Use case

News & Events

News

Press Releases

Current Press Releases

Press Release
Press Release
Press release

Utimaco announces Veeam Ready qualification to provide next level security for digital backups

Combining Robust AI-Driven Backup Solutions with Centralized Enterprise Key Management to address security and regulatory compliance requirements for modern backup environments.
Press Release
Press Release
Press release

Digital security at a turning point: three critical security trends for 2026

Digital security is entering a new era—where digital sovereignty, post-quantum cryptography, and AI-ready data protection will define who stays resilient in 2026 and beyond.
Press Release Spain
Press release

The CCN certifies the security of Utimaco's HSM with Common Criteria

El CCN, Centro Criptológico Nacional de España, avala la seguridad de los HSMs de Utimaco a través de la certificación Common Criteria,
Press Release Spain
Press release

Los algoritmos Quantum Protect de Utimaco superan con éxito las pruebas del NIST.

Utimaco ha anunciado que sus algoritmos Post-Quantum Crypto LMS, ML-KEM y ML-DSA han superado las pruebas CAVP del NIST, certificando la seguridad a prueba de futuro de su paquete «Quantum Protect» basado en HSM.
Press Release
Press Release
Press release

Utimaco’s Quantum Protect algorithms successfully passed NIST testing

Utimaco successfully passed the CAVP testing by the National Institute of Standards and Technology (NIST).
Press Release
Press Release
Press release

Utimaco Enhances Data Sovereignty for Microsoft Azure users with Enterprise Key Manager as a Service

With EKMaaS, public sector, governments, and enterprises gain full control of their encryption keys ensuring compliance and safeguarding data sovereignty.
Press Release
Press Release
Press release

Utimaco Launches u.trust General Purpose HSM CSe-Series: The Next Generation of Multi-Tenant Tamper-Active HSMs

By unifying multi-tenancy, performance, highest security standards, and crypto-agility with enhanced physical security in a single platform, clients will be able to secure their digital assets across industries, geographies, and evolving regulatory landscapes
Press Release
Press Release
Press release

INVISION and PINOVA acquire Utimaco’s Lawful Interception Business

The transaction represents a carve-out of Utimaco Telecom Solutions (UTS), a business unit of the Utimaco Group.
Blog Posts

Current Blog Posts

Choosing Your GP HSM Delivery Model: A Guide to Control, Cost, and Cryptographic Sovereignty
Blog post

Choosing Your GP HSM Delivery Model: A Guide to Control, Cost, and Cryptographic Sovereignty

Compare CSP, vendor, and in-house GP HSM delivery models to find the right balance of control, cost, and cryptographic sovereignty for your organization.
Technical Interoperability Veeam Ready Qualification to provide next level security for digital backups
Blog post

Technical Interoperability Veeam Ready Qualification to provide next level security for digital backups

Utimaco ESKM achieves Veeam Ready qualification, enabling secure, external KMIP-based key management for encrypted enterprise backups.
Stopping Breaches and Staying Compliant. OpenText and Utimaco Work Together to Secure Financial Data and Transactions
Blog post

Stopping Breaches and Staying Compliant. OpenText and Utimaco Work Together to Secure Financial Data and Transactions

OpenText and Utimaco help secure financial transactions with hardware-based key protection and reduced PCI audit scope.
Governing AI Trust: Why Key Management Systems Are Essential for Secure AI Deployments
Blog post

Governing AI Trust: Why Key Management Systems Are Essential for Secure AI Deployments

Secure your AI lifecycle with strong governance and centralized key management.
Simplifying HSM Compliance Reporting with Auditor-Verified Templates
Blog post

Simplifying HSM Compliance Reporting with Auditor-Verified Templates

Turn complex HSM audit logs into clear, auditor-ready compliance reports — faster, simpler, and with confidence.
Data center
Blog post

The Role of a GP HSM in Governing the AI Ecosystem

Secure your AI with hardware-rooted cryptographic authority—trust, verify, govern.
Full control of Salesforce data with BYOK & HYOK
Blog post

Take full control of your Salesforce Cloud data with Utimaco’s secure BYOK & HYOK key management.

Take full control of your Salesforce Cloud data with Utimaco’s secure BYOK & HYOK key management.
Key Forces Driving Businesses to Adopt Cloud-Based Cybersecurity Solutions
Blog post

Key Forces Driving Businesses to Adopt Cloud-Based Cybersecurity Solutions

Discover the key forces driving the shift to cloud-based cybersecurity and how Trust-as-a-Service helps organizations scale security, compliance, and efficiency.
Product news

Product news

Market trends

Market trends

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      About Utimaco's Downloads

      Visit our Downloads section and select from resources such as brochures, data sheets, white papers and much more. You can view and save almost all of them directly (by clicking the download button).

      For some documents, your e-mail address needs to be verified. The button contains an e-mail icon.

      Download via e-mail

       

      A click on such a button opens an online form which we kindly ask you to fill and submit. You can collect several downloads of this type and receive the links via e-mail by simply submitting one form for all of them. Your current collection is empty.