Secure key storage and cryptographic processing for common business applications


Secure your organization’s most valuable assets

  • Plug and play integration with numerous business applications
  • Supports all common cryptographic APIs
  • Includes a software simulator for evaluation and integration testing
Key Benefits

Key Benefits


Secure an organization’s most valuable assets

SecurityServer provides a tamper-protected environment for data encryption, document signing, certificate issuance, and many other critical security requirements.


Easy integration with 3rd party applications

Available as a PCIe plug-in card or as a network-attached appliance - providing a flexible, integrated solution for numerous business applications


Excellent Price-Performance Ratio

SecurityServer provides high performance of up to 10,000 RSA or 6,000 ECDSA signing operations for an attractive price and includes all necessary features and crypto algorithms.



SecurityServer - The root of trust for business applications



SecurityServer bundles 30 years of experience in cryptography and Hardware Security Module (HSM) technology into a unique offering that constitutes the root of trust for security and compliance of business applications. It adds the extra layer of security to an organization’s most valuable assets. Supporting a wide range of hardware platforms, it meets performance and security requirements of small enterprises all the way up to large crypto infrastructures.

Due to SecurityServer’s support of various cryptographic interfaces, it enables easy plug-and-play integration with common business applications for document and data encryption; document signing and code signing; issuing of certificates for company IDs, machines, or applications in a public key infrastructure (PKI); chip personalization, from key generation to key injection into passports, eID cards, printer, and many other devices; authentication of persons and devices; and many more.

As a result, SecurityServer is the ideal solution for protecting sensitive and security-critical assets in enterprises, government and public administration as well as use cases such as Internet of Things (IoT), Automotive, Critical Infrastructures such as smart grids or telecommunication networks, as well as Service Providers (CSP) and Solution Partners.

The ease of integration, high scalability, convenient remote administration and best price-performance ratio ensure outstanding total cost of ownership for organizations of all sizes.

Regardless of the specific use case, the SecurityServer simulator makes it straightforward to evaluate SecurityServer and test its integration with business applications before deploying it into production.

SecurityServer is available on CryptoServer SeGen 2 and CSe series, as well as the Anchor platforms. In addition, it is available as CryptoServer Cloud, Utimaco’s Infrastructure-as-a-Service Offering.

High security for the most valuable assets of your organization

  • Provide secure generation, storage, and usage of keys inside the tamper protected HSM
  • Provides high-quality true random number generation to ensure uniqueness of keys
  • Configurable role-based access control and separation of functions
  • 2-factor authentication with smart cards
  • “m of n” quorum authentication    

Supported Cryptographic Algorithms

  • RSA, DSA, ECDSA with NIST and Brainpool curves, EdDSA
  • DH, ECDH with NIST, Brainpool and Montgomery curves
  • AES, Triple-DES, DES
  • SHA-1, SHA-2, SHA-3, RIPEMD
  • Hash-based deterministic random number generator (DRG.4 acc. AIS 31)
  • True random number generator (PTG.2 acc. AIS 31)
  • Up to 10,000 RSA or 6,000 ECDSA signing operations    

Supported Cryptographic Interfaces (APIs)

  • PKCS #11
  • Java Cryptography Extension (JCE)
  • Microsoft Crypto API (CSP), Cryptography Next Generation (CNG) and SQL
  • Extensible Key Management (SQLEKM)
  • OpenSSL
  • Utimaco‘s comprehensive Cryptographic eXtended services Interface (CXI)

Extensive remote administration and monitoring

  • Efficient key management and HSM administration including firmware updates via remote access
  • Automation of remote diagnosis via SNMP (Simple Network Management Protocol)    

Fulfills various security compliance mandates

  • FIPS 140-2 Level 3
  • GDPR
  • ETSI C-ITS    

Safety and environmental compliance

  • CE, FCC Class B
  • UL, IEC/EN 60950-1, IEC/EN 62368-1
  • CB certificate
  • BIS, KC

Software simulator included

  • HSM Simulator with all SecurityServer functionalities
  • Fully functional runtime including all administration and configuration tools
  • For evaluation and integration testing of SecurityServer prior to deployment in production   


Our on-premise options allow hosting the product directly on-site in your own network or data center.

  • LAN Appliance
  • PCIe Card

As a service

Our as-a-service options are hosted by UTIMACO in certified datacenters and include everything from set-up to deployment to maintenance. 360 360 is a hardware and software based management platform enabling centralized administration, monitoring and provisioning for Atalla AT1000 and CryptoServer LAN V5 HSMs.

Find more details Anchor Se15k/Se40k

Our high performance HSM provides an unprecedented speed of up to 40,000 RSA transactions per second, dedicated to use cases requiring highest processing power and consolidation.    

Find more details Anchor CSAR

The world’s first converged crypto platform for payment and general purpose HSM use case enabling to offer HSM-as-a-Service and providing true multi-tenancy.

Find more details

CryptoServer SDK

UTIMACO’s professional development kit allows for implementing firmware extensions for SecurityServer and PaymentServer built on CryptoServer Se Gen2- and CryptoServer CSe-series.

Find more details

CryptoScript SDK

Providing aunique capability to script extensions for SecurityServer HSMs built on CryptoServer Se Gen2- and CryptoServer CSe-series in a secure, easy and unprecedented way.

Find more details


Applying Quantum-Resistance to Applications and Use Cases

Find more details


Two-tier security for the most sensitive data in Azure

Find more details

Contact us

We look forward to answering your questions.

Our Partners

Look for the best implementation or distribution partner for your project.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.