Blog

Blog posts

Press releases

To find blog posts with a specific topic, click on one of the most popular keywords.

blog-how-to-select-an-hsm
Blog post

How to select an HSM vendor

As the choice of HSMs is dependent on the specific application it is used for, we make some general recommendations by providing a list of potential criteria to take into account, irrespective of what you intend to use it for.
laptop with bank and atm icons
Blog post

An Introduction to Payments as a Service

Explaining Payments as a Service and how PSD2 is paving the way to make payments easier and enhancing protections for consumers.
ABI Research awards
Blog post

Utimaco named the Overall Leader and Top Implementer in the HSM Market by ABI Research

The latest Hardware Security Module, OEM competitive assessment by global technology intelligence firm ABI Research, announced Utimaco as the overall leader in the HSM market.
a man checking his phone
Blog post

UK e-commerce Businesses - Are you ready for the Strong Customer Authentication (SCA) Deadline?

Organizations with an online presence must ensure that they are fully prepared for Strong Customer Authentication (SCA) compliance for e-commerce transactions.
skyscrapers
Blog post

Banking as a Service – With the Right Technical Foundation a Scalable Digital End-to-End Opportunity Exists

This article explains the concept of Banking-as-a-Service and how with the right technical foundation incumbent banks can benefit.
 digital pattern
Blog post

Understanding and planning for a post-quantum security ecosystem

Although we cannot predict exactly when digital crime will become a threat, we can realistically expect that the majority of companies will have at least five years to prepare.
numbers on a black background
Blog post

Concrete Applications of Tokenization in Payment Processes (2/2)

In this article, we describe various applications of tokenization in card-not-present transactions – when plastic cards become digital tokens.
digital key on a dark background
Blog post

What is Key Escrow, and how can it be used properly?

Key Escrow will ensure the data you have lost, will be recoverable. Unlike an emergency cash reserve hidden under the mattress, a cryptographic Key Escrow must be established and handled properly in order to remain effective.
digital key on a dark background
Blog post

Encryption, Key Escrow and Cryptographic Key management in the Cloud  

As the world moves forward, we are forced to address availability of both personnel and physical resources. The Cloud seems like the ideal solution. But how do we find assurance that our data is secure if our infrastructure is now in the cloud?
numbers on a black background
Blog post

The main principles of Tokenization and application to payments (1/2)

In this article, we outline and explain the principles behind tokenization and how this is used by financial institutions in transaction processing all over the world.
Blog Time is Money
Blog post

Banking & Payments: How Buy Now, Pay Later is Redefining the Payment Landscape

As Buy Now, Pay Later levels of growth are only set to increase, banks should take note of the growth that is anticipated in the next generation of consumers.
Keymanagement for walltes, blockchain
Blog post

Key management for wallets/blockchain

When dealing with cryptocurrencies and blockchain applications, users and companies are directly or indirectly forced to deal with cryptography.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      About Utimaco's Downloads

      Visit our Downloads section and select from resources such as brochures, data sheets, white papers and much more. You can view and save almost all of them directly (by clicking the download button).

      For some documents, your e-mail address needs to be verified. The button contains an e-mail icon.

      Download via e-mail

       

      A click on such a button opens an online form which we kindly ask you to fill and submit. You can collect several downloads of this type and receive the links via e-mail by simply submitting one form for all of them. Your current collection is empty.