TRIDENT TSS

trindent-software_tss

The TRIDENT Timestamp Server ensures the tamper-proof creation and authenticity of timestamps for any purposes. It is able to verify at all times, whether or not the timestamped data matches the exact same form at the point in time it was logged by the timestamp.

PRODUCT DETAILS
TRIDENT TSS can be run as an LCA (Local Client Application) integrated and protected by TRIDENT Hardware Security Module.

become a partner

Our Partner Program was specifically designed to naturally reward the investments you make in selling our solutions, based on your sales performance

MORE IN THE PRODUCT LINE

TRIDENT HSM

An easy-to-integrate HSM provides multiple functions for different use cases, offering an ideal solution for data protection challenges.

TRIDENT MPC

Trident HSM combines the high-level hardware security and multi-party computation to provide the highest level of data protection required in business.

TRIDENT RSS

The first eIDAS listed Remote Signature Solution with the Signature Activation Module (SAM) coming from the same vendor as the underlying Crypto Module (CM).

TRIDENT SFS

A Signature Formatting Server that is used for higher level signature formatting and a self-contained, fully functional module.

Contact us!

Contact us by filling out our online form
or send us an e-mail at info@i4p.com

Do you need support? For i4p support requests, please send
an e-mail to support@i4p.com or call +36 1 700 1230.

For press and media inquiries,
please send an e-mail to pr@i4p.com

Working hours:
MON-FRI 09:00 - 17:00 (CET)

Get in touch

Get your free ebook:

Why every company needs HSM modules?

Download this ebook to find out:

  • What is a Hardware Security Module (HSM)?
  • Why do you need an HSM?
  • Why is an HSM beneficial for your company?
  • What type of HSMs are available and what are they useful for?
  • How do you choose the right HSM for your organization?
  • How do you deploy and use an HSM?