TRIDENT TSS
The TRIDENT Timestamp Server ensures the tamper-proof creation and authenticity of timestamps for any purposes. It is able to verify at all times, whether or not the timestamped data matches the exact same form at the point in time it was logged by the timestamp.
PRODUCT DETAILS
TRIDENT TSS can be run as an LCA (Local Client Application) integrated and protected by TRIDENT Hardware Security Module.

become a partner

Our Partner Program was specifically designed to naturally reward the investments you make in selling our solutions, based on your sales performance

MORE IN THE PRODUCT LINE

TRIDENT HSM

An easy-to-integrate HSM provides multiple functions for different use cases, offering an ideal solution for data protection challenges.

TRIDENT MPC

TRIDENT HSM combines the high-level hardware security and multi-party computation to provide the highest level of data protection required in business.

TRIDENT RSS

The first eIDAS listed Remote Signature Solution with the Signature Activation Module (SAM) coming from the same vendor as the underlying Crypto Module (CM).

TRIDENT SFS

A Signature Formatting Server that is used for higher level signature formatting and a self-contained, fully functional module.

Contact us!

Contact us by filling out our online form
or send us an e-mail at info@i4p.com

Do you need support? For i4p support requests, please send
an e-mail to support@i4p.com or call +36 1 700 1200.

For press and media inquiries,
please send an e-mail to pr@i4p.com

Working hours:
MON-FRI 09:00 - 17:00 (CET)

Get in touch

    I want to get a quoteI want to receive detailed technical informationI have a questionI want to become a partnerOther

    Address:
    HU-1125 Budapest,
    Fogaskerekű utca 4-6.

    Phone: +36 1 700 1200
    Email: info@i4p.com
    Website: https://www.i4p.com

    Follow us!

    blog posts

    recent NEWS

    Trident HSM works together with Google CSE (Client-Side Encryption) feature made available worldwide by Google recently. As a Google Workspace user, you can store your Google Drive documents encrypted from now on. We believe it may be the big leap forward…https://lnkd.in/dQTmRMX7

    Post-quantum key encapsulation mechanism (KEM) algorithms in the new Trident HSM version and also integration with quantum key distribution (QKD) devices. The Trident is ready to support organizations around the world that want to or are obliged to use qu…https://lnkd.in/g-eRcUzP

    Get your free ebook:

    Why every company needs HSM modules?

    Download this ebook to find out:

    • What is a Hardware Security Module (HSM)?
    • Why do you need an HSM?
    • Why is an HSM beneficial for your company?
    • What type of HSMs are available and what are they useful for?
    • How do you choose the right HSM for your organization?
    • How do you deploy and use an HSM?