Trident HSM under evaluation for FIPS 140-3 certification

The process to acquire the FIPS 140-3 certification for the Trident HSM Cryptographic Module has started. Soon our product will not only be a CC certified HSM but a FIPS 140-3 certified HSM, too.
i4p’s Dun & Bradstreet certificate renewed

i4p is among the companies with high creditworthiness, again: we have been chosen by Dun & Bradstreet as one of the enterprises with the steadiest financial standing.
i4p is on the Deloitte Fast 50 list

i4p is on the latest Deloitte Technology Fast 50 Central Europe list, which ranks the fastest growing companies in the technology industry in the Central European region.
Leading the way with a quantum-resistant encryption solution

We are proud to announce that we have launched our project called “Development of a post-quantum e-privacy platform in a multi-tenant cloud-based environment”. The project no. 2021-1.1.4-GYORSÍTÓSÁV-2022-00037 has been implemented with the support provided by the Ministry of Culture and Innovation of Hungary from the National Research, Development and Innovation Fund, financed under the 2021-1.1.4-GYORSÍTÓSÁV funding scheme.
Another QSCD certification for Trident HSM

Trident HSM has received the SSCD certification that confirms that our solution is suitable for creating qualified electronic signatures and qualified electronic seals, in „local use mode” as well.
How to minimize the risk of data breach with encryption

The cost of data breaches can be astronomical, not just in terms of fines and lost revenue, but also in terms of reputation and customer loyalty. The solution? Trident HSM with Multi-Party Computation.
Types of HSMs

Now that we have covered what HSMs are and what features they offer, let’s take a look at the different types of HSMs!
What are the advantages of an HSM?

In this post we will go deeper into the advantages and features of these devices.
Boosting Google’s client-side encryption feature with Trident HSM

Google has made it possible for users to use a client-side encryption function in the Workspace. However, you must ensure that you store the encryption keys in a proper and secure manner.
Quantum Key Distribution and Post Quantum Key Encapsulation with Trident HSM

Quantum computers are evolving, and they might become so advanced that they will be able to decrypt information that has been encrypted today.