Reset all × solrutimaco Results 121 - 140 of 774 Filter results Solution Monitoring the Internet of Things (IoT) Law enforcement monitoring facilities are all material challenges that network operators need to consider in order to fulfil any LI legal obligations. Solution PCI Compliant Payment Card Processing Secure and protect the financial services industry with end-to-end transaction security from Utimaco. Read more about our solution here. Solution Key Injection Key injection is the starting point for securely managing an IoT device. To make sure that device identities are not hacked, keys need to be generated by an HSM Solution Identity and Access Management Efficiently protects devices and data against unauthorized access. This is crucial to ensure security and compliance in today’s environment. Identity and Access Management provides significant benefits in terms of security, transparency, and manageability. Solution Key Management Solution Sensitive data must not only be encrypted, but also kept secure while in motion, in use, or at rest. Reap the benefits of properly managing your encryption keys. Solution Timestamping Within certain industries, such as the financial services sector and the lottery and gaming industry, trillions of events of all kinds are being recorded, logged and timestamped in datacenters all over the world. Solution V2X Communication To enable trustworthy communication, V2X systems rely on an advanced Public Key Infrastructure (PKI)-based approach which requires use of digital signatures and certificates. Solution Software-based file and folder encryption Reliable data encryption at the file and folder level to protect data against unauthorized access and to fulfill data protection regulations. Solution Random Number Generation Using a hardware-based source of entropy for RNG, Utimaco HSMs implement a hybrid random number generator complying with DRG.4 requirements. Solution Zero Trust Security In a Zero Trust Architecture, continuous validation at every stage of a digital transaction is required. This overcomes limitations of other principles built upon implied trust zones and limits the risk of internal and external threats. Solution Secure file sharing Enables secure but easy-to-manage data sharing with third parties without running the risk of data interception. Solution Tokenization of Banking Card Payment Data Keeping sensitive payment data secure and private by encrypting with tokenization Solution Tokenization Data security is crucial to any industry that deals with online transactions. Keep yoursensitive information secure by encrypting with tokenization. Solution Blockchain Security Applications Organizations of all sizes can easily implement powerful, secure and resilient blockchain applications, safeguarded by HSMs by Utimaco. Solution Payment HSM as a Service Outsource your Payment HSMs to a fully managed, globally accessible, cloud-based service. Find out more about MYHSM services here. Solution Security of IoT Components Utimaco provides industry-grade key injection solutions and a remote key loading HSM enabling remote key lifecycle management, tracking and distribution control Solution Cloud Services Recent months have seen an openness to transition to the public cloud. And, such a transition must happen within the frame of sector-specific requirements. News - Blog post Dec 21, 2022 Authentication in Zero Trust Authentication in Zero Trust is a critical challenge since it is the first phase before establishing trust and granting access. News - Blog post Dec 05, 2022 How Secure are connected vehicles? Given the increasing complexity of the connected vehicle, It is critical to protect smart components and devices from the time they are manufactured until the end of their lifecycle. News - Press release Dec 01, 2022 Neue Studie im Auftrag von Utimaco: Anhaltende Herausforderungen schmälern das Cybersicherheits-Engagement von DACH-Unternehmen DACH-Unternehmen haben erkannt, dass Cybersicherheit die Grundlage für digitales Vertrauen und Geschäftswachstum ist und investieren in entsprechende strategische Sicherheitsmaßnahmen. Jedoch erschweren ihnen Herausforderungen wie IT- und Sicherheitskomplexität sowie Fachkräftemangel die Umsetzung. Pagination First page « First Previous page ‹ Previous … Page 3 Page 4 Page 5 Page 6 Current page 7 Page 8 Page 9 Page 10 Page 11 … Next page Next › Last page Last » × Reset all