Yubico Introduces YubiHSM to Protect Secrets on Servers

PALO ALTO, Calif. and STOCKHOLM, Apr. 06, 2011 — Yubico, the company behind the popular authentication token YubiKey, today presents a new approach for protecting secrets on authentication servers. The new innovation is named YubiHSM, has the form of a USB key and is designed to protect a server at a yet unmatched simplicity and low cost.

 

Hundreds of thousands of servers around the world are storing sensitive user data and cryptographic secrets related to users. A rapidly increasing number of these servers are being attacked remotely via the Internet, where user data becomes compromised. Despite the growing need for secure servers, the high cost for Hardware Security Modules (HSMs), with a typical price tag starting at 15,000 US Dollars, leaves the vast majority of servers with a low level of protection.

Yubico solved its own security needs by developing an “HSM Light” in the form of a small USB device where sensitive user data and cryptographic operations are moved out from the server to the external device. This approach protects the sensitive information from being remotely compromised. The initial response from partners and security experts convinced the Yubico innovators to offer the YubiHSM to a broader audience.

Yubico is inviting its developer’s community to refine the YubiHSM and define the functionality set of the final product. Developers who would like to contribute with applications and the further development of the open source client software can today apply to get a free beta YubiHSM from Yubico.

“Many universities are running Kerberos and SAML servers, vulnerable for remote attacks. The YubiHSM is an innovative solution, addressing basic security needs at an affordable cost,” says Stefan Wold, Systems Architect at Stockholm University, and one of the developers who has been selected to join the YubiHSM beta program.

The community development will result in a launch of the YubiHSM 1.0, offered in the Yubico web store for 500 US Dollars. 

For more information about the YubiHSM beta program, please click here.

 

About Yubico

Yubico sets new global standards for simple and secure access to computers, mobile devices, servers, and internet accounts.

The company’s core invention, the YubiKey, delivers strong hardware protection, with a simple touch, across any number of IT systems and online services. The YubiHSM, Yubico’s ultra-portable hardware security module, protects sensitive data stored in servers.

Yubico is a leading contributor to the FIDO2WebAuthn, and FIDO Universal 2nd Factor open authentication standards, and the company’s technology is deployed and loved by 9 of the top 10 internet brands and by millions of users in 160 countries.

Founded in 2007, Yubico is privately held, with offices in Sweden, UK, Germany, USA, Australia, and Singapore. For more information: www.yubico.com

Press RoomPress Room

Share this article:


  • Piloting Europe’s future ID: Passkeys securing digital walletsOver the last several years, passkeys have become ubiquitous. They are available on every mobile platform, in every leading browser, as part of all major enterprise IAM solutions, and in most major cloud services. Until wwWallet came along, the only place where passkeys hadn’t yet made an impact is in the rapidly developing world of […]Read moredigital identity walletspasskeysSIROSwwWallet
  • We’re excited for what’s to come – meet us in-person to find out whyIt’s been a busy year for our team, filled with exciting company and product updates aimed at better serving our customers and helping them achieve cyber resilience as AI-driven phishing threats continue evolving globally. Between industry award recognitions and key new executive leadership hires to lead Yubico to its next stage of growth and a […]Read more
  • FIPS certified vs. FIPS compliant: What’s the real difference?“Is your MFA solution FIPS compliant, or is it certified?”  This is a question we hear a lot, and for good reason. In industries where security and compliance are critical (especially in government contracts), understanding the difference between FIPS certified and FIPS compliant isn’t just semantics – it can mean the difference between meeting requirements […]Read moreFIPSNIST
  • 2025 Global State of Authentication survey: A world of difference in cybersecurity habitsIn a world that’s more connected than ever, the landscape of cybersecurity threats is constantly evolving. Bad actors, now supercharged with artificial intelligence (AI), are becoming increasingly adept at exploiting human error through sophisticated phishing and social engineering attacks. This makes robust cybersecurity a universal issue, impacting everyone from individuals to the largest global enterprises. […]Read moreGlobal State of Authenticationsurvey