Blog

Blog posts

Press releases

To find blog posts with a specific topic, click on one of the most popular keywords.

Michael Engel (Diebold-Nixdorf) - Encrypting Retail Banking Services for End-to-End Security (video)
Blog post

Michael Engel (Diebold-Nixdorf) - Encrypting Retail Banking Services for End-to-End Security (video)

In this video, Michael Engel explains, why he is partners with Utimaco for that critical element of encryption technology in the financial services across the globe.
blog-atalla-secure-configuration-assistant-hyper-security
Blog post

The Atalla Secure Configuration Assistant and Concepts of Hyper-Security

The Atalla Secure Configuration Assistant, also named the SCA-W, is a secure system dedicated to interfacing Atalla HSMs.
blog-integration-automation-open-api
Blog post

Integration, Automation and Open API in Banking Infrastructure to Accelerate Service Innovation - How Crypto paves the way

Banks have started a process of reinventing their value proposition as a highly automated and integrated platform for a continuously innovating portfolio of financial services. Payment is key to this and is threat by external market entrants.
blog-permissioned-blockchains-technology-and-security-aspects
Blog post

Permissioned Blockchains for Banking - Understanding the Technology and Security Aspects

The banking industry is currently rolling out several permissioned blockchain projects.
blog-an-introduction-to-the-regulatory-technical-standards-part-3
Blog post

An Introduction to the Regulatory Technical Standards for Strong Customer Authentication – Part 3: Achieving Transactional & Account Security

eIDAS has been designed to allow for seamless (cross-border) operations while ensuring technological neutrality and flexibility in terms of how its minimum standards need to be met.
blog-an-introduction-to-the-regulatory-technical-standards-part-2
Blog post

An Introduction to the Regulatory Technical Standards for Strong Customer Authentication – Part 2: PSD2

eIDAS has been designed to allow for seamless (cross-border) operations while ensuring technological neutrality and flexibility in terms of how its minimum standards need to be met.
blog-an-introduction-to-the-regulatory-technical-standards-part-1
Blog post

An Introduction to the Regulatory Technical Standards for Strong Customer Authentication – Part 1: eIDAS

eIDAS has been designed to allow for seamless (cross-border) operations while ensuring technological neutrality and flexibility in terms of how its minimum standards need to be met.
blog-eidas-advantages-of-qes-compared-to-aes-and-where-qes-is-vital
Blog post

“Ability” – Best Practices For Encryption Key Management

Read six best practices to consider with an encryption solution and its centralized key manager. Use a key manager to minimize the risk of a network or single point of failure and avoid large impacts on overall data security.
blog-hsm-as-a-service-pci-dss-requirements
Blog post

HSM as a Service – meeting PCI data security standards

Looking at the cost of PCI-DSS compliance and how HSM as a Service can help FinTech companies really save on those compliance costs while still making use of the best-in-class security mechanisms.
PSD2 and HSM-as-a-Service
Blog post

PSD2 and HSM as a Service - part 3 - the opportunity for banks

The Revised Payment Services Directive (PSD2) mandates certain changes that has the potential to significantly alter how the payments industry operates in the EU.
PSD2 and HSM-as-a-Service
Blog post

PSD2 and HSM as a Service - part 2: FinTech opportunities

In this article, we look at the potential opportunities that this creates for FinTech companies and other Third-Party Partners (TPPs).
PSD2 and HSM as a Service
Blog post

PSD2 and HSM as a Service - part 1: leveling the playing field

Payment Services Directive (PSD2) mandates certain changes that has the potential to significantly alter how the payments industry operates in the EU.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      Your collection of download requests is empty. Visit our Downloads section and select from resources such as data sheets, white papers, webinar recordings and much more. 

      Downloads

       

      0