Use case

Blog

Blog posts

Press releases

To find blog posts with a specific topic, click on one of the most popular keywords.

blog-root-of-trust-iot
Blog post

Root of trust in the Internet of things: interview at cloud computing expo

Interview regarding the role of HSMs as a root of trust in the Internet of Things at a Cloud Computing Expo in Santa Clara, CA
blog-making-security-a-priority
Blog post

Making security a priority in connected cars

The growing number of Internet-connected devices and accessories in the connected car opens it up to new potential points of attack for cybercriminals.
blog-eidas-regulation
Blog post

eIDAS regulation: do not make the wrong choice when you are picking your HSM

Advances in financial technology are transforming banking as we know it and this spark innovation is changing the approach of this historically traditional sector.
blog-intelligent-banking
Blog post

Intelligent banking needs a cybersecurity edge

Advances in financial technology are transforming banking as we know it and this spark innovation is changing the approach of this historically traditional sector.
blog-the-higher-purpose-of-eidas
Blog post

The higher purpose of eIDAS: supporting the european digital single market

While it still presents a challenge to many businesses and government institutions, the greater idea behind eIDAS is to strive towards a true digital single market in Europe.
blog-local-vs-remote-signing
Blog post

Local vs. remote signing and sealing according to eIDAS

One of the eIDAS objectives is the creation of a European market for electronic trust services with the same legal status and validity as paper-based processes – consistently applied across all member states.
Sole control of one’s signing keys under eIDAS
Blog post

Sole control of one’s signing keys under eIDAS

This blog post takes a look at the details of sole control. Which is the principle that ensures the signer – and no one else but the signer – has access to her/his signing key and can initiate a digital signature.
blog-why-businesses-cannot-ignore
Blog post

Why businesses can’t ignore crypto agility - facing the facts before we’re in a post-quantum world

Today’s encryption algorithms, when pitted against quantum tools, will be considerably less resilient and leave huge amounts of data vulnerable as a result.
What are the common criteria for HSMs
Blog post

What are the common criteria for hardware security modules (HSMs)?

All the critical banking and payment systems incorporate Hardware Security Modules (HSMs) for the protection of user information and business transactions.
HSM to cloud geobridge
Blog post

Moving Your HSMs To The Cloud

Enterprises, especially those who manage sites in multiple geographical locations, have the most to gain by centralizing and virtualizing their HSM resources.
Quo vadis it-sa?
Blog post

Quo vadis it-sa?

it-sa is considered one of Europe´s largest IT security fairs, has grown tremendously and attracts more and more foreign guests as well.
pci hsm certificate
Blog post

What is the PCI-HSM certification?

As new threats emerge on a daily basis, it is critical for CIOs, CISOs, and IT Managers to ensure they remain diligent when it comes to safeguarding their environments.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      About Utimaco's Downloads

      Visit our Downloads section and select from resources such as brochures, data sheets, white papers and much more. You can view and save almost all of them directly (by clicking the download button).

      For some documents, your e-mail address needs to be verified. The button contains an e-mail icon.

      Download via e-mail

       

      A click on such a button opens an online form which we kindly ask you to fill and submit. You can collect several downloads of this type and receive the links via e-mail by simply submitting one form for all of them. Your current collection is empty.