A Yubico first…introducing the YubiHSM 2 FIPS

May 3, 2021 3 minute read

Compliance mandates require many of our customers in regulated industries or in high-risk environments to prove adequate levels of protection for their data, no matter where it lives or travels. This is why today we’ve not only launched the YubiKey 5 FIPS Series but also the smallest FIPS-validated hardware security module (HSM) in the world, the YubiHSM 2 FIPS. The YubiHSM 2 FIPS meets FIPS 140-2, Level 3.

While the YubiHSM 2 launched in 2017, there’s never been a FIPS-validated version of the product. Now, our high-risk customers can achieve and maintain compliance while getting the same security benefits as other YubiHSM users. These include advanced protection for certificate authority (CA) keys, database master keys, code signing, authentication/access tokens, manufacturing processes and component authenticity checks, IoT gateways or proxies, file encryption, cryptocurrency exchanges, and more.

While credential theft and phishing attacks continue to skyrocket, so do the number of server-based attacks. Approximately 95% of all IT breaches happen when a user credential or server gets hacked — a fact reinforced by the dizzying array of breaches to hit news headlines within the past year. And with 53% of all respondents from our study with 451 Research saying they’ve experienced a security incident or breach in the past year, the need for strong security across an organization’s entire infrastructure becomes even more clear.

The rise of threats like zero-day exploits and malware, makes software-based cryptographic key storage increasingly vulnerable for organizations. Alternatively, HSMs offer advanced protection, backed by tamper-resistant hardware, for servers and the cryptographic keys stored within them. 

Clearly, we’re big fans of the YubiHSM 2 FIPS. But if it wasn’t clear why you should also be a fan, here are some more reasons:

  • Secure hardware protection for cryptographic keys

The YubiHSM 2 FIPS enables secure key storage and operations on tamper-resistant hardware, with audit logging. This prevents accidental copying and distribution of keys, and remote theft of cryptographic software keys. Extensive cryptographic capabilities include: hashing, key wrapping, asymmetric signing, decryption, attestation and more. 

  • Innovative design for flexible use and simple deployment

Traditional rack-mounted and card-based HSMs are not practical for many organizations due to their size and deployment complexity. The YubiHSM 2 FIPS offers a portable ‘nano’ form factor that allows fast and flexible deployment across diverse environments. It fits easily into a USB-A slot, lying almost flush to remain concealed. 

  • Low-cost, high security ROI

The YubiHSM 2 FIPS delivers government-grade high cryptographic security and operations at a price point that is up to 90% cheaper than traditional HSMs. Additionally, low-power usage reduces business energy consumption. 

For more information on YubiHSM 2 FIPS, please visit the Yubico site. It is also available for purchase on the Yubico store, through Yubico’s dedicated sales team, or from any Yubico-approved channel partners and resellers

Share this article:

Recommended content

The YubiKey 5 FIPS Series is here and there are 5 things you need to know

Today, we’re thrilled to announce yet another product milestone in addition to the launch of YubiHSM 2 FIPS — the long-awaited YubiKey 5 FIPS Series is now generally available. It is the industry’s first set of multi-protocol security keys with support for FIDO2 and WebAuthn, along with smart card (PIV/CAC), to receive FIPS 140-2 validation, Overall ...

Top 10 security regulations you need to know about in the U.S. and EU

Compliance has always been part of routine planning and development for security experts in the enterprise. But recent headline-grabbing attacks like the SolarWinds incident may have pushed compliance much higher up the priority list. It’s difficult to track the dizzying array of regulations on both sides of the pond and what they require, so we’ve ...

YubiHSM2 product brief

YubiHSM 2 ensures uncompromised cryptographic hardware security for applications, servers and computing devices.

Portable root of trust for government

The YubiKey is a portable root for remote workers, non PIV/CAC eligible workers, mobile/BYOD, and shared devices/workstations.