[go: up one dir, main page]

Results for: hsm

34 Products for "hsm" with 1 filter applied:

  • 1
    HUB Vault HSM

    HUB Vault HSM

    HUB Security

    Hub Security’s Vault HSM goes well beyond the average run-of-the-mill key management solution. HUB as a platform not only protects, isolates and insures your company’s data, but also provides the infrastructure you need to access and use it securely. With the ability to set custom internal policies and permissions, organisations big or small can now use the HUB platform to defend against ongoing threats to their security’s IT infrastructure. The HUB Vault HSM is an ultra-secure hardware...
  • 2
    Azure Key Vault
    Enhance data protection and compliance with Key Vault. Secure key management is essential to protect data in the cloud. Use Azure Key Vault to encrypt keys and small secrets like passwords that use keys stored in hardware security modules (HSMs). For more assurance, import or generate keys in HSMs, and Microsoft processes your keys in FIPS validated HSMs (hardware and firmware) - FIPS 140-2 Level 2 for vaults and FIPS 140-2 Level 3 for HSM pools. With Key Vault, Microsoft doesn’t see or extract...
  • 3
    CryptAway

    CryptAway

    Procenne Digital Security

    CryptAway is an HSM Gateway that provides to creation of a brand-independent Hardware Security Module (HSM) cluster and uses it a t the highest efficiency. CryptAway offers a user-friendly and simple management interface for key management and cryptographic operations while minimizing your operational loads. CryptAway guarantees that all devices in the HSM cluster will always operate at full performance without bottlenecks when high performance is required. Provides the creation of brand...
  • 4
    Cosmostation

    Cosmostation

    Cosmostation

    ... and movements in decentralized finance. Impenetrable structure to prevent various attacks on our validator node. 24/7 monitoring of malicious traffic coming in and out of our nodes. Private network connected with other trusted partners. Currently reviewing implementing HSM, a physical computing device that safeguards digital keys for strong authentication. With HSM, validator private key is stored physically and is never programmatically exposed.
  • 5
    Keyfactor Signum
    With Keyfactor Signum, sensitive keys are protected, policy is automated, and signing is integrated with your tools and build processes. Generate and store sensitive private signing keys in a centralized, FIPS 140-2 certified hardware security module (HSM) in the cloud. Define granular access and usage policies for private signing keys, and authenticate users and build servers for signing with a full audit trail. Integrate with platform-native signing tools to protect access to private signing...
  • 6
    SignServer Enterprise
    ... managing a myriad of signing solutions and centralize all your signature processes in this multitenant solution and improve on security policy compliance. Server-side signature solutions give maximum control and security and allow you to leverage your hardware security module (HSM) investment in the best way. Signature keys are generated and used for signing in your HSM. SignServer supports most HSMs on the market - and both short-lived keys, and keys or certificates with a longer lifecycle.
  • 7
    Box KeySafe
    ... with the leading Content Cloud. We leverage Key Management Services (KMS) from Amazon Web Services (AWS) and Google Cloud Platform (GCP) to help you manage your encryption keys. Box KeySafe supports AWS KMS Custom Key Store and GCP Cloud HSM KMS to provide the control and protection of a dedicated hardware security module (HSM), without requiring you to manage any hardware.
    Starting Price: $130 per month
  • 8
    NCG CAM

    NCG CAM

    NCG CAM Solutions Ltd

    Machine Complex Parts with Ease using NCG CAM Standalone CAM Software. Powerful, Reliable & Affordable Advanced 3D CAM Software. NCG CAM is perfect for the high-speed machining of moulds, dies, prototypes and precision surface machining. NCG CAM is a standalone CAM system offering an easy to use HSM CAM solution that integrates with existing CAD and CAM systems, including SmartForm Design™, Think3™, Ansys™ SpaceClaim™, CREO™, Pro/ENGINEER™ and SolidWorks™. NCG CAM boasts many innovative...
  • 9
    StrongKey

    StrongKey

    StrongKey

    StrongKey has been in the PKI business for almost 20 years, with implementations across the globe in a diverse range of applications. StrongKey Tellaro provides a full public key infrastructure (PKI) platform for managing keys and digital certificates. With a built-in hardware security module (HSM) and EJBCA server, customers are able to issue digital certificates with our Tellaro E-Series based on securely generated public keys. Private keys are generated and stored within the HSM. Our PKI...
  • 10
    Cobo Custody
    Cobo Custody is compliant, military-grade institutional crypto custody that balances security and efficiency. With industry leading security and technology such as 3-tier private key storage architecture, HSM signing, multi-signature access, key sharding, and global key distribution, it is the most secure custody solution in the market. Its specialized set of risk management configuration such as optimized risk control framework, on-chain monitoring expertise, and custom access and workflows...
    Starting Price: $0
  • 11
    OpenArchive

