Document signing
Applications

Qualified Certificates for Qualified Electronic Signatures & Seals

Qualified Electronic Signatures & Qualified Seals

The eIDAS regulation established a common legal framework for secure electronic signatures, including standardized assurance levels, for the purpose of facilitating interoperability, acceptance and legal assurance.

Utimaco offers industry-proven eIDAS compliant solutions fulfilling policy and security requirements. Its solutions are highly scalable, hybrid-cloud and data center deployable seamlessly blend into workflows and processes for many industries, securing workflows, transactions and data privacy.

Business value

Business value

Icon

Dynamic Scalability

  • Designed for companies, governments and Trust Service Providers
  • Integrates banking platforms, cloud and service environments, mobile solutions, manufacturing infrastructures, government and health processes, the IoT and much more.
  • Fully scalable from low to high performance applications
  • Integratable in any existing architecture, including ERP, CRM, CIM
  • Multiple integrations with PKI applications, database encryption
  • PKI can be managed on-premise or cloud-based
  • Virtually unlimited scalability
Icon

eIDAS Compliant & Common Criteria Certified

  • Supports Trust Service Providers (TSPs), banks, and large organizations in fulfilling policy and security requirements defined in various ETSI technical standards (ETSI EN 319 401, EN 319 411, EN 319 421).
  • Ideally suited for eIDAS-compliant qualified signature creation and remote signing, meeting the requirements of a Qualified Signature Creation device.
  • Application areas include qualified certificates, including PSD2-certificates ETSI TS 119 495, OCSP (Online Certificate Status Protocol) and time stamping.
  • Common Criteria (CC) certified based on the eIDAS Protection Profile (PP) EN 419 241-2 & available as a PCIe plug-in card or as a network-attached appliance
  • Storing on FIPS-140-2 compliant hardware security modules.
Icon

Maximum Security & Compliance

  • Secures key storage and processing inside the secure boundary of the HSM
  • Extensive key management with key authorization
Icon

Remote Access

  • Extensive mechanisms for remote administration
  • Efficient key management and firmware updates via remote access
Icon

Software Simulator included

Included simulator allowing for evaluation and integration testing to benchmark the best possible solution for each specific case

Deployment options

Deployment options

Icon

On Premise

  • Useful for centralized use cases without a requirement of scalability or remote accessibility and existing legacy infrastructure
  • Defined total cost of ownership
  • Complete control on hardware and software, including configuration and upgrades
  • Secured uptime in areas with insatiable internet connectivity
  • Preferred choice in industry-segments where regulation imposes restrictions
Icon

In the Cloud

  • Strategic architectural fit & risk management for your high value assets
  • Provides flexibility, scalability and availability of HSM-as-a-service
  • Ideal for a multi-cloud strategy, supporting multi-cloud deployments & allows for migration flexibility
  • Allows you to seamlessly work with any Cloud Service Provider
  • Easy-to-use remote management and on-site key ceremony service option
  • Full control over data through encryption key life-cycle and key administration
  • Secured data privacy through Bring-Your-Own-Key procedures

Contact us

We look forward to answering your questions.

Get in touch with us

Talk to one of our specialists and find out how Utimaco can help you today.