Hardware Security Module
The KeyperPlus HSM is probably the world most secured HSM, a FIPS 140-2 Level 4 certified temper reactive Ethernet connected HSM for managing cryptographic keys and protecting sensitive applications. It is designed for managing mission critical applications that demand maximum security. It is ideally suited for companies that need secured key management for certification authorities, registration authorities, OCSP responders, smart card issuers, web servers and other applications.
The SecurityServer Se Gen2, a FIPS 140-2 Level 3 certified HSM from Utimaco secures cryptographic key material for servers and applications. It includes integration software that supports the industry standards (e.g. PKCS#11, Microsoft CSP/CNG, JCE, and more) which are used in most application scenarios, e.g. Enterprise PKI applications, database encryption, etc. The SecurityServer Se Gen2 is available as PCIe embedded card or as network attached appliance.
The SecurityServer CSe, a physical security FIPS 140-2 Level 4 certified HSM from Utimaco implements tamper-responding technology for securing cryptographic key material for servers and applications. It is conceived for applications and market segments with high physical security requirements, e.g. Government Authorities, Banking environment, etc. The SecurityServer CSe is available as PCIe embedded card or as network attached appliance.
The Utimaco CryptoSDK is the professional development environment for all Utimaco HSMs. It enables integrators and end-users to create specific applications, e.g. proprietary algorithms, custom key derivation procedures or complex protocols that run in the tamper-proof environment of the Utimaco HSMs. As the SDK provides full access to the Utimaco based firmware, highly skill CryptoSDK expertise will be required to do this.
The Utimaco TimestampServer is the ideal HSM for business applications that require proving the existence of a document or data at a specific point in time. This product ensures the tamper-proof creation and authenticity of timestamps, which can be verified at all times whether the timestamped data existed in the exact same form at the point of time logged by the timestamp. Its periodical re-creation of current timestamp supports long term archiving for future audit.