YubiHSM 2 and YubiHSM 2 FIPS
Game changing cryptographic protection for servers, applications and computing devices.
Not your traditional HSM
The world’s smallest HSM secures modern infrastructures other traditional HSMs with a bigger footprint simply can’t
![](https://www.yubico.com/wp-content/uploads/2022/09/Illus-HSM2@2x.png)
Enhanced protection for
cryptographic keys
Secure generation, storage and management of digital keys.
![](https://www.yubico.com/wp-content/uploads/2022/09/Illus-buildings-dk-teal@2x.png)
Rapid integration with hardware-backed security
A comprehensive cryptographic open source toolbox with support for PKCS#11.
![](https://www.yubico.com/wp-content/uploads/2022/09/illus-chip-shield-dk-teal@2x.png)
Simplified deployment for organizations of all sizes
Ultra portable form factor at an affordable price secures a wide range of long-standing and emerging use cases.
Is the YubiHSM 2 or YubiHSM 2 FIPS right for you? | |
---|---|
Do you need to secure your manufacturing process / supply chain? | Yes |
Do you want to secure your software development process? | Yes |
Do you need to secure your crypto currency environment? | Yes |
Are you looking for an HSM that’s more cost effective than a traditional HSM? | Yes |
Are you looking for an HSM that is compact and highly portable? | Yes |
Looking for a FIPS 140-2 validated HSM? You may prefer the YubiHSM 2 FIPS Buy now |
YubiHSM 2 and YubiHSM 2 FIPS Key capabilities
![](https://www.yubico.com/wp-content/uploads/2022/09/YubiHSM-2-YubiHSM-2-FIPS-pairs-new-fronts@2x-1.png)
YubiHSM 2 and YubiHSM 2 FIPS highlights:
Game changing cryptographic protection for servers, applications and computing devices.
- Portable nano form factor with low-power usage
- Secure key storage and crypto operations on a tamper-resistant device
- Network shareable for use by applications on other servers
- Interfaces via YubiHSM KSP, PKCS #11 and native libraries
- Direct USB support beneficial for virtualized environments
- IP68 rated, crush resistant, no batteries required, no moving parts
Read the YubiHSM 2 and YubiHSM 2 FIPS product brief >
Enhanced protection for cryptographic keys
- Improve key management by preventing the local copying and distribution of cryptographic keys
- Defend against remote attacks and eliminate remote extraction of private keys by storing cryptographic keys securely on hardware
- Strong hardware-based security ensures the highest bar for protection of sensitive information and data
- Experience even stronger security with the ability to store YubiHSM 2 authentication keys on a YubiKey, to eliminate yet another password
![](https://www.yubico.com/wp-content/uploads/2022/09/HSM-insert-server@2x-1.png)
![](https://www.yubico.com/wp-content/uploads/2022/09/HSM-insert-server-palo-alto-office@2x.png)
Rapid integration with hardware-backed security
- Open source SDK enables rapid integration
- Frees developers to easily build support for hardware-based strong security into a wide array of platforms, applications and services
- Enables organizations to easily make the YubiHSM 2 features accessible through industry standard PKCS#11
Simplified deployment for organizations of all sizes
- Ultra-portable and fits easily into a front USB slot on computers and servers
- Secures modern use cases such as cryptocurrency exchanges, IoT gateways and proxies and cloud services
- Secures Microsoft Entra ID certificates
![](https://www.yubico.com/wp-content/uploads/2022/09/YK-Nano-chris-s@2x.png)
Secure your manufacturing and supply chain operations
Looking to enhance security for the following areas? The YubiHSM 2 can help. | |
---|---|
Are you looking to secure your PKI environment, including protecting your certificate authority (CA)? | Yes |
Are you looking to encrypt your files or databases? | Yes |
Do you need to sign code or any digital artifact, such as firmware or an element embedded on an electronic device? | Yes |
Looking for a FIPS 140-2 validated HSM? You may prefer the YubiHSM 2 FIPS Buy now I Download deployment documentation |
Learn how YubiHSM 2 safeguards corporate secrets and secure manufacturing
Read this white paper to learn how manufacturing companies can protect supply chains and intellectual property with the YubiHSM.
![](https://www.yubico.com/wp-content/uploads/2022/09/image-WP-LP-UYubiHSM-2-secure-keystone-mfg@2x-1024x762-1@2x.png)
YubiKey protects the world’s leading brands
![logo garden](https://www.yubico.com/wp-content/uploads/2023/11/DCT-1338-logo-garden@2x-1-1024x269.png)
Get Started
![](https://www.yubico.com/wp-content/uploads/2021/05/213366-Image-HSM2-FIPS-2-1024x296.png)
Learn about the HSM
Contact our sales team for a personalized assessment of your company’s needs.
![](https://www.yubico.com/wp-content/uploads/2021/02/14-1-1024x683.jpg)
Already have YubiHSM? Visit our support page for deployment guides and practical implementation considerations