens an online form which we kindly ask you to fill and submit. You can collect several downloads of this type and receive the links via e-mail by simply submitting one form for all of them. Your current collection is empty.