    OpenArchive

    GRAU DATA

    OpenArchive is the ideal solution for companies that want to securely and efficiently store growing amounts of data. Being an open-source version of ArchiveManager, it offers all its benefits, except for compliance conformity and certification – while still allowing maximum flexibility and control of your data. For you as the user, there are no changes. OpenArchive adopts your directory structure so that you can access all data as you used to. There is also no need to worry about the...
  • 12
    PDF Autosigner

    PDF Autosigner

    Adweb Technologies

    ... of all leading brands. HSM compatibility for enterprise document signing. - Fully automatic Software to digitally sign PDF files. No intervention needed. - Support for multiple signatures and profiles. - Placement of the signature can be customized and stored for future use. - High quality & free technical support for a lifetime.
  • 13
    TRUESigner ONE

    TRUESigner ONE

    Truecopy Credentials

    TrueSigner One by Truecopy is a comprehensive digital signing solution designed to help businesses go completely paperless. It supports a variety of legal signature types, including electronic, Aadhaar-based, HSM, and DSC token signatures, ensuring compliance with global standards such as the IT Act 2000, UETA, ESIGN, and eIDAS. With customizable workflows, multi-signature options, and seamless integration with ERP/CRM systems, TrueSigner One streamlines document signing processes. The platform...
  • 14
    Tencent Cloud Key Management Service
    KMS leverages a third-party certified hardware security module (HSM) to generate and protect keys, and utilizes secure data transfer protocols, distributed clustered service deployment and hot backup for guaranteed availability. The security and quality control practices adopted by KMS are accredited by multiple compliance schemes. The Key Management Service provides you with rich management features, including key creation, enabling, disabling, rotation settings, alias settings, viewing key...
  • 15
    Flowdesk

    Flowdesk

    Flowdesk

    ...' digital assets thanks to our integrations with secured third-party custodians. We use a combination of MPC and HSM wallets to make sure we use the most efficient and secure technology to actively trade on DEx & CEx or to safely store your assets. As a regulated entity, Flowdesk can provide regulated operations in digital assets custody under the strictest approved processes validated by the regulator. Regulated for compliant operations.
  • 16
    CodeSign Secure

    CodeSign Secure

    Encryption Consulting LLC

    Our platform guarantees unmatched security and high performance for all your cryptographic needs, ensuring the integrity and authenticity of your software. CodeSign Secure provides advanced insights, cloud-based HSM key management, and policy enforcement for robust practices. Experience seamless integration with Dev Ops CI/CD and streamlined workflows for hands-free code signing.
  • 17
    Liminal

    Liminal

    Liminal Custody

    Liminal Custody is the only digital asset custodian with CCSS Level-3 certification. They maintain SOC2 Type 1 & Type 2, ISO 27001 & ISO 27701 certifications, and employ FIPS 140-2 validated HSMs for robust key management. Liminal currently holds a TCSP License in Hong Kong and has secured In-Principle Approval for an FSP License in ADGM, demonstrating their unwavering commitment to industry standards and regulatory compliance. Clients can expect top-tier encryption coupled with MPC (multi...
  • 18
    IBM Crypto Analytics Tool (CAT)
    ... policy and compliance enforcement. Helps administrators understand weaknesses and gaps to prioritize improvements. Comprehensive overview of the cryptographic security of HSM, ICSF, and RACF of the system. Key data for better policy and compliance enforcement. Identify insecure keys and algorithms. Comparison of the current crypto state with the previous snapshot for error and problem determination or change control validation.
  • 19
    Archive Manager for Files
    Quest's Archive Manager for Files is an enterprise-grade solution designed to automate the archiving, management, and retrieval of unstructured data across file systems. It seamlessly integrates with Windows Server environments, supporting NTFS, ReFS, NetApp, and EMC VNX file systems. It employs Hierarchical Storage Management (HSM) to move infrequently accessed files to cost-effective storage tiers while maintaining user access through lightweight shortcuts. Key features include single...
  • 20
    BCSS

