Unbound Tech Virtual Hardware Security Module (vHSM)

Promote this Nomination

Additional Info

Company (that provides the nominated product / solution / service)Unbound Tech
Websitehttp://www.unboundtech.com
Company size (employees)50 to 99
Type of solutionSoftware
Approximate number of users worldwide1200

In 3 bullets, summarize why this company is different from the competition and deserves recognition:

1. Completely eliminates the dependence on hardware - Unbound provides proven protection of secrets at the level of hardware cryptographic modules and beyond, with a FIPS 140-2 Levels 1 & Levels 2 certified pure-software platform

2. Gain new levels of control - By splitting secrets among multiple entities – for example between a cloud platform and an enterprise-controlled server – enterprises can use secrets anywhere without ever losing control

3. Accelerate digital innovation - By splitting secrets among multiple entities – for example between a cloud platform and an enterprise-controlled server – enterprises can use secrets anywhere without ever losing control

Overview

With Unbound’s Virtual Hardware Security Module (vHSM), organizations can centrally manage, fully automate and scale key management without the need for hardware.

Unbound’s vHSM is an elastic and flexible key management platform that supports both virtualized and non-virtualized environments. As a software-only solution, UKC requires minimal efforts to setup, use and maintain in a variety of environments and application delivery models, including Dockers and containers. All key management and user management operations are fully automated using the CLI or REST API, giving you the ability to scale up or down, create partitions and users, register clients and revoke keys immediately across your entire global infrastructure from a single plane of glass.

Unbound completely eliminates the single point of compromise for your most sensitive assets, ensuring keys and secrets are never kept whole. Unbound implements multi-party computation (MPC) to create and use the fragmented secret without ever unifying it, in a method mathematically proven to be impossible to a breach or hack of any single location.

Read more here: https://info.unboundtech.com/vhsm_vs_hsm_guide

  • Vote For This Nomination

Browse Award Nominations