Tag: YubiHSM 2

Home » YubiHSM 2
  • YubiHSM 2 (v2.4) expands to include simplified and secure backups and ‘Bring Your Own Key’ supportAs the rate and complexity of credential theft and phishing attacks on enterprises continue to increase rapidly, so do the number of server-based attacks. YubiHSM 2, the leading nano-form factor hardware security module (HSM), offers organizations superior protection from these attacks for sensitive data against theft and misuse. The new YubiHSM 2 (v2.4) – officially […]Read moreBYOKYubiHSMYubiHSM 2
  • YubiHSM 2’s ‘Bring Your Own Key’ is portable security for cloudCreating a robust data encryption strategy in a multi-cloud environment can be challenging. Considerations like availability, fail-over, control, cost and compliance are crucial. For organizations that are encrypting data on-premises and considering moving data to the cloud, a typical approach is to use an on-premises Hardware Security Module (HSM) or a cloud-based HSM. However, acquiring […]Read moreBYOKYubiHSM 2
  • YubiHSM 2, the world’s smallest hardware security module, enhanced with new features to support security for the Public SectorCompliance mandates require many of our customers in regulated industries or in high-risk environments to prove adequate levels of protection for their data, no matter where it lives or travels. This is why we’ve continued to enhance the capabilities of both the YubiHSM 2 and YubiHSM 2 FIPS, the world’s smallest FIPS-validated and non-FIPS hardware […]Read moreFIPS 140-2Public SectorYubiHSMYubiHSM 2
  • Yubico Logoboeing-customer-offerBoeing has identified the Yubico YubiHSM 2 as a USB Hardware Security Module (HSM) device that will meet key and certificate management requirements identified in ATA Spec 42, Level 4.Read morecryptographyYubiHSMYubiHSM 2
  • What SolarWinds taught us about the importance of a secure code signing systemLast year’s SolarWinds attack was caused by intruders who managed to inject Sunspot malware into the software supply chain. The hackers exploited a breach in the SolarWinds code signing system, which allowed them to fraudulently distribute malicious code as legitimate updates to installations across the world. While this attack taught the industry many lessons, one […]Read moredata breachdevelopersYubico Developer ProgramYubiHSMYubiHSM 2
  • YubiKey firmware update: YubiKey 5 Series with firmware 5.4As of today, Yubico will start shipping the YubiKey 5 Series with firmware 5.4. This new firmware release will enable easier integration with Credential Management System (CMS) solutions, secure remote provisioning of YubiKeys, and expanded methods for PIV management.  Key benefits of the YubiKey Firmware Update for the YubiKey 5 Series with 5.4 firmware include: […]Read moreYubiHSM 2YubiKey 5
  • A Yubico first…introducing the YubiHSM 2 FIPSCompliance mandates require many of our customers in regulated industries or in high-risk environments to prove adequate levels of protection for their data, no matter where it lives or travels. This is why today we’ve not only launched the YubiKey 5 FIPS Series but also the smallest FIPS-validated hardware security module (HSM) in the world, […]Read morecomplianceFIPS 140-2YubiHSM 2
  • YubiHSM2 product briefYubiHSM 2 ensures uncompromised cryptographic hardware security for applications, servers and computing devices. Read moreYubiHSMYubiHSM 2
  • manufacturing solution briefModernize security across manufacturingIn order to protect against modern cyber attacks on critical infrastructure and the software supply chain, security solutions need to modernize. Learn how to implement phishing-resistant MFA and safeguard the supply chain with Yubico solutions.Read moremanufacturingmodern authenticationphishing-resistant MFAsupply chainYubiHSM 2YubiKey
  • Yubico LogoYubiHSM 2 libraries and toolsWhat is the YubiHSM 2? The YubiHSM 2 is a Hardware Security Module that provides advanced cryptography, including hashing, asymmetric and symmetric key cryptography, to protect the cryptographic keys that secure critical applications, identities, and sensitive data in an enterprise for certificate authorities, databases, code signing and more. For more information see the YubiHSM 2 Product […]Read moreYubiHSMYubiHSM 2