Advantages
- Cloud Applicable
Dedicated HSM is the optimal choice for transferring offline encryption capabilities to the cloud, reducing your O&M costs.
- Elastic Scaling
You can flexibly increase or decrease the number of HSM instances according to your service needs.
- Security management
Dedicated HSM separates device management from the management of content (sensitive information). As a user of the device, you can control the generation, storage, and access of keys. Dedicated HSM is only responsible for monitoring and managing devices and related network facilities. Even the O&M personnel have no access to customer keys.
- Permission authentication
- Sensitive instructions are classified for hierarchical authorization, which effectively prevents unauthorized access.
- Several authentication types are supported, such as username/password and digital certificate.
- Reliable
- Dedicated HSM provides FIPS 140-2 validated level 3 HSMs for protection of your keys, guaranteeing high-performance encryption services to meet your stringent security requirements.
- Each Dedicated HSM has its own chips. The service is not affected even if some chips are damaged.
- Dedicated HSM provides reliable backup and hosting solutions for HSM data.
- Security compliance
Dedicated HSM instances can help you protect your data on ECSs and meet compliance requirements.
- Wide application
Dedicated HSM offers finance HSM, server HSM, and signature server HSM instances for use in various service scenarios.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot