Unbound Tech Virtual Hardware Security Module (vHSM)
Photo Gallery
Unbound Tech Virtual Hardware Security Module (vHSM)
Additional Info
Company | Unbound Tech |
Website | http://www.unboundtech.com |
Company size (employees) | 50 to 99 |
Overview
With Unbound’s Virtual Hardware Security Module (vHSM), organizations can centrally manage, fully automate and scale key management without the need for hardware.
Unbound’s vHSM is an elastic and flexible key management platform that supports both virtualized and non-virtualized environments. As a software-only solution, UKC requires minimal efforts to setup, use and maintain in a variety of environments and application delivery models, including Dockers and containers. All key management and user management operations are fully automated using the CLI or REST API, giving you the ability to scale up or down, create partitions and users, register clients and revoke keys immediately across your entire global infrastructure from a single plane of glass.
Unbound completely eliminates the single point of compromise for your most sensitive assets, ensuring keys and secrets are never kept whole. Unbound implements multi-party computation (MPC) to create and use the fragmented secret without ever unifying it, in a method mathematically proven to be impossible to a breach or hack of any single location.
Read more here: https://info.unboundtech.com/vhsm_vs_hsm_guide
How we are different
1. Completely eliminates the dependence on hardware - Unbound provides proven protection of secrets at the level of hardware cryptographic modules and beyond, with a FIPS 140-2 Levels 1 & Levels 2 certified pure-software platform
2. Gain new levels of control - By splitting secrets among multiple entities – for example between a cloud platform and an enterprise-controlled server – enterprises can use secrets anywhere without ever losing control
3. Accelerate digital innovation - By splitting secrets among multiple entities – for example between a cloud platform and an enterprise-controlled server – enterprises can use secrets anywhere without ever losing control