<img alt="" src="https://secure.weed6tape.com/193471.png" style="display:none;">
Security & Compliance

CloudHSM Economy

Managed hardware security module (HSM) in the cloud

Securosys CloudHSM provides cloud-based hardware security modules (HSMs) for generating and using your own encryption keys with your applications. With CloudHSM, you can manage your own encryption keys using FIPS 140-2 Level 3 validated HSMs designed & built by Securosys.

How it works

Securosys CloudHSM stores your keys in your HSMs in the cloud. It easily & securely integrates with your application using industry-standard APIs.

Benefits and features

Work with an open HSM built on industry standards

Securosys CloudHSM operates on a patented proprietary hardware and software architecture, meticulously crafted and sustained in-house, ensuring end-to-end control without any intermediaries.

Easy to manage and scale

Securosys CloudHSM automates time-consuming HSM administrative tasks, such as hardware provisioning, software patching, high availability, and backups. You can quickly add and remove HSMs from your cluster on-demand. Securosys Cloud automatically load balances requests and securely duplicates keys stored in any HSM to all HSMs in the cluster.

Configure your keys within minutes

Your HSMs can easily connect with your existing systems without any setup or hardware evaluation. CloudHSM is preconfigured to offer a 24/7 service and an installation within minutes. You can use industry-standard APIs, such as REST, PKCS#11, Java Cryptography Extensions (JCE), and Microsoft CryptoNG (CNG) libraries.

Geo-redundant locations

Your HSMs remain accessible even in the event of an elementary damage. They are mirrored at 3 geographically separate locations, one of them located in an underground data center total shielding against electromagnetic pulses (EMP/HMP, BSI zone 3 / NATO zone 2).

Access your key at anytime

Your keys are stores in two data centers and in a backup location ensuring maximum availability and zero downtime. Every location offers a double internet access (multi-homed).

Keep control of your encryption keys

Securosys CloudHSM provides secure access to your HSMs so you can create users and set HSM policies. The encryption keys that you generate and use with CloudHSM are accessible only by the HSM users that you specify. Securosys has no visibility or access to your encryption keys.

Getting started

Select a region for your HSM.

Europe (Germany/Switzerland)
clock_hex1b8d4c 1h

de01-api.cloudshsm.com

ch02-api.cloudshsm.com

North America (USA)
clock_hex1b8d4c 1h

us01-api.cloudshsm.com

us02-api.cloudshsm.com

Asia Pacific (Singapore)
clock_hex1b8d4c 1h

sg01-api.cloudshsm.com

Switzerland

clock_hex1b8d4c 1h

ch01-api.cloudshsm.com

ch02-api.cloudshsm.com

Global
clock_hex1b8d4c 1h

de01-api.cloudshsm.com

us01-api.cloudshsm.com

us02-api.cloudshsm.com

sg01-api.cloudshsm.com

Proceed to the checkout to generate a pricing offer and adjust the VAT.

Pricing

You pay a monthly fee for the Economy (ECO) service package. Rates vary by region.

Included: attestation, setup, maintenance and support.