New Software Release for Utimaco HSM

utimaco LAN V5 4Utimaco, a leading manufacturer of hardware security modules (HSMs), has released SecurityServer 4.30 and SDK for its line of HSMs.

The new SecurityServer 4.30 introduces:

  • PIN Pad Daemon
  • Improved CNG Provider
  • User Database Restore
  • User Authentication Keys Generation on Smartcards
  • Signed Audit Log
  • Enforcing use of External Keystore
  • MBK Rollover
  • Linux Driver
  • Java Support and JCE Provider

For the HSM development environment, CryptoServer SDK 4.30 enables the usage of the new SecurityServer features.

Please contact us at This email address is being protected from spambots. You need JavaScript enabled to view it. if you have a valid maintenance contract for Utimaco HSM with us and you would like to get the new release.

For Utimaco CryptoServer HSM LAN V4 (Network HSM V4 a/b/c) the End-of-Life (EOL) date is 31 March 2022.

News

CREAplus awarded ISO 9001 certification

Utimaco video IG 4CREAplus has been awarded the ISO 9001:2015 certification for quality management.

Read more ...

CREAplus received a letter of thanks from the Ministry of Defense

CyopsThe Ministry of Defense of the Republic of Slovenia awarded CREAplus a letter of thanks for its participation in the cyber defense and strategic decision-making exercise "LOCKED SHIELDS 2021«.

Read more ...

Cynet's MDR Offers Organizations Continuous Security Oversight

CyopsToday's cyber attackers are constantly looking for ways to exploit vulnerabilities and infiltrate organizations. To keep up with this evolving threat landscape, security teams must be on the lookout for potential risks around the clock.

Read more ...

CREAplus successfully renewed ISO 27001 certification

Utimaco video IG 4CREAplus has successfully renewed the ISO/IEC 27001 certification for information security management.

Read more ...

What is the difference between a General Purpose and Payment HSM?

blockchainAlthough we do not give much thought to hardware security modules (HSMs), they are a critical element of security in an organisation’s IT infrastructure used for securing sensitive data.

Read more ...