Security & Compliance
CloudHSM Economy
Managed hardware security module (HSM) in the cloud
Securosys CloudHSM provides cloud-based hardware security modules (HSMs) for generating and using your own encryption keys with your applications. With CloudHSM, you can manage your own encryption keys using FIPS 140-2 Level 3 validated HSMs designed & built by Securosys.
How it works
Benefits and features
Work with an open HSM built on industry standardsSecurosys CloudHSM operates on a patented proprietary hardware and software architecture, meticulously crafted and sustained in-house, ensuring end-to-end control without any intermediaries. |
Easy to manage and scaleSecurosys CloudHSM automates time-consuming HSM administrative tasks, such as hardware provisioning, software patching, high availability, and backups. You can quickly add and remove HSMs from your cluster on-demand. Securosys Cloud automatically load balances requests and securely duplicates keys stored in any HSM to all HSMs in the cluster. |
Configure your keys within minutesYour HSMs can easily connect with your existing systems without any setup or hardware evaluation. CloudHSM is preconfigured to offer a 24/7 service and an installation within minutes. You can use industry-standard APIs, such as REST, PKCS#11, Java Cryptography Extensions (JCE), and Microsoft CryptoNG (CNG) libraries. |
Geo-redundant locationsYour HSMs remain accessible even in the event of an elementary damage. They are mirrored at 3 geographically separate locations, one of them located in an underground data center total shielding against electromagnetic pulses (EMP/HMP, BSI zone 3 / NATO zone 2). |
Access your key at anytimeYour keys are stores in two data centers and in a backup location ensuring maximum availability and zero downtime. Every location offers a double internet access (multi-homed). |
Keep control of your encryption keysSecurosys CloudHSM provides secure access to your HSMs so you can create users and set HSM policies. The encryption keys that you generate and use with CloudHSM are accessible only by the HSM users that you specify. Securosys has no visibility or access to your encryption keys. |
Related services
CloudHSM Sandbox
A managed service providing a pre-production environment, the ideal for testing & proof-of-concepts. Easily integrate with your applications using industry-standard APIs.
CloudHSM Certified
A managed service using certified hardware & software.
CloudHSM for Amazon Web Services (AWS)
A managed service with an External Key Store (XKS) Proxy to be integrated with Amazon Web Services (AWS).