SecuriKey
Virtualize key security across any environment.
Seamlessly manage and protect keys entirely in software without comprising strong security with virtual hardware security modules (vHSM).
SecuriKey is a virtual HSM which protects cryptographic keys by splitting them into shares that reside on different devices, such that no party holds a full key, even in use.
Protect Against Theft and Misuse
The vHSM removes single point of attack vulnerabilities. Successfully hacking one device yields insufficient information to act.
Maintain Control of Your Security Presence (Even in the Cloud)
Remove reliance on black box hardware security, and secure keys without entrusting them to cloud and third-party custodians.
Seamlessly Integrate
Add strong API driven software security to manage and use keys in any environment, including cloud, on-prem, and mobile.
Use Cases
Encryption has played a vital role in enabling virtualization and cloud migration of business operations. However, encryption is only effective when the keys are sufficiently protected from theft and misuse. Unfortunately, common mechanisms for protecting keys fall short and slow businesses down. Further, many of these key protection responsibilities are entrusted to the cloud service provider, creating an unfavorable scenario in which the cloud service providers themselves can access a business’s data at any time without their knowledge.
SecuriKey for Mobile Device Binding
Register devices to user accounts and digitally sign authentication attempts to prove possession of a valid key share.
SecuriKey for Sovereign Cloud Enablement
Protect data in any region and ensure no one can access it without your knowledge and consent.
SecuriKey for Virtualized Enterprise Key Protection and Management
Virtualize your HSM presence to save costs and operational complexity, enabling the business to move faster and further.
SecuriKey virtualizes key protection and management, while removing the CSP’s ability to directly access their customers’ data. By splitting keys into shares that reside on different devices and are never combined, even in use, we eliminate the risk of single point of attack vulnerabilities and ensure the customer has full visibility and control over access and use of their assets. SecuriKey features include: