Blog

Blogbeiträge

Press releases

Um Blogbeiträge zu einem bestimmten Thema zu finden, klicken Sie auf eines der gängigsten Schlüsselwörter.

card payments security
Blogbeitrag

Visa PIN Security Program Update: Navigating Changes in PCI PIN Compliance

In the ever-evolving landscape of cybersecurity and data protection, Visa has recently announced a significant shift in its approach to PCI PIN.
laptop with bank and atm icons
Blogbeitrag

What is an HSM-based Payment Server

The Banking and financial services industry is challenged by PSD2. On top of this, they need to manage Identity and access management, cryptographic key management, use blockchains, go to the cloud and stay compliant.
blog-how-to-select-an-hsm
Blogbeitrag

How to select an HSM vendor

As the choice of HSMs is dependent on the specific application it is used for, we make some general recommendations by providing a list of potential criteria to take into account, irrespective of what you intend to use it for.
laptop with bank and atm icons
Blogbeitrag

An Introduction to Payments as a Service

Explaining Payments as a Service and how PSD2 is paving the way to make payments easier and enhancing protections for consumers.
skyscrapers
Blogbeitrag

Banking as a Service – With the Right Technical Foundation a Scalable Digital End-to-End Opportunity Exists

This article explains the concept of Banking-as-a-Service and how with the right technical foundation incumbent banks can benefit.
numbers on a black background
Blogbeitrag

Concrete Applications of Tokenization in Payment Processes (2/2)

In this article, we describe various applications of tokenization in card-not-present transactions – when plastic cards become digital tokens.
numbers on a black background
Blogbeitrag

The main principles of Tokenization and application to payments (1/2)

In this article, we outline and explain the principles behind tokenization and how this is used by financial institutions in transaction processing all over the world.
payment card with digital wires
Blogbeitrag

Understanding the Role of Hardware Security Modules in Fleet Cards

Fleet cards are given by a company to their employees; for example, truck drivers delivering the company’s goods to where they will be sold. Here we will explain how fleet cards/fuel cards work and the role that hardware security modules can play in providing more secure features for these cards under PCI-DSS compliance.
a man typing on the computer
Blogbeitrag

The Open Finance API & the requirement for eIDAS Certificates and Qualified Signature Creation Devices

Open Finance is driven by technologies such as open APIs. It is a publicly available application programming interface with programmatic access to a proprietary software application or web service – a set of requirements that control how one application communicates and interacts with another.
digital icons presenting money
Blogbeitrag

Understanding the Role of Hardware Security Modules in Credit Card-Based Payment and Retail Banking

Most standard card payment systems utilize what is called the “Four Corners” model. This model relies on the secure environments provided by HSMs to protect the numerous cryptographic keys and cryptographic operations.
shopping basket icon
Blogbeitrag

The Buy Now, Pay Later Revolution

What is Buy Now, Pay Later? BNPL for short is known as installment payments and point-of-sale financing (POSF). Offering buyers credit as part of a purchase has been around since antiquity and therefore, what we are seeing is an explosion of a new variant.
connected square blocks
Blogbeitrag

Finance companies are embracing blockchain – and they need to stay secure

Given the sheer scale of cybercrime, which could cost the world $10.5 trillion a year by 2025, a paradigm shift in the way we secure data is long overdue. Blockchain technology may be one way to achieve this: with blockchain technology security is ‘baked in’.

Wie können wir Ihnen helfen?

Sprechen Sie mit einem unserer Spezialisten und erfahren Sie, wie Utimaco Sie unterstützen kann.
Sie haben zwei verschiedene Arten von Downloads ausgewählt, so dass Sie verschiedene Formulare absenden müssen, die Sie über die beiden Tabs auswählen können.

Ihre Download-Sammlung:

    Direkt nach dem Absenden des Formulars erhalten Sie die Links zu den von Ihnen ausgewählten Downloads.

    Ihre Download-Sammlung:

      Für diese Art von Dokumenten muss Ihre E-Mail Adresse verifiziert werden. Sie erhalten die Links für die von Ihnen ausgewählten Downloads per E-Mail, nachdem Sie das unten stehende Formular abgeschickt haben.

      Ihre Download-Sammlung ist leer. Besuchen Sie unseren Download-Bereich und wählen Sie aus Ressourcen wie Datenblättern, Whitepapers, Webinar-Aufzeichnungen und vielem mehr.

      Downloads
      0