Product Advantages
- Cloud Applicable
Dedicated HSM is the optimal choice for transferring offline encryption capabilities to the cloud, reducing your O&M costs.
- Elastic Scaling
You can flexibly increase or decrease the number of HSM instances according to your service needs.
- Security management
Dedicated HSM separates device management from the management of content (sensitive information). As a user of the device, you can control the generation, storage, and access of keys. Dedicated HSM is only responsible for monitoring and managing devices and related network facilities. Even the O&M personnel have no access to customer keys.
- Permission authentication
- Sensitive instructions are classified for hierarchical authorization, which effectively prevents unauthorized access.
- Several authentication types are supported, such as username/password and digital certificate.
- Reliable
- Dedicated HSM provides China State Cryptography Administration (CSCA) certified and FIPS 140-2 validated level 3 HSMs for protection of your keys, guaranteeing high-performance encryption services to meet your stringent security requirements.
- Each Dedicated HSM has its own chips. The service is not affected even if some chips are damaged.
- Security compliance
Dedicated HSM instances are certified by CSCA and can help you protect your data on ECSs and meet compliance requirements.
- Wide application
Dedicated HSM offers finance HSM, server HSM, and signature server HSM instances for use in various service scenarios.
Last Article: Functions
Next Article: Application Scenarios
Did this article solve your problem?
Thank you for your score!Your feedback would help us improve the website.