Blog

Blog posts

Press releases

To find blog posts with a specific topic, click on one of the most popular keywords.

zero trust sign on lockers
Blog post

Data Encryption & Access Management in ZeroTrust

In this article, we explore two vital concepts – Data Encryption and Access Management and how both are critical to a successful Zero Trust strategy.
laptop with bank and atm icons
Blog post

What is an HSM-based Payment Server

This article explains what a payment HSM is, the need for it to be within PCI compliance under PCI Hardware Security Module (HSM), and the importance of being PCI-HSM-certified. 
IDC Studie Cybersecurity
Blog post

Five Questions to Stefan Auerbach on the Business Value of Cybersecurity and What Actions to Take

This interview with Stefan Auerbach, CEO of Utimaco, was conducted by IDC, and was first published in the IDC Executive Brief: Cybersecurity in Germany, Austria, and Switzerland 2022.
Press Release
Blog post

Risks of not having cybersecurity in a connected car

At Realsec by Utimaco, we are a cybersecurity company that offers solutions in this area, developing encryption solutions both for general purpose and for the financial sector, digital signature, time stamping, PKI solutions, cybersecurity in Blockchain and Internet of Things (IoT), etc.
digital certificate
Blog post

eIDAS 2.0 - Roadmap, Toolbox, and The European Digital Identity Wallet Architecture

EUDI Wallets are mobile applications or cloud services that collect and store digital credentials and allow them to be used secretly and securely for numerous government and non-government use cases.
 digital pattern
Blog post

Summarizing BSI's View on Quantum Technologies and Quantum-Proof Cryptography

This article discusses BSI’s view on quantum technologies and quantum-proof cryptography.
NIST digital identity
Blog post

NIST Digital Identity Guidelines & Identity Proofing - Why Using A Public Key Infrastructure Is A Key Requirement

In this article, we outline key requirements from NIST and how the use of a Public Key Infrastructure becomes a necessary requirement in order to adhere to these Guidelines.
Woman typing on Computer
Blog post

Securing The Innovative Digital Payments Of Today

Progress in payments includes accelerating seismic shifts to digital transactions and generating unbounded opportunities for innovation.
Authentication
Blog post

Authentication in Zero Trust

Authentication in Zero Trust is a critical challenge since it is the first phase before establishing trust and granting access.
Automotive Trust Suite
Blog post

How Secure are connected vehicles?

Given the increasing complexity of the connected vehicle, It is critical to protect smart components and devices from the time they are manufactured until the end of their lifecycle.
Data protection
Blog post

6 wichtige Aspekte für Datensicherheit nach VS-NfD

Die Digitalisierung Ihrer Verwaltung erfordert digitale Sicherheitslösungen.
HSM as a root of trust
Blog post

Understanding the Role of the HSM as the Root of Trust

HSMs due to their cryptographic ability to securely generate and store keys in a secure, tamper-resistant/evident environment – act as the Root of Trust.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      About Utimaco's Downloads

      Visit our Downloads section and select from resources such as brochures, data sheets, white papers and much more. You can view and save almost all of them directly (by clicking the download button).

      For some documents, your e-mail address needs to be verified. The button contains an e-mail icon.

      Download via e-mail

       

      A click on such a button opens an online form which we kindly ask you to fill and submit. You can collect several downloads of this type and receive the links via e-mail by simply submitting one form for all of them. Your current collection is empty.