Solutions

Applications

The most secure way to enable applications based on cryptographic keys is through the use of Hardware Security Modules (HSMs). They generate, store, manage and securely decommission cryptographic keys. HSMs are considered the first choice for providing a Root of Trust and securing the privacy, authenticity and integrity of data and people, e.g. in the Internet of Things.

Overview

3GPP TS33501 Compliance

3GPP TS 33.501 compliance

Provides a secure architecture and security processes for 5G mobile networks that fulfill all requirements defined in 3GPP TS 33.501.
5G Lawful Interception

5G Lawful Interception

The comprehensive solution for lawful interception, supporting fast mediation of broadband multimedia traffic from 5G networks while meeting the specifications of Global Standards
5G Security

5G Security

5G - Secure Storage, Management & Processing of Subscription Credentials
Authentication

Authentication

Multi-factor Authentication. Eliminate the primary target of hackers - the password.
Blockchain

Blockchain

Improving blockchain security with HSMs
Broadband Access Interception

Broadband Access Interception

Securing the broadband network for Lawful Interception of broadband data traffic
BYOK and HYOK

BYOK & HYOK

Select the key management solution by hosting encryption keys in the cloud provider’s platform or retaining the ownership control of customer-managed encryption keys.
Card personalization

Card Personalization

Provision of personalized payment cards creates loyalty among customers!
Classified Data protection

Classified data protection

Certified cybersecurity solutions that protect classified information according to VS-NfD, EU-restricted, and NATO-restricted.
Code signing

Code signing

Code Signing – a fundamental way to secure innovation
Converged HSM

Converged HSM

Enables true multi-tenancy on a single platform. Deployed as HSMaaS supporting general purpose, payment, and all other use cases and compliance requirements.
Data Access Management

Data Access Management

Manage and control which teams, departments, and single employees have access to certain kinds of data.
Data retention

Data Retention

Secure storage of information for a specified period of time in order to comply with regulations or for business-related purposes.
double key encryption

Double Key Encryption

Sensitive data protection and controlling in Azure Cloud with Utimaco DKE Anchor for Microsoft Double Key Encryption (DKE)
GDPR compliance

GDPR compliance

Ensure digital data protection and privacy: Discover how cybersecurity strategies help fulfill GDPR and other data protection laws.
General Purpose hardware security

General Purpose Hardware Security Modules

Enables key generation, storage, and exchange. Addresses various performance levels and physical security requirements while fulfilling compliance and regulatory mandates.
Hard drive encryption

Hard Drive Encryption

Adds an additional layer of security to end devices with encryption at the hard drive level – also in accordance with VS-NfD and other classified information.
HSMaaS

HSM as a Service

Benefit from the security features of a Hardware Security Module without worrying about deployment, maintenance, and technical set-up.
Identity and access management

Identity and Access Management

Efficiently protects devices and data against unauthorized access. This is crucial to ensure security and compliance in today’s environment. Identity and Access Management provides significant benefits in terms of security, transparency, and manageability.
Key generation derivation

Key Generation and Derivation

In Germany, medical history as one of the most sensitive types of patient data which is subject to specific compliance requirements. Cryptographic keys protecting such data must be generated and protected by utilizing key generation and derivation.
Key Injection

Key injection

Key Injection gives every Device an Identity
Key management

Key Management Solution

Sensitive data must not only be encrypted, but also kept secure while in motion, in use, or at rest. Reap the benefits of properly managing your encryption keys.
Lawful Interception for Mission Critical Push to Talk (MCPTT) Networks

Lawful Interception for Mission Critical Push to Talk (MCPTT) Networks

Supporting Lawful Interception requirements for Mission Critical Push-to-Talk (MCPTT) Networks - ensuring that mission critical businesses and customers have access to efficient and reliable communications at all times.
Lawful Interception of VoIP calls

Lawful Interception of VoIP calls

Securing and mediating Lawful Interception monitoring for Voice over IP (VoIP) from threats and attacks.
Lawful Interception in NFV and SDN

