Updated on 2024-05-06 GMT+08:00

Advantages

  • Cloud Applicable

    Dedicated HSM is the optimal choice for transferring offline encryption capabilities to the cloud, reducing your O&M costs.

  • Elastic Scaling

    You can flexibly increase or decrease the number of HSM instances according to your service needs.

  • Security management

    Dedicated HSM separates device management from the management of content (sensitive information). As a user of the device, you can control the generation, storage, and access of keys. Dedicated HSM is only responsible for monitoring and managing devices and related network facilities. Even the O&M personnel have no access to customer keys.

  • Permission authentication
    • Sensitive instructions are classified for hierarchical authorization, which effectively prevents unauthorized access.
    • Several authentication types are supported, such as username/password and digital certificate.
  • Reliable
    • Dedicated HSM provides FIPS 140-2 validated level 3 HSMs for protection of your keys, guaranteeing high-performance encryption services to meet your stringent security requirements.
    • Each Dedicated HSM has its own chips. The service is not affected even if some chips are damaged.
    • Dedicated HSM provides reliable backup and hosting solutions for HSM data.
  • Security compliance

    Dedicated HSM instances can help you protect your data on ECSs and meet compliance requirements.

  • Wide application

    Dedicated HSM offers finance HSM, server HSM, and signature server HSM instances for use in various service scenarios.