A hardware security module (HSM) is a physical computing device that safeguards and manages digital keys for strong authentication and provides crypto processing.

These modules traditionally come in the form of a plug-in card or an external device that attaches directly to a computer or network server.

Utimaco-Bulwark-Technologies

General Purpose HSM Security Server

Utimaco SecurityServer is a general purpose HSM that ensures the security of cryptographic key material for servers and applications. It includes integration software that supports the industry standard PKCS#11, Microsoft CSP/CNG/SQLEKM and JCE interfaces. It can therefore be used for the most common business applications, such as public key infrastructures (PKIs) or database encryption. The SecurityServer comes as a bundle with your choice of Utimaco CryptoServer Se-Series Gen2 or CSe-Series hardware. The Se-Series HSMs have been designed to meet standard physical security and anti-tampering technology industry requirements.

The CSe-Series integrates even stronger tamper-detection and tamper-response technology. It is therefore the best choice for use in hostile and uncontrolled environments and in market segments with the highest security requirements, such as banking and government.

A software HSM simulator is available for easy evaluation and integration testing!

Payment Server

Utimaco PaymentServer is a Payment Card Industry (PCI) PIN Transaction Security (PTS) HSM for the card schemes programs like Visa, MasterCard, Amex, UnionPay, including card personalization. The Utimaco Software Development Kit allows for self-customization of the PaymentServer by your team to handle proprietary and secret algorithms.

Timestamp Server

Utimaco TimestampServer ensures the tamper-proof creation and authenticity of timestamps for electronic contracts, the reception of offers on electronic tender platforms or the submission time of a bet to an online lottery game. The Utimaco TimestampServer ensures that timestamped data is authentic for these and similar applications. It is able to verify at all times, whether or not the timestamped data matches the exact same form at the point in time it was logged by the timestamp.

Make an Inquiry