Overview

Cloud Computing Security is increasingly becoming a hot potato: i.e. something that nobody wants to have to hold onto for too long. On the one hand, the lure of being able to run ones apps off no-hassle machines hosted by Software as a Service (SaaS) providers, the security element is often managed either through unconditional trust in the Cloud Service provider or through hybrid scenarios including bridges and connections out of the cloud and into own dedicated servers for sensitive operations.

In other words, there is a missing link between the application-specific security model of trusted servers which are secure a) either through being hosted in secure environment or b) by using dedicated HSMs (Hardware Security Modules) for server-side applications and personal security environments for protecting personal keys.

Based on Cryptomathic's internationally recognized unique IP technology it is possible to close this gap and ensure that operations carried out in the cloud are as secure as those carried out in a secured and dedicated data center.

Within the cloud security space, Cryptomathic provides:

  • Cloud Security Services (routing data through to underlying and accredited hardware security modules)
  • Key and Security Application Life Cycle Management for BYOK
  • Personal Security Credential Management (allowing the users to sign electronic documents securely and remotely)

In this space, Cryptomathic serves the World's largest payment schemes, the largest financial services providers and the largest eID / eBank / eGov holistic schemes provided to date.

Product Groups

Cryptomathic products used in the cloud security sector are centered around two groups:

Read more

Authentication & Signing

Read more

Key Management

Testimonials


White Papers

Access free resources

At the leading edge of security provision within its key markets, Cryptomathic closely supports its global customer base with many multinationals as longstanding clients.

  • WHITE PAPER

    Securing Mobile Banking Apps with MASC

    Are banking and payment apps adequately secure against known and unknown attacks? Understand the threat landscape and how MASC's evolutionary security strategy can overcome such threats and provide
    360º protections against attacks.

    READ WHITE PAPER
  • WHITE PAPER

    Achieving Real-World Crypto-Agility

    This white paper provides a business-focused look at the challenges of managing cryptography in the financial sector and the benefits available from a centrally managed, agile cryptographic platform.

    READ WHITE PAPER
  • WHITE PAPER

    Selecting the Right Key Management System

    What are the important attributes to consider when evaluating a key management system? This paper describes a variety of systems that exist in the market and provides guidance to narrow down the field to best meet your requirements.

    READ WHITE PAPER
  • WHITE PAPER

    EMV Key Management - explained

    Lack of overview or trouble
    understanding EMV key management?
    EMV as seen from a crypto angle for all involved parties in acquiring and issuing.

    READ WHITE PAPER
  • E-BOOK

    Digital Signatures for Dummies

    Want to learn more about digital signatures? This book guides you through the new business environment and its implications. It outlines the regulatory standards and demystifies the relevant technologies for deploying and managing digital signatures. 

    GET THE E-BOOK
  • WHITE PAPER

    eIDAS Compliant Remote eSigning

    What is the most secure and user-friendly digital signing experience? Explore the key business advantages and the security requirements for remote e-signatures in accordance with eIDAS.

    READ WHITE PAPER
  • WHITE PAPER

    Key Management Compliance - explained

    Need to explore the complex world of crypto key management? Understand major aspects, including regulatory authorities, compliance schemes, audits, best practices and more.

    READ WHITE PAPER
  • WHITE PAPER

    Cloud Signing vs
    Smart Card Signing

    Which digital signature technology is most applicable for large organizations? Compare the security, usability and costs of different signature generation technologies.

    READ WHITE PAPER

Related content

About

About
Cryptomatic

White Papers

Access all
White Papers

Case Studies

Read all
Case Studies

Blog

Check out
our Blog