Blog

Entradas de blog

Press releases

Para encontrar entradas de blog con un tema específico, haga clic en una de las palabras clave más populares.

Keymanagement for walltes, blockchain
Blog post

Key management for wallets/blockchain

When dealing with cryptocurrencies and blockchain applications, users and companies are directly or indirectly forced to deal with cryptography.
blog-from-egde-to-fog-to-cloud
Blog post

From edge to fog to cloud

In the last few months, edge and fog computing in the Industrial IoT have become a hype topic. But what is the truth behind the hype? And does edge and fog computing really solve the major challenges of the future?
Absicherung von Medizingeräten
Blog post

IT security requirements and tools for securing the functional security of medical devices

Functional safety is an important aspect of the approval of medical devices. The aim of functional safety is to design medical devices in such a way that any probable technical malfunction is detected in advance and does not pose a risk to humans.
chip shortage
Blog post

How Utimaco is addressing the global supply chain chip shortage

The severity of the global chip shortage has disrupted companies throughout 2021 and as we enter 2022, the shortage isn’t going to disappear. As a result, the current processor-chip shortage and supply-chain disruption may have a long-term impact on price and availability.
eInvoicing teaser
Blog post

eInvoicing - ensuring compliance with the EU VAT Directive

eInvoicing is a digital solution that enables public sector contractors and companies to receive and process electronic invoices that comply with the European standard.
payment card with digital wires
Blog post

Understanding the Role of Hardware Security Modules in Fleet Cards

Fleet cards are given by a company to their employees; for example, truck drivers delivering the company’s goods to where they will be sold. Here we will explain how fleet cards/fuel cards work and the role that hardware security modules can play in providing more secure features for these cards under PCI-DSS compliance.
a man typing on the computer
Blog post

The Open Finance API & the requirement for eIDAS Certificates and Qualified Signature Creation Devices

Open Finance is driven by technologies such as open APIs. It is a publicly available application programming interface with programmatic access to a proprietary software application or web service – a set of requirements that control how one application communicates and interacts with another.
cloud icon
Blog post

Understanding the Role of Hardware Security Modules in the Hybrid Cloud

More businesses have come to rely on the use of public cloud environments as these environments have been proven to provide more security than typical on-premises data centers. However, it is essential that businesses keep data that is migrating between their data centers and the cloud secure at all times.
digital icons presenting money
Blog post

Understanding the Role of Hardware Security Modules in Credit Card-Based Payment and Retail Banking

Most standard card payment systems utilize what is called the “Four Corners” model. This model relies on the secure environments provided by HSMs to protect the numerous cryptographic keys and cryptographic operations.
a machine with icons around
Blog post

Understanding the Role of Hardware Security Modules in Digital Identities for Machines

Humans are not the only ones that need the security of a digital identity. Machines used in digital transactions are a target for hackers, necessitating the protection that digital identities provide for all stakeholders in order to prevent security breaches.
digital avatar
Blog post

Understanding the Role of Hardware Security Modules in Digital Identities for Humans

eIDAS created standards for trust services to ensure that digital identities, including those for humans remain secure. Here we will examine the role that HSMs play in securing digital identities for humans.
locker icons
Blog post

Understanding the Role of Hardware Security Modules in Symmetric Key Encryption

Organizations face an ever-present risk of data breaches as digital transformations continue to flourish in the business scape. Encryption plays a critical part in mitigating business risks and keeping data safe.

¿En qué podemos ayudarle?

Hable con uno de nuestros especialistas y descubra cómo Utimaco puede ayudarle hoy mismo.
Ha seleccionado dos tipos diferentes de Download, por lo que necesita presentar formularios diferentes que puede seleccionar a través de las dos pestañas.

Su(s) solicitud(es) de Download:

    Al enviar el siguiente formulario, recibirá enlaces a las descargas seleccionadas.

    Su(s) solicitud(es) de Download:

      Para este tipo de documentos, es necesario verificar su dirección de correo electrónico. Recibirá los enlaces a las Download seleccionadas por correo electrónico después de enviar el siguiente formulario.

      Descargas de Utimaco

      Visite nuestra sección de descargas y seleccione recursos como folletos, fichas técnicas, libros blancos y mucho más. Puede ver y guardar casi todos ellos directamente (pulsando el botón de descarga).

      Para algunos documentos, es necesario verificar su dirección de correo electrónico. El botón contiene un icono de correo electrónico.

      Download via e-mail

      Al hacer clic en dicho botón se abre un formulario en línea que le rogamos rellene y envíe. Puede recopilar varias descargas de este tipo y recibir los enlaces por correo electrónico simplemente enviando un formulario para todas ellas. Su colección actual está vacía.