Reset all × solrutimaco Results 1 - 20 of 91 Filter results News - Blog Jun 14, 2022 Hindernis oder Treiber: Ist Cybersicherheit zu Recht ein IIoT-Bremser oder ist IIoT der Weg, um industrielle Cybersecurity zu verbessern? Zentrales Ergebnis der IDC-Studie: Aktuell setzen in Deutschland nur 3 von 10 Industrieunternehmen aktiv IIoT-Projekte um. Solution Code Signing Code Signing – a fundamental way to secure innovation Solution Data and Database Encryption Data and database encryption to protect business-critical and personal data Companies store and process sensitive, business-critical, and personal data every day. To ensure only authorized users have access to their data, they need to implement effective data encryption and database encryption solutions. Solution Transition to Digital Manufacturing Solution Post Quantum Crypto Agility Quantum supremacy and the ever increasing threat Solution Blockchain Applications Improving blockchain security with HSMs Solution Cryptographic Identity for Components (Manufacturing) A final good may contain the products (or ‘components’) of several different manufacturers. Many of them are connected devices with direct or indirect access to the IoT and with onboard software and firmware. Solution Qualified Electronic Signatures & Seals Qualified Electronic Signatures & Qualified Seals The eIDAS regulation established a common legal framework for secure electronic signatures, including standardized assurance levels, for the purpose of facilitating interoperability, acceptance and legal assurance. Solution Key Injection (Point of Interaction) Secure payment processing - Encrypt credit card data immediately upon swipe, dip, tap or key entry in electronic payment terminals and Point of Interaction (POI) devices Solution Security of IoT Components Protecting IoT Components & Devices with Key Injection Solution 5G Security 5G - Secure Storage, Management & Processing of Subscription Credentials Security is a driving factor in how 5G networks are built and operated - every element of a 5G network is required to have security controls in place for the purpose of delivering confidentiality, integrity and availability so that the network provides users with a secure communications platform. Solution Manufacturing & IoT Security by Design – Improving IoT security at the point of manufacture. Given the interconnected nature of the industry, cyberattacks can be far more extensive than before and manufacturers and supply networks need to be prepared. Solution Public Key Infrastructure Securing Public Key Infrastructure. Build a trusted and secure business environment by authenticating users and devices. News - Press releases Apr 20, 2022 Utimaco acquires Celltick to expand its solutions offering into Public Warning Systems Celltick is a global leader of Public Warning Systems and the world’s largest cell broadcast-based products provider, in terms of deployments and audience reach. News - Press releases Apr 06, 2022 Utimaco and Nokia expand partnership to secure a 5G future Global telecoms giant and cybersecurity innovators combine to create future-proof, secure implementations of fifth generation mobile networks. News - Blog Apr 05, 2022 How to select an HSM As the choice of HSMs is dependent on the specific application it is used for, we make some general recommendations by providing a list of potential criteria to take into account, irrespective of what you intend to use it for. News - Blog Jan 19, 2022 From edge to fog to cloud In the last few months, edge and fog computing in the Industrial IoT have become a hype topic. But what is the truth behind the hype? And does edge and fog computing really solve the major challenges of the future? News - Blog Jan 19, 2022 IT security requirements and tools for securing the functional security of medical devices Functional safety is an important aspect of the approval of medical devices. The aim of functional safety is to design medical devices in such a way that any probable technical malfunction is detected in advance and does not pose a risk to humans. News - Blog Nov 24, 2021 Understanding the Role of Hardware Security Modules in Digital Identities for Machines Humans are not the only ones that need the security of a digital identity. Machines used in digital transactions are a target for hackers, necessitating the protection that digital identities provide for all stakeholders in order to prevent security breaches. News - Blog Sep 24, 2021 Understanding Supply Chain Attacks - What You Need to Know Supply chain attacks are nothing new. However, these attacks have become more organized since the early part of 2020. Now, cybercriminals have turned their focus to suppliers versus organizations to make a far greater impact with damages. Pagination Current page 1 Page 2 Page 3 Page 4 Page 5 Next page Next › Last page Last » × Reset all