The Central Tokenization Solution for a KeyBRIDGE Appliance


Available as: Hardware on-premise

Secure and easy-to-manage Tokenization

Delivery time about 2-4 weeks
  • Provides a complete solution with a built-in HSM, database and token management system
  • Offers Vault based Tokenization
  • PCI and FIPS certified
  • Provides Centralized Key Storage
  • Enables Detailed Token Inventory
Key Benefits

Key Benefits


Out-of-the-Box Solution

Benefit from a complete Tokenization creation and management solution which is provided and delivered by a built-in HSM as root of trust, an integrated database and a Token Management System (TMS).


Highly secure Tokenization

Achieve best-in-class entropy and high-quality keys through True Random Number Generator (TRNG) and encrypted self-contained & auto-maintained database.


Centralized Key and Token Management

Enable easy crypto management with centralized key and token storage and detailed key and token inventory.



Secure and easy-to-manage Vault based Tokenization



KeyBRIDGE TokenBRIDGE offers a complete tokenization solution to prevent organizations from data loss and guarantee uniqueness for assets without complicating security management.

TokenBRIDGE incorporates a true token vault. The clear value is tokenized and stored in logical encrypted containers as a result. The de-tokenization is rapidly executed by retrieving the clear value using per-relationship keys.

The centralized key storage and the detailed token inventory provide the user with full control and easy management without the requirement for external resources.

TokenBRIDGE adds an additional layer of security to organizations and protects sensitive data by using 256 bit AES encryption.


Random Tokenization in any format

  • Provides Vault based tokenization
  • Tokens are generated with a true hardware-based, FIPS-certified random number generator

Certified for Payment and General-Purpose use cases

  • PCI-HSM v3 certified
  • FIPS 140-2 Level 3 certified

High physical and logical security

  • Provides high assurance token collision avoidance 
  • Intrusion-resistant and tamper-evident hardware
  • Allows role-based access control (RBAC) enforced with dual control and split knowledge

Easy to manage

  • No external key management required
  • Provides Built-in backup for fast system restoration
  • Benefit from the simple to use intuitive graphical user interface (GUI)

Easy integration into your existing crypto environment

  • GUI & RESTful API Interface
  • Works as a standalone appliance that can be easily integrated as part of a mesh IT network

Highest storing capacity

  • Enables storage of up to 2,5 Billion tokens

Technical Specifications

Cryptographic Algorithms

Asymmetric algorithms/lengths:

  • RSA: 1024, 2048, 3072, 4096 Bits
  • ECC: NIST, SEC 2 and Brainpool elliptic curves, 160 – 571 Bits

Symmetric algorithms/lengths:

  • DES, TripleDES; AES 128, 192, 256 Bits

Hash Functions:

  • SHA1, SHA224, SHA256, SHA384, SHA512 Bits

Message Authentication:



Our on-premise options allow hosting the product directly on-site in your own network or data center.

  • LAN Appliance


Related to this product


KeyBRIDGE 4100

Find more details


Find more details


Find more details


Find more details

Contact us

We look forward to answering your questions.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      Your collection of download requests is empty. Visit our Downloads section and select from resources such as data sheets, white papers, webinar recordings and much more.