Blog

Blog posts

Press releases

To find blog posts with a specific topic, click on one of the most popular keywords.

Cloud & Cloud Service Providers Data Security in the Cloud
Blog post

The Importance of Data Encryption on Public Cloud Platforms - How to Secure Your Information in the Cloud

Reliance on public cloud platforms for storing, sharing and accessing data has become increasingly prevalent. This data is, however, not as private as users may assume.
Zero Trust Exploits
Blog post

Zero Day Exploits in business software - How to Prepare for, React to and Prevent Disaster

In this article, we look at Zero Day Exploits - cyber attacks that target software vulnerabilities that are unknown to the software or antivirus vendors.
zero trust sign on lockers
Blog post

Data Encryption & Access Management in ZeroTrust

In this article, we explore two vital concepts – Data Encryption and Access Management and how both are critical to a successful Zero Trust strategy.
IDC Studie Cybersecurity
Blog post

Five Questions to Stefan Auerbach on the Business Value of Cybersecurity and What Actions to Take

This interview with Stefan Auerbach, CEO of Utimaco, was conducted by IDC, and was first published in the IDC Executive Brief: Cybersecurity in Germany, Austria, and Switzerland 2022.
digital key on a dark background
Blog post

Encryption, Key Escrow and Cryptographic Key management in the Cloud  

As the world moves forward, we are forced to address availability of both personnel and physical resources. The Cloud seems like the ideal solution. But how do we find assurance that our data is secure if our infrastructure is now in the cloud?
locker icons
Blog post

Understanding the Role of Hardware Security Modules in Symmetric Key Encryption

Organizations face an ever-present risk of data breaches as digital transformations continue to flourish in the business scape. Encryption plays a critical part in mitigating business risks and keeping data safe.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      Your collection of download requests is empty. Visit our Downloads section and select from resources such as data sheets, white papers, webinar recordings and much more. 

      Downloads

       

      0