AWS CloudHSM is a cloud-based hardware security module (HSM) that enables you to easily generate and use your own encryption keys on the AWS Cloud. With CloudHSM, you can manage your own encryption keys using FIPS 140-2 Level 3 validated HSMs. CloudHSM offers you the flexibility to integrate with your applications using industry-standard APIs, such as PKCS#11, Java Cryptography Extensions (JCE), and Microsoft CryptoNG (CNG) libraries.
nShield hardware security modules (HSMs) provide a hardened, tamper-resistant environment for secure cryptographic processing, key generation and protection, encryption and more. Available in three FIPS 140-2 certified form factors, nShield HSMs support a variety of deployment scenarios.
The Utimaco SecurityServer is a general purpose HSM that ensures the security of cryptographic key material for servers and applications. It includes integration software that supports the industry standard PKCS#11, Microsoft CSP/CNG/SQLEKM and JCE interfaces. It can therefore be used for the most common business applications, such as public key infrastructures (PKIs) or database encryption.
Azure Dedicated HSM is an Azure service that provides cryptographic key storage in Azure. Dedicated HSM meets the most stringent security requirements. It's the ideal solution for customers who require FIPS 140-2 Level 3-validated devices and complete and exclusive control of the HSM appliance.
The YubiHSM is a game changing hardware solution for protecting Certificate Authority root keys from being copied by attackers, malware, and malicious insiders. It offers superior cost effective security and easy deployment making it accessible for every organization. It offers a higher level of security for cryptographic digital key generation, storage, and management, for organizations running Microsoft Active Directory Certificate Services.
AWS Key Management Service (AWS KMS) is a managed service that makes it easy for you to create and control the encryption keys used to encrypt your data. The customer master keys that you create in AWS KMS are protected by hardware security modules (HSMs).
Unbound Key Control (UKC) ensures that your most sensitive keys never exist in the clear at any point in their lifecycle – not even when generated, while in use or while at rest. With Unbound's Distributed Trust Platform, key material is never whole – not in memory, disk or network.
Trustway Proteccio is a Hardware Security Module (HSM) providing software solutions in a high-performance, highly secure environment for performing their most sensitive cryptographic operations.
The Vectera Series combines the best of both general-purpose and financial purpose data processing. Comprised of the Vectera Plus and Vectera Galaxy, the series brings FIPS 140-2 Level 3-validated technology to general purpose cryptography, ensuring security at a level reserved for the most sensitive data. The benefits of this multi-functional hardware are manifold: reduced up-front capital expenditure, lower overhead costs for maintenance, simplicity of training, and reduced time expenditures.
If your cryptographic functions are crucial for the protection of your sensitive data, Ultra’s Keyper Plus is the only viable option for your business as the world’s only Hardware Security Module (HSM) to provide FIPS 140-2, Level 4 - the highest level of key protection and cryptographic assurance.