Key Exchange and Escrow as a Service
Utimaco's PCI-PIN certified key custodian service providing trusted POS crypto key operations

POS Key Generation as a Service

Utimaco's PCI-PIN certified key custodian service providing trusted POS crypto key operations

  • Key Custodial Services
  • PCI-PIN certified
  • High Availability 
     

Product Type:

As-a-service

Delivery Time:

Immediate
Key Benefits

Key Benefits

Icon

Key Custodial Services

PCI-trained key custodian staff are available 24/7 for PCI compliant generation and distribution of POS payment keys.

Icon

PCI-PIN certified

Operated in accordance with PCI PIN, P2PE and DSS security standards in ISO-certified data centers.

Icon

High Availability

Multiple appliances clustered within a geographically isolated & redundant infrastructure ensuring highest continuity.

Details

Details

Our PCI-PIN certified service provides access to trained experts acting as key custodians for you. Executed in highly secure and geo-redundant data centers, the Utimaco staff is available 24/7 to reliably and securely execute on-demand cryptographic key operations for you:  Key Generation, Key Distribution and Key Storage.

This makes it the better choice for all organization aiming to optimize their on-premises costs and workloads while benefiting from reliable security and compliance for their POS use cases such as POS key injection, PIN key generation and distribution, data encryption key generation and distribution or key block protection key (KBPK) generation.

Key Generation and Distribution

POS Key Generation as a Service provides secure payment key generation and distribution services. 
It provides secure remote transfer of the payment keys to the point of their usage, whether it is your hardware depot, the acquirers’ facilities, or the actual POS terminal in the field.

Even the key migration and rotation from 3rd party vendor HSMs is included in this service, making it the perfect solution to release you from key custodial tasks related to your POS payment keys across a multi-vendor setup.

Key Storage 

The reliable and transparent key storage capabilities of POS Key Generation as a Service are helping you not only to have full transparency on your key inventory but also enable secure key backup capabilities, ensuring reliable audit trails and helping you being fully prepared for disaster recovery (DR) to ensure the continuity of operations.

Certifications and Compliance

  • PCI PIN
  • PCI P2PE
  • PCI DSS
  • SOC2
  • ISO27001
  • ISO9001
  • ISO14001
  • NIST SP800-53

Hardware-Based Security

Based on hardware appliances with integrated HSM as Root of Trust

  • Dedicated to secure key generation and storage inside a tamper-protected HSM
  • Fully protecting cryptographic keys under AES 256 Bit encryption
  • Hosted in Utimaco Datacenter

Subject matter experts carrying out POS payment-associated key management responsibilities including: 

  • Key Generation
  • Key Escrow
  • Key Inventory
  • Key Exchange
  • Key Storage
  • Key Migration
  • Key Rotation
  • Key Export
  • Key Distribution (e.g. to POS Devices)
  • Key Custody
  • Key Management

 

Hosting Information

Hosted in a highly secure datacenter providing:

  • 24x7 onsite security personnel
  • CCTV with 90-day backup
  • Biometric / Photo badge access
  • Crash-rated / Anti-climb gates
  • Geo-redundancy

As a service

Our as-a-service options are hosted by UTIMACO in certified datacenters and include everything from set-up to deployment to maintenance.

Payment HSM as a Service

Offers a suite of fully managed services as an alternative to operating your own estate of Payment HSMs in your own data centers.

Find more details

Contact us

We look forward to answering your questions.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      About Utimaco's Downloads

      Visit our Downloads section and select from resources such as brochures, data sheets, white papers and much more. You can view and save almost all of them directly (by clicking the download button).

      For some documents, your e-mail address needs to be verified. The button contains an e-mail icon.

      Download via e-mail

       

      A click on such a button opens an online form which we kindly ask you to fill and submit. You can collect several downloads of this type and receive the links via e-mail by simply submitting one form for all of them. Your current collection is empty.