    BCSS

    Prime Factors

    BCSS reduces application development costs, simplifies retail payments security, and helps meet industry & regulatory compliance related to cryptography for applications that issue payment credentials and process electronic payments. BCSS simplifies working with payment HSMs and manages cryptographic keys to facilitate payment card issuance. BCSS also enforces role-based access controls, audit logging, and reporting to help banks and financial services around the world meet PCI compliance...
    Starting Price: $0.00
  • 21
    Claris Connect
    ... cloud and on-premise apps into a seamless workflow — including custom apps built with Claris FileMaker. Even use device-to-cloud integrations from your phone. Claris Connect is built on Claris Core. This means our DevOps, CloudOps, and SecOps teams work to ensure you have the latest technologies and strongest security. We include end-to-end encryption, HSM key management, OAuth, MFA, AI-based threat protection, and more. Connect with confidence.
  • 22
    Google Cloud Key Management
    Scale your security globally. Scale your application to Google’s global footprint while letting Google worry about the challenges of key management, including managing redundancy and latency. Help achieve your compliance requirements: Easily encrypt your data in the cloud using software-backed encryption keys, certified FIPS 140-2 Level 3 validated HSMs, customer-provided keys or an External Key Manager. Leverage from integration with Google Cloud products. Use customer-managed encryption...
  • 23
    Botbox

    Botbox

    Botbox

    .... Connect to apps you love to boost productivity or use Botbox API to do even more. Easily manage and request new HSM templates, design user opt-ins and manage your WhatsApp notification campaigns without having to rely on the IT department. Reach out to specific segments of your user base with the most relevant information, at the right time. Engage users using automation. Set triggers by analyzing behaviors.
    Starting Price: $49 per month
  • 24
    Shrimpy

    Shrimpy

    Shrimpy

    ... was built with your security in mind from the beginning. Every API key is securely encrypted and stored using FIPS 140-2 validated hardware security modules (HSMs) to protect the confidentiality and integrity of your exchange API keys. Shrimpy only requires the ability to read data and make trades, so your funds can't be removed from the exchange. We also encourage all users to utilize our Two-Factor Authentication (“2FA”) service which secures access to your account.
    Starting Price: $19 per month
  • 25
    Fortmatic

    Fortmatic

    Fortmatic

    Don't let wallets own your UX, let users access your Ethereum app from anywhere. No more browser extensions and seed phrases. Leading blockchain companies around the world have integrated Fortmatic. 65% of our users interact with apps on mobile web – not just desktop. Nothing to change if your app already works with web3 and MetaMask. Fortmatic is a better alternative to MetaMask. Fortmatic is SOC 2 Type 1 compliant with a non-custodial HSM architecture. Slash user onboarding steps by 70...
  • 26
    Unbound Crypto Asset Security Platform
    The only FIPS 140 L2 certified Multi-Party-computation (MPC) security platform for digital assets. With Unbound’s Crypto Asset Security Platform (CASP) you can define multi-party risk-based approval policies that adhere to local regulations, can integrate HSMs and offline signers into one MPC based platform. A FIPS 140 L2 certified software solution that eliminates this single point of failure of public-key cryptography by giving you a secure, distributed way to sign transactions while managing...
  • 27
    Dcoin

    Dcoin

    Dcoin

    By using dynamic storage, hot and cold wallet separation, HDM wallet technology, HSM financial security technology protection etc., to protect users assets. A team with over 10 years experience built a million level TPS match engine, which enables user to grasp the opportunity and make quick trade. Customer centric, with easy to use interface, with 7*24 multi-language one-on-one customer support, customer satisfaction guaranteed. The Dcoin digital asset and derivatives trading platform...
  • 28
    Tangany

    Tangany

    Tangany

    Tangany is a German custody white-label provider. Leverage our solution to kick-start your business case on a reliable fundament and get best-in-class flexiblity. All wallets leverage latest HSM technology which is certified by FIPS140-2 (US-governmental and banking standard). Tangany is also regularly externally audited and follows ISO 27001. Supervised by the German Federal Financial Supervisory Authority (BaFin). Select your industry to see how Tangany Custody Suite can be beneficial...
  • 29
    Seald

    Seald

    Seald

    Every industry has its own data security challenges: strengthening customer trust, achieving compliance, minimizing the consequences of a data breach, ... Seald addresses these challenges by offering to simply integrate end-to-end encryption into your applications. The privacy of your customers' data will be assured by design with Seald's certified technology, protecting them even in the event of a data breach. By using server-side encryption (including KMS, HSM or BYOK), the data is first...
    Starting Price: €499 per month
  • 30
    GaraSign

    GaraSign

    Garantir

    ... that does not disrupt existing business processes. By factoring out what’s common, GaraSign is able to centralize and simplify the management of your enterprise’s most sensitive areas, including privileged access management (PAM), privileged identity management, secure software development, code signing, data security, PKI & HSM solutions, DevSecOps, and more. Enterprise security leaders must attend to data security, privileged access management (PAM), privileged identity management, etc.
  • Previous
  • You're on page 1
  • 2
  • Next