Cette page n'est pas encore disponible dans votre langue. Nous nous efforçons d'ajouter d'autres langues. Nous vous remercions de votre compréhension.

On this page

Show all

Product Advantages

Updated on 2023-01-31 GMT+08:00
  • Cloud Applicable

    Dedicated HSM is the optimal choice for transferring offline encryption capabilities to the cloud, reducing your O&M costs.

  • Elastic Scaling

    You can flexibly increase or decrease the number of HSM instances according to your service needs.

  • Security management

    Dedicated HSM separates device management from the management of content (sensitive information). As a user of the device, you can control the generation, storage, and access of keys. Dedicated HSM is only responsible for monitoring and managing devices and related network facilities. Even the O&M personnel have no access to customer keys.

  • Permission authentication
    • Sensitive instructions are classified for hierarchical authorization, which effectively prevents unauthorized access.
    • Several authentication types are supported, such as username/password and digital certificate.
  • Reliable
    • Dedicated HSM provides FIPS 140-2 validated level 3 HSMs for protection of your keys, guaranteeing high-performance encryption services to meet your stringent security requirements.
    • Each Dedicated HSM has its own chips. The service is not affected even if some chips are damaged.
  • Security compliance

    Dedicated HSM instances can help you protect your data on ECSs and meet compliance requirements.

  • Wide application

    Dedicated HSM offers finance HSM, server HSM, and signature server HSM instances for use in various service scenarios.

Feedback

Feedback

Feedback

0/500

Selected Content

Submit selected content with the feedback