Lawful Interception in NFV and SDN

Providing Lawful Interception security for Network Function Virtualization (NFV) and Software Defined Networks (SDN) infrastructures.
Manag keys virtually

Manage keys virtually

Cost and flexibility are the 2 main motivations to manage keys virtually instead of on-premise.
Monitoring the Internet of Things (IoT)

Monitoring the Internet of Things

Securing the IoT for Lawful Interception monitoring requirements
Multi-cloud Key Management

Multi-cloud Key Management

Generate, store, manage and maintain cryptographic keys in a secure environment
Payment hardware security modules

Payment Hardware Security Modules

Tamper-proof, hardware-based, available, redundant, secure, reliant, and complaint – is how a payment HSM should be.
PCI-Compliant Payment Card Processing

PCI Compliant Payment Card Processing

Securing and protecting the financial services industry with end-to-end transaction security
PCI PSD2 Compliance

PCI & PSD2 Compliance

Being PCI and PSD2 compliant, ensures that systems are secure, and customers are able to trust that their sensitive payment card information remains protected.
Post quantum crypto agility

Post quantum crypto agility

Quantum supremacy and the ever increasing threat
Protection centrally stored data

Protection of centrally stored data

Reliable data protection mechanisms that ensure that centrally stored data is only accessed by trustworthy entities and stays protected throughout its lifecycle.
Public Warning

Public Warning

World-leading products provide powerful and instant emergency/commercial notifications in over 20 countries with more than 1 billion users.
Document signing

Qualified Electronic Signatures & Seals

Store your certificates and keys for the signing process in an HSM to prevent others from signing documents with your keys.
Qualified electronic timestamps

Qualified Electronic Timestamps

Providing proof of time and content is essential for various use cases across many industries. Qualified electronic timestamps provide reliable and eIDAS-compliant proof that a document remains unchanged at a specific point in time.
Secure data storage

Secure data storage

Data is generated, processed, and stored at various places in the organization. With consequent data encryption, this data remains protected at all layers of the data ecosystem.
Secure data processing

Secure data processing

Enables business processes without revealing business secrets or violating data privacy rights.
Secure file sharing

Secure file sharing

Enables secure but easy-to-manage data sharing with third parties without running the risk of data interception.
Software based file and folder encryption

Software-based file and folder encryption

Reliable data encryption at the file and folder level to protect data against unauthorized access and to fulfill data protection regulations.
Subscriber authentication and key agreement

Subscriber authentication and key agreement

Ensures the security and trustworthiness of mobile networks by verifying the identities of subscribers and protecting traffic sessions.
Subscriber identity de-concealing

Subscriber Identity De-concealing

Secures decryption of the subscription concealed identifier in the home network for trusted 5G mobile networks.
Subscriber privacy

Subscriber Privacy

Ensures the privacy and protection of the subscriber’s identity, location, and shared information in mobile networks.
Tokenization

Tokenization

Keeping sensitive information secure and private by encrypting with tokenisation
Transaktionssignaturen

Transaktionssignaturen gemäß Kassensicherungsverordnung

Digitale Grundaufzeichnungen wie Transaktionsdaten von Registerkassen müssen unter Einsatz einer ergänzenden Technischen Sicherheitseinrichtung gegen Manipulationen geschützt werden. Auf kryptographischen Schlüsseln basierende Signaturen schützen die Transaktionen zuverlässig gegen Manipulationen.
Trusted Timestamp

Trusted Timestamp

Secure Timestamps for Document & Data Authenticity
Voice and Video Interception

Voice and Video Interception

Securing network telecommunications for Lawful Interception monitoring requirements.
Zero trust

Zero Trust Security

In a Zero Trust Architecture, continuous validation at every stage of a digital transaction is required. This overcomes limitations of other principles built upon implied trust zones and limits the risk of internal and external threats.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      Your collection of download requests is empty. Visit our Downloads section and select from resources such as data sheets, white papers, webinar recordings and much more. 

      Downloads

       

      0