Click here to close now.


@CloudExpo Authors: Pat Romanski, Elizabeth White, Yeshim Deniz, Jason Bloomberg, Liz McMillan

News Feed Item

Data Protection in Cloud Applications Thanks to Utimaco's Flexible HSM Technology

AACHEN, Germany, November 6, 2012 /PRNewswire/ --

Utimaco is the world's first company to present an OEM program for HSMs - at CARTES in Paris, from November 6 to 8, 2012, Hall 4 at Stand M062

At CARTES 2012, Utimaco Software AG and its partners are presenting innovative solutions for hardware security modules (HSM) as anchors of trust. In addition to eID and payment, cloud applications are the focus of this year's exhibition, with special emphasis on data protection and compliance for business solutions.

Utimaco's HSMs form the foundation for numerous innovations requiring the highest security standards. Particularly in the cloud there is the need to protect sensitive data from unauthorized access, while ensuring scalability, reliability and high availability at the same time.

In line with Utimaco's theme "As unique as you are", the HSMs are so flexible that they make nearly every cloud application significantly more secure, which is achieved by leveraging applied cryptography. "Data protection and compliance are key needs, next to cloud business solutions. With our HSMs as an anchor of trust, we and our partner In-Webo are together showing cloud-based authorization solutions at CARTES 2012," proudly reports Jörn Horn, Business Development Manager HSM for Utimaco.

The France-based specialists for authorization have remained true to their vision of a cloud-based authorization platform - and thus developed a solution using Utimaco HSMs which allows a central security criterion, such as authorization, to be outsourced to the in-house IT department without any worries. Because the platform is in the cloud, it is not only flexible but also lowers both investment as well as operational costs while simultaneously guaranteeing compliance. Thanks to the use of HSMs, the platform can verify its own integrity and is immune against external attacks. "Among HSM providers, only Utimaco's products are able to run our audited authorization algorithm and meet the strictest high availability requirements at the same time," says Didier Perrot, CEO for In-Webo.

As par for the course at Utimaco, the company's own engineers were able to actively support the development of In-Webo's platform within the framework of the comprehensive partner program. "Depending on the level of partnership, our partner can rely on a customized level of support by Utimaco," says Björn Jansen, Partner Manager HSM for Utimaco.

Based on years of experience in the support of individual projects, such as that from In-Webo, Utimaco is now going a step further when it comes to customization. As the first manufacturer in the HSM market, Utimaco offers an OEM program which enables providers of all-in-one solutions to create tailor-made solutions with HSMs.

At CARTES 2012, Utimaco is presenting its new OEM program, which specifically encompasses the following four modules:

  • Product: The broad and proven product range of SafeGuard CryptoServer with its entire scope - from a "legacy" HSM solution to a software development kit.
  • Consulting: A comprehensive consulting module with which the clients can draw on more than 30 years of experience in integration.
  • Logistics: Adaptable global logistics processes.
  • Support: A custom support package tailored to clients' requirements - from assistance with software development for HSMs to support during malfunctions.

Utimaco is presenting its innovative OEM program, as well as its CryptoServer with the use of 3D animations, at CARTES 2012, Stand M062 in Hall 4.

About Utimaco

Utimaco Safeware AG, a member of the Sophos Group, has been a global leading provider for data encryption and the related cryptography for 25 years. The division of Hardware Security Modules (HSM) provides a comprehensive product portfolio for security requirements in industrial applications including the only freely-programmable HSM technology. Utimaco HSM develops and produces its CryptoServer product lines exclusively in its German headquarters. Utimaco HSM operates globally through its own sales and service network in Germany and North America and through its international partner network.

Press contact

Tanja Tölke
Utimaco Safeware AG - A member of the Sophos Group
Germanusstr. 4
52080 Aachen

Fon: +49-241-1696-210
Fax: +49-241-1696-199
e-mail: [email protected]

