Overview

Technology is obviously an industry exceeding tremendous growth. Technology manufacturing is moving particularly fast in response to the massive rise in demand for electronic communication and business.

The uptake is centered around secure and trusted devices, such as mobiles devices, smart cards, Hardware Security Modules (HSMs) etc.
Trusted (and sometimes not so trusted) devices are characterized by contacting multipurpose chips with lots of functionality, including security used for encryption and authentication.

There are many layers of security that needs to be addressed in technology, including:

  • Production, e.g.initialization
  • Personalization
  • Ongoing updates, e.g. secure applications

Cryptomathic products are used by technology providers all over the world, where most of our deliveries are based on our standard off-the-shelf products, with a small element of customization to meet the individual requirements relating to the technology that we are applying security to.

The technology areas where Cryptomathic is an active serious player include Trusted Platform Modules, Digital Rights Management, Tachograph and Utilities.

Product Groups

The products that Cryptomathic supply to technology are based on two groups:

Read more

Key Management

Read more

PKI & ID

Testimonials


White Papers

Access free resources

At the leading edge of security provision within its key markets, Cryptomathic closely supports its global customer base with many multinationals as longstanding clients.

  • WHITE PAPER

    EMV Key Management - explained

    Lack of overview or trouble
    understanding EMV key management?
    EMV as seen from a crypto angle for all involved parties in acquiring and issuing.

    READ WHITE PAPER
  • WHITE PAPER

    Business & technical implications Regulatory standards Managing digital signatures

    Digital documents are increasingly commonplace in today's business world.

    READ WHITE PAPER
  • WHITE PAPER

    eIDAS Compliant Remote eSigning

    What is the most secure and user-friendly digital signing experience? Explore the key business advantages and the security requirements for remote e-signatures in accordance with eIDAS.

    READ WHITE PAPER
  • WHITE PAPER

    Key Management Compliance - explained

    Need to explore the complex world of crypto key management? Understand major aspects, including regulatory authorities, compliance schemes, audits, best practices and more.

    READ WHITE PAPER
  • WHITE PAPER

    Cloud Signing vs
    Smart Card Signing

    Which digital signature technology is most applicable for large organisations? Compare the security, usability and costs of different signature generation technologies.

    READ WHITE PAPER
  • WHITE PAPER

    Secure Mobile Transactions - fact or fiction?

    Are banking and payment apps adequately secure against today’s attacks? Understand the threat landscape and how an evolutionary security strategy can deliver long term protection.

    READ WHITE PAPER

Related content

About

About
Cryptomatic

White Papers

Access all
White Papers

Case Studies

Read all
Case Studies

Blog

Check out
our Blog