Yubico YubiHSM 2 FIPS - USB turva-avain

Kategoria Turvatuotteet
Tuotekoodi 5060408464557
Valmistaja Yubico
Todellinen tuote voi poiketa kuvasta
Tukkuri Varastossa Arvioitu toimitusaika Hinta
ALV
DK773 0 Ei ole tiedossa 1 539,31

Tuote lyhyesti

The YubiHSM 2 FIPS is a game changing hardware solution for protecting Certificate Authority root keys from being copied by attackers, malware, and malicious insiders. It offers superior cost effective security and easy deployment making it accessible for every organization. It offers a higher level of security for cryptographic digital key generation, storage, and management, for organizations running Microsoft Active Directory Certificate Services.
The YubiHSM 2 features are accessible by integrating with an open source and comprehensive software development toolkit (SDK) for a wide range of open source and commercial applications. The most common use case is hardware-based digital signature generation and verification. In additional emerging use cases such as securing cryptocurrency exchanges and IoT gateways are just a few examples of how the world's smallest HSM can secure modern infrastructures.
YubiHSM 2 secures cryptographic keys through their entire lifecycle from secure key generation, attestation, secure key storage, secure key distribution, secure key backup all the way to secure key destruction if needed. Screen reader support enabled.

Tuote pähkinänkuoressa

  • Secure key storage and operations
  • Extensive cryptographic capabilities
  • Secure session between HSM and application
  • Role-based access controls for key management and key usage
  • 16 concurrent connections
  • Tamper-evident Audit Logging
  • Direct USB support

Tuotteen ominaisuudet

  • Secure key storage and operations
    Create, import, and store keys, then perform all crypto operations in the HSM hardware to prevent theft of keys while at rest or in use. This protects against both logical attacks against the server, such as zero-day exploits or malware, and physical theft of a server or its hard drive.
  • Extensive cryptographic capabilities
    YubiHSM 2 supports hashing, key wrapping, asymmetric signing and decryption operations including advanced signing using ed25519. Attestation is also supported for asymmetric key pairs generated on-device.
  • Secure session between HSM and application
    The integrity and privacy of commands and data in transit between the HSM and applications are protected using a mutually authenticated, integrity and confidentiality protected tunnel.
  • Role-based access controls for key management and key usage
    All cryptographic keys and other objects in the HSM belong to one or more security domains. Access rights are assigned for each authentication key at creation time which allow a specific set of cryptographic or management operations to be performed per security domain. Admins assign rights to authentication keys based on its use case, such as an event monitoring app that needs the ability to read all audit logs in the HSM, or a Registration Authority that needs to issue (sign) end user digital certificates, or a domain security admin who needs to create and delete crypto keys.
  • 16 concurrent connections
    Multiple applications can establish sessions with a YubiHSM to perform cryptographic operations. Sessions can be automatically terminated after inactivity or be long-lived to improve performance by eliminating session creation time.
  • Tamper-evident Audit Logging
    The YubiHSM internally stores a log of all management and crypto operation events that occur in the device and that log can be exported for monitoring and reporting. Each event (row) in the log is hash chained with the previous row and signed so that it's possible to determine if any events are modified or deleted.
  • Direct USB support
    The YubiHSM 2 can talk directly to the USB layer without the need for an intermediate HTTP mechanism. This delivers an improved experience for the developers who are developing solutions for virtualized environments.

Tuotekuvaus
Yubico YubiHSM 2 FIPS - USB turva-avain
Tuotetyyppi
USB turva-avain
Ulkomitat (PxSxK)
1.2 cm x 1.3 cm
Paino
1 g
Ominaisuudet
True Random Number Generator (TRNG), crush-resistant, asymmetric cryptography
Järjestelmävaatimukset
Ubuntu 14.04, CentOS 7.0, Ubuntu 16.04, Apple macOS Sierra 10.12, Apple macOS High Sierra 10.13, Apple macOS Mojave 10.14, Ubuntu 18.04, Linux Fedora 28, Ubuntu 18.10, Ubuntu 19.04, Ubuntu 19.10, Linux Fedora 31, Linux Fedora 30, Windows 10 / Windows Server 2012 / Windows Server 2016 / Windows Server 2019
Valmistajan takuu
1 vuoden takuu
Tuotetyyppi
USB turva-avain
Leveys
1.2 cm
Syvyys
1.3 cm
Paksuus
3.1 mm
Paino
1 g
Toimitettava liitin
4 nastan USB- A x 1
Ominaisuudet
True Random Number Generator (TRNG), crush-resistant, asymmetric cryptography
Yhteensopivuusstandardit
FCC, SHA-384, SHA-512, FIPS 140-2 Taso 3, RoHS, WEEE, SHA-1, SHA-256, IP68, ECDH, ECDSA
Vaadittu käyttöjärjestelmä
Ubuntu 14.04, CentOS 7.0, Ubuntu 16.04, Apple macOS Sierra 10.12, Apple macOS High Sierra 10.13, Apple macOS Mojave 10.14, Ubuntu 18.04, Linux Fedora 28, Ubuntu 18.10, Ubuntu 19.04, Ubuntu 19.10, Linux Fedora 31, Linux Fedora 30, Windows 10 / Windows Server 2012 / Windows Server 2016 / Windows Server 2019
Huolto ja tuki
Rajoitettu takuu - 1 vuosi