<img alt="" src="https://secure.weed6tape.com/193471.png" style="display:none;">
90-Day CloudHSM Free Trial – Experience Securosys CloudHSM without commitment.
Start your Free Trial
Products & Solutions
Products & Solutions
Explore our portfolio of cutting-edge cybersecurity solutions, centered around our flagship Hardware Security Modules (HSMs). From encryption and key management to secure access and authentication, our products ensure robust protection for your most critical data and systems.
About
About
Learn more about our mission, explore career opportunities, and access our resources. Discover how we’re shaping the future of cybersecurity and how you can be part of it.
Contact us
  • There are no suggestions because the search field is empty.

Challenge

Frequent news headlines highlight the loss or theft of crypto assets worth millions of dollars. However, this issue is not inherent to blockchain or distributed ledger technology. In these instances of theft, the private keys were inadequately stored, left minimally protected in server filesystems. If you are involved in managing crypto keys, particularly those entrusted to you by customers or involved in custody services, it's crucial to consider securing the private keys using hardware security modules

Solution

Solution

Effortlessly secure blockchain systems and crypto assets with the Securosys Primus Blockchain HSM. We offer enterprise-grade security, continually enhanced with additional functionalities to safeguard new blockchain systems entering the market.

Built upon the Primus X-Series and E-Series HSM, Primus Blockchain HSM introduces exclusive features to Distributed Ledger Technology (DLT), enabling applications to prioritize business functionality while entrusting blockchain security and key access management to the Blockchain HSM.

Solution

Key Benefits

image-1
Multi-Signature and Multi-Authorization Functionality
The integrated Smart Key Attributes (SKA) module enables multi-signature and multi-authorization functionality, providing enhanced security and control over blockchain transactions.
image-2
Tamper Protection
Ensure the integrity of your data during transport, storage, and operation with our tamper protection feature, providing a secure foundation for critical infrastructure.
image-3
Simple Setup and Maintenance
Effortlessly integrate into existing systems with easy commissioning, configuration, and maintenance procedures.
API-circle-b&w
REST API
Integrate easily via a simple REST API. Take advantage of the Securosys TSB workflow engine to deploy a Multi-Authorization Framework for both Digital assets and more.
shield-compliance-b&w
Comprehensive Blockchain Algorithm Support
Support multiple blockchain algorithms such as Bitcoin, Ethereum, Ripple, and IOTA for adaptability and futureproofing. Enable key derivation for Elliptical and Edwards curves. Seamlessly generate or import seed phrases to derive multiple key pairs as needed.
Key Differentiators
Primus HSM - X-series - circle-background

Market-Leading Performance

The Blockchain HSM supports performance needs from small transactions to up to 50,000 concurrent transactions per second, scalable to over 1,000,000 in clustered environments, solidifying its pioneering role.

Segregated Functions

Ensure the separation of business functionality and security, guaranteeing that critical operations are conducted within the secure environment of the Blockchain HSM, even in virtual or cloud computing setups.

Large Storage Space

Benefit from up to 30 GB of storage, allowing separate cold and hot wallet addresses on a single HSM. Ensure compliance with new regulations by securely segregating client and exchange assets, eliminating the need for omnibus accounts or asset co-mingling.

Success Stories

Revolutionizing Secure Blockchain Asset Management with Crypto Storage AG

Crypto Storage AG, in collaboration with Securosys, has redefined secure blockchain asset management for financial intermediaries. This partnership not only led to groundbreaking innovations, including two patent applications but also set new industry benchmarks, ensuring secure, tamper-proof transactions without compromising usability.

Discover how Crypto Storage AG is leading the way in crypto asset security.

Read the Success Story

KORE Technologies and Securosys: Building a Secure, End-to-End Digital Asset Management Platform

KORE Technologies developed a comprehensive digital asset management platform that ensures top-tier security, availability, and regulatory compliance throughout the entire asset life cycle. By partnering with Securosys, KORE leveraged the advanced capabilities of the Primus hardware security modules (HSM), addressing critical challenges such as fraud prevention and quantum resilience. This collaboration allowed KORE to focus on seamless integration and user experience, creating a robust platform that meets the stringent demands of modern financial institutions.

Discover how KORE Technologies, with Securosys, is revolutionizing digital asset management.

Read the Success Story

Technical Specifications

Key / Seed Generation
  • The HSM has a dual True Random Generator TRNG entropy source, and NIST SP800-90 compliant RNG
  • Key derivation on asymmetric keys including built-in BIP 32
  • Direct secure address generation (hash of the public key), which delivers extra PQC protection in the HSM
Side-channel protection
  • Prevents extraction of keys without compromising the storage
HW-based tamper response
  • Cannot be compromised by software bugs
Segregated functions in hardware and hardware "firewalls"
  • Prevents attack by silicon vendor
  • Mitigates risk from compromised software interacting with business logic
  • Process segregation that reduces risks associated with the communication stack being compromised
Cryptographic functions in hardware
  • Side channel protection
  • Protection from Spectre / Meltdown kind of attacks
  • Field upgradable FPGA implementation
Role model with multi factor authentication
  • Segregation of duties avoids risks with single admin having all information
  • Mitigates risks associated with hacked admin accounts
Integrated key access control HA redundancy and performance scalability
  • Device clustering for HA redundancy and performance scalablity with integrated secure backup feature
Smart Key Attributes (fine-granular access to individual keys)
  • Integrated multi-signature authentication scheme
Support for various crypto currencies
  • ETH, BTC based, Ripple, IOTA and many more, ... and many more, including derivatives of top crypto currencies
cryptocryptocryptocryptocryptocryptocryptocryptocryptocryptocryptocryptocryptocryptocryptocryptocryptocryptocrypto