Excelerated performance for all high-speed use cases

u.trust Anchor Se15k/Se40k

Experience transaction processing at an unprecedented speed

Watch now: The Path for Cloudifiying Payment HSMs
  • Processes up to 40,000 RSA operations per second
  • Provides the potential to reduce purchase expenses, minimize operational costs and to profit from savings of up to 90%
  • Provides automatic load balancing and object synchronization
  • Offers unlimited key storage
  • Provides scalability and flexibility
Key Benefits

Key Benefits

Icon

Unique speed

Process up to 40,000 RSA operations per second

Icon

Reduce TCO

Reduce purchase expenses, minimize operational costs and profit from savings by up to 90%

Icon

Maximize processing performance

High speed transaction processing, bulk signing and mass issuing through automatic load balancing and object synchronization

Details

Details

Experience transaction processing at an unprecedented speed

KeyBRIDGE

 

Maximize performance
u.trust Anchor Se15k/Se40k offers best-in class performance on a single hardware with automatic load balancing and object synchronization.

Benefit from its unprecedented processing performance for various use cases, such as bulk invoicing, high frequency transaction processing, high speed attestation, ticketing, transport layer security.

So far, al of these common use cases had to be addressedby running and maintaining multiple HSMs in parallel, keeping them in sync as well as  hosting the hardware.
u.trust Anchor Se15k/Se40k provides optimal performance to process crypto operations on a single hardware solution with automatic load- balancing and object synchronization.

Minimize costs
u.trust Anchor Se15k/Se40k, due to its high performance, provides significant savings potential.

Benefit from the performance of up to 32 legacy HSM in a single box, maximize the utilization of your HSM, and reduce maintenance complexity and workload.

Discover the full saving potential in our product information “Reduce Your Total Cost of Ownership”.

Unlimited key storage

  • Store and process an unlimited number of keys

Safe and easy key management

  • Using “m of n” authentication
  • Configurable role-based access control and separation of functions
  • Multi-slot support
  • Remote management

Appropriate for various use cases

  • Bulk Invoicing
  • High Frequency Transaction Processing
  • High Speed Attestation
  • Ticketing
  • Transport Layer Security

Scalable and flexible

  • Software simulator for evaluation and integration testing
  • Windows and Linux support
  • Broad ecosystem of integrations (PKI software, database encryption, …)

Relevant security classification

  • FIPS 140-2 Level 3 in progress
  • FIPS 140-3 planned
  • Common Criteria EAL4+
  • eIDAS QSCD planned

Various cryptographic algorithms

  • RSA, DSA, ECC with NIST and Brainpool curves
  • DH, ECDH with NIST and Brainpool curves
  • 5G, Block-Chain and PQC ready
  • SHA-1, SHA-2 and SHA-3 Family
  • AES, Triple DES, DES
  • EC-VRF
  • Hash-based deterministic RNG (NIST SP800-90B, AIS31 DRG.4)
  • True random number generator (AIS31 PTG.2)

SecurityServer

Our general-purpose HSM that ensures the security of cryptographic key material for servers and applications.

Find more details

u.trust 360

Centrally Manage cryptographic resources including Atalla and CryptoServer LAN V5 HSMs with u.trust 360.

Find more details

Downloads

Downloads

Kaunas Case Study
Case Study

KTU – Hardware-based DNSSEC Signing

How to Use Hardware-based Signing of Domain Name System Security Extensions (DNSSEC) to Protect Domains and Data in the Web
Hashicorp Case Study

HashiCorp – Centralized secrets management with regulatory compliance

How a Containerized Security Infrastructure Brings Data Protection and Regulatory Compliance Across a Distributed Application Infrastructure with Minimized Ramp Up, and Unlimited Scope to Evolve and Scale Up
Inwebo Case Study
Case Study

inwebo – Protecting digital identities: secure, simple and cost efficient

Request case study
Irdeto Case Study
Case Study

irdeto – Protecting Valuable Media Assets from the Threat of Piracy

How to Use Utimaco's Open Appliance Platform to Protect End-to-End Processes for Distributed Assets and the IoT against Threats of Piracy
MQA Case Study
Case Study