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@CloudExpo Stories
There are many considerations when moving applications from on-premise to cloud. It is critical to understand the benefits and also challenges of this migration. A successful migration will result in lower Total Cost of Ownership, yet offer the same or higher level of robustness. Migration to cloud shifts computing resources from your data center, which can yield significant advantages provided that the cloud vendor an offer enterprise-grade quality for your application.
JFrog has announced a powerful technology for managing software packages from development into production. JFrog Artifactory 4 represents disruptive innovation in its groundbreaking ability to help development and DevOps teams deliver increasingly complex solutions on ever-shorter deadlines across multiple platforms JFrog Artifactory 4 establishes a new category – the Universal Artifact Repository – that reflects JFrog's unique commitment to enable faster software releases through the first pla...
Overgrown applications have given way to modular applications, driven by the need to break larger problems into smaller problems. Similarly large monolithic development processes have been forced to be broken into smaller agile development cycles. Looking at trends in software development, microservices architectures meet the same demands. Additional benefits of microservices architectures are compartmentalization and a limited impact of service failure versus a complete software malfunction....
IT data is typically silo'd by the various tools in place. Unifying all the log, metric and event data in one analytics platform stops finger pointing and provides the end-to-end correlation. Logs, metrics and custom event data can be joined to tell the holistic story of your software and operations. For example, users can correlate code deploys to system performance to application error codes.
Through WebRTC, audio and video communications are being embedded more easily than ever into applications, helping carriers, enterprises and independent software vendors deliver greater functionality to their end users. With today’s business world increasingly focused on outcomes, users’ growing calls for ease of use, and businesses craving smarter, tighter integration, what’s the next step in delivering a richer, more immersive experience? That richer, more fully integrated experience comes ab...
The buzz continues for cloud, data analytics and the Internet of Things (IoT) and their collective impact across all industries. But a new conversation is emerging - how do companies use industry disruption and technology enablers to lead in markets undergoing change, uncertainty and ambiguity? Organizations of all sizes need to evolve and transform, often under massive pressure, as industry lines blur and merge and traditional business models are assaulted and turned upside down. In this new da...
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data...
As-a-service models offer huge opportunities, but also complicate security. It may seem that the easiest way to migrate to a new architectural model is to let others, experts in their field, do the work. This has given rise to many as-a-service models throughout the industry and across the entire technology stack, from software to infrastructure. While this has unlocked huge opportunities to accelerate the deployment of new capabilities or increase economic efficiencies within an organization, i...
The web app is agile. The REST API is agile. The testing and planning are agile. But alas, data infrastructures certainly are not. Once an application matures, changing the shape or indexing scheme of data often forces at best a top down planning exercise and at worst includes schema changes that force downtime. The time has come for a new approach that fundamentally advances the agility of distributed data infrastructures. Come learn about a new solution to the problems faced by software organ...
Between the compelling mockups and specs produced by analysts, and resulting applications built by developers, there exists a gulf where projects fail, costs spiral, and applications disappoint. Methodologies like Agile attempt to address this with intensified communication, with partial success but many limitations. In his session at DevOps Summit, Charles Kendrick, CTO and Chief Architect at Isomorphic Software, will present a revolutionary model enabled by new technologies. Learn how busine...
SYS-CON Events announced today that Dyn, the worldwide leader in Internet Performance, will exhibit at SYS-CON's 17th International Cloud Expo®, which will take place on November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Dyn is a cloud-based Internet Performance company. Dyn helps companies monitor, control, and optimize online infrastructure for an exceptional end-user experience. Through a world-class network and unrivaled, objective intelligence into Internet condit...
The last decade was about virtual machines, but the next one is about containers. Containers enable a service to run on any host at any time. Traditional tools are starting to show cracks because they were not designed for this level of application portability. Now is the time to look at new ways to deploy and manage applications at scale. In his session at @DevOpsSummit, Brian “Redbeard” Harrington, a principal architect at CoreOS, will examine how CoreOS helps teams run in production. Attende...
Containers are revolutionizing the way we deploy and maintain our infrastructures, but monitoring and troubleshooting in a containerized environment can still be painful and impractical. Understanding even basic resource usage is difficult - let alone tracking network connections or malicious activity. In his session at DevOps Summit, Gianluca Borello, Sr. Software Engineer at Sysdig, will cover the current state of the art for container monitoring and visibility, including pros / cons and li...
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at @DevOpsSummit, Kevin Gilpin, CTO and Co-Founder of Conjur, will discuss various security considerations for container-based infrastructure and related DevOps workflows.
There are so many tools and techniques for data analytics that even for a data scientist the choices, possible systems, and even the types of data can be daunting. In his session at @ThingsExpo, Chris Harrold, Global CTO for Big Data Solutions for EMC Corporation, will show how to perform a simple, but meaningful analysis of social sentiment data using freely available tools that take only minutes to download and install. Participants will get the download information, scripts, and complete en...
Manufacturing has widely adopted standardized and automated processes to create designs, build them, and maintain them through their life cycle. However, many modern manufacturing systems go beyond mechanized workflows to introduce empowered workers, flexible collaboration, and rapid iteration. Such behaviors also characterize open source software development and are at the heart of DevOps culture, processes, and tooling.
Internet of Things (IoT) will be a hybrid ecosystem of diverse devices and sensors collaborating with operational and enterprise systems to create the next big application. In their session at @ThingsExpo, Bramh Gupta, founder and CEO of, and Fred Yatzeck, principal architect leading product development at, discussed how choosing the right middleware and integration strategy from the get-go will enable IoT solution developers to adapt and grow with the industry, while at th...
“All our customers are looking at the cloud ecosystem as an important part of their overall product strategy. Some see it evolve as a multi-cloud / hybrid cloud strategy, while others are embracing all forms of cloud offerings like PaaS, IaaS and SaaS in their solutions,” noted Suhas Joshi, Vice President – Technology, at Harbinger Group, in this exclusive Q&A with Cloud Expo Conference Chair Roger Strukhoff.
Can call centers hang up the phones for good? Intuitive Solutions did. WebRTC enabled this contact center provider to eliminate antiquated telephony and desktop phone infrastructure with a pure web-based solution, allowing them to expand beyond brick-and-mortar confines to a home-based agent model. It also ensured scalability and better service for customers, including MUY! Companies, one of the country's largest franchise restaurant companies with 232 Pizza Hut locations. This is one example of...
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...