MQA – revolutionary step in digital sound quality and authenticity

Protecting Intellectual Property Rights Through Digital Signatures - Hardware-based Authentication of End-to-End Processes from Production to Delivery
NASK Case Study
Case Study

NASK – DNSSEC Implementation

How Hardware-based Signing of Domain Name System Security Extensions (DNSSEC) Helps Internet Service Providers Achieve Highest Security and Tamper Resistance in a Scalable, Cost-efficient Way with Minimal Implementation Time
Nexus Case Study
Case Study

nexus – Greenwave Systems use neXus and Utimaco products to offer secure solutions for smart homes

How to Protect Manufacturing and IoT Processes through Managed Digital Certificates Protected by Hardware Security Modules
Paynetworx outsources its Payment HSMs and key management to achieve a full cloud infrastructure
Case Study

Paynetworx outsources its Payment HSMs and key management to achieve a full cloud infrastructure

Request case study
Randtronics Case Study
Case Study

randtronics – Utimaco HSMs and Randtronics DPM protect enterprise-wide sensitive data

Hardware-based Protection of Sensitive Data Allowing for Easy Deployment, Use, Adaptation and Scalability
MYHSM Silverspringnetworks Case Study
Case Study

Silver Spring Networks – Securing the Smart Grid with Utimaco’s HSM

How to Protect High Value Assets in Distributed Systems through Digital Permits Managed by FIPS-Certified Hardware Security Modules
Demystifying the EU-U.S. Privacy Shield – Safe Harbor, Privacy Shield & Beyond
White Paper

Demystifying the EU-U.S. Privacy Shield – Safe Harbor, Privacy Shield & Beyond

Understanding the EU-U.S. Framework for Transatlantic Exchanges of Personal Data for Commercial Purposes (Privacy Shield, Safe Harbor, and more)
Hardware-based cryptographic key management in the Cloud
White Paper

Hardware-based cryptographic key management in the Cloud

How to Manage and Audit in a Role-based Way the Rights and Responsibilities of an Account, with Regards to its Data Access, Process Control and Resource Management
Performing key injection and remote key loading White Paper
White Paper

Performing Key Injection and Key Loading Remotely

How to Conduct Key Injection and Key Loading Remotely
Post-quantum cryptography: Secure encryption for the quantum age
White Paper

Post-quantum cryptography: Secure encryption for the quantum age

How to Conceive Secure, Crypto-Agile Encryption for the Quantum Age
Secure web conferencing White Paper
White Paper

Secure Web Conferencing

12 Recommendations on How to Maintain Data Security and Data Privacy in Web-Conferencing
Securing the IoT - OpenVPN and the Utimaco CryptoServer HSM
White Paper

Securing the IoT - OpenVPN and the Utimaco CryptoServer HSM

How to Secure the IoT through OpenVPNs and the Utimaco CryptoServer HSM
Security Architecture Models for the Cloud
White Paper

Security Architecture Models for the Cloud

This white paper demonstrates how HSMs are a cloud or on-premise agnostic solution and how a customer-centric scalable solution can be implemented.
Selecting the right Hardware Security Module (HSM)
White Paper

Selecting the right Hardware Security Module (HSM)

Request white paper
The Importance of Securing DNSSEC with the Utimaco HSM
White Paper

The Importance of Securing DNSSEC with the Utimaco HSM

How to Enhance Security with HSM-based Domain Name System Security Extensions (DNSSEC)
Building Trust White Paper
White Paper

u.trust Anchor – Building Trust in the Cloud

How to Integrate Payment & Multi-Purpose Use Cases in a Containerized Scalable & Multi-Tenant Platform
First generation converged crypto platform White Paper
White Paper

u.trust Anchor – First Generation Converged Crypto Platform

Discover How a Single Crypto Platform Can Cater for Many Separated HSMs and Use Cases and Can Be Deployed in the Cloud and on Premise
uTrust Anchor - Reduce Your Total Cost of Ownership Brochure
Brochure

Reduce Your Total Cost of Ownership – Product information Brochure

Request brochure
u.trust Anchor – Solution Brief Brochure
Brochure

u.trust Anchor – Solution Brief Brochure

Request brochure

Contact us

We look forward to answering your questions.

Our Partners

Look for the best implementation or distribution partner for your project.

Get in touch with us

Talk to one of our specialists and find out how Utimaco can help you today.