<img alt="" src="https://secure.weed6tape.com/193471.png" style="display:none;">
Products & Solutions
Products & Solutions
Explore our portfolio of cutting-edge cybersecurity solutions, centered around our flagship hardware security modules (HSMs). From encryption and key management to secure access and authentication, our products ensure robust protection for your most critical data and systems.
About
About
Learn more about our mission, explore career opportunities, and access our resources. Discover how we’re shaping the future of cybersecurity and how you can be part of it.
Contact us
  • There are no suggestions because the search field is empty.

Challenge

Ensuring the security of your company's digital assets has become a paramount concern in today's technological landscape. Whether it's safeguarding classified documents, protecting financial resources, or securing personal identities, you face the constant challenge of preventing unauthorized access and manipulation. Additionally, operational security is crucial, encompassing protection against external intrusions and ensuring the continuous availability of online services. As you navigate these complexities, finding a robust solution that addresses your specific security needs becomes increasingly vital.

 

 

Solution

Solution

The Primus X-Series HSM offers top-tier security solutions tailored to your needs. It ensures swift and efficient operations up to 1000 RSA-4096 TPS (transactions per second). Its robust architecture enables storage of over 1 million keys across 120 partitions, each with a 240MB capacity.

Beyond key management, it handles authentication, encryption, and more, while allowing you to set up clusters yourself, offering geo-redundancy and load balancing. Partitioning allows support for multiple applications simultaneously, providing a scalable and personalized security solution. With the Primus X-Series HSM, you will confidently navigate IT security challenges, knowing your digital assets are safeguarded according to your needs.

Solution

Key Benefits

API-circle-b&w
Seamless Integration
X-Series HSMs offer integration via different, fully documented API’s (PKCS#11, CNG, Java, REST) and integrate effortlessly into any network environment, ensuring secure access for diverse applications in parallel.
locket-circle-blocks-b&w
Versatile Cryptographic Support
Primus HSMs support a wide range of cryptographic algorithms, including symmetric (like AES, 3DES), asymmetric (like RSA), cryptographic hash algorithms (like SHA-2, SHA-3), and is upgradeable to post quantum computer-resistant algorithms, ensuring robust security for diverse encryption needs.
people-circle-lock
Scalable Access
There's no limit to the number of users and clients that can securely access the Primus X-Series HSM, ensuring effortless expansion for your organization.
shield-performance-b&w
High Performance Storage and Multi-Tenancy
With up to 120+ partitions and 30GB storage space, the Primus X-Series HSM can securely store hundreds of thousands key objects, enabling efficient data management with key protection inside the HSM itself.
shield-tools-locket-b&w
Rapid Deployment and Low Maintenance
With a user-friendly setup wizard, Primus X-Series HSM offers quick setup, easy configuration and operation, reducing setup time and lowering operational and maintenance costs.
shield-locket-b&w
Robust Tamper Protection
Ensure data integrity during transport, storage, and operation with advanced tamper protection that exceeds FIPS and Common Criteria standards. Active tamper sensors protect even when the HSM is unpowered, triggering alerts on any manipulation attempt.
vault-b&w
Comprehensive Shielding
Enclosed in a heavy aluminum casing and shielded cryptographic core, the Primus X-Series HSM offers robust protection against side-channel attacks and minimizes electromagnetic radiation for enhanced security.
Key Differentiators
Securosys Primus HSM X-series - front

True Random Numbers Generation (TRNG

High-entropy encryption keys are paramount to provide the highest security. The Primus X-Series HSM has multiple true random number generation (TRNG) modules. They are built up with separate hardware components and get their randomness from different physical noise mechanisms.

Crypto-Agile Architecture

Due to its dynamic architecture, the Primus HSM is quantum computer ready. Should quantum computers make any of the supported algorithms to become obsolete, then a quantum computer safe algorithm may be installed through a firmware upgrade.

API Integration and built-in security

Primus HSM provides a variety of APIs for secure integration and communication, supporting automatic failover, load balancing, and prioritization. High availability and clustering are built-in features, requiring no extra software or cost.

Swiss Made

Crafted entirely in Switzerland, Securosys Primus HSMs embody unmatched quality and reliability. Free from external influences, our Swiss-made HSMs guarantee the highest standards from development to production, ensuring unparalleled security solutions.

Use Cases

colourful-background-patterns-4 Public Key Infrastructure (PKI) and Key Management System (KMS) Environments The Primus X-Series HSM provides secure key generation, storage, and management, ensuring the integrity and confidentiality of cryptographic keys essential for PKI and KMS environments.
colourful-background-patterns-9 Certificate Management Safeguard the entire certificate lifecycle, from issuance to revocation, with the Primus X-Series HSM, ensuring trust and authenticity in digital communications.
colourful-background-patterns Protection of the Blockchain Secure blockchain operations by leveraging the Primus X-Series HSM to protect private keys and ensure the authenticity of blockchain transactions. Learn more colourful-background-patterns-8 Smart Metering Enhance the security of smart metering systems by using the Primus X-Series HSM to securely store and manage cryptographic keys, ensuring the accuracy and integrity of metered data. Learn more
colourful-background-patterns-6 Crypto Operations The Primus X-Series HSM offers secure key storage and management, critical for safeguarding crypto assets.
colourful-background-patterns-4 Identity Access Management (IAM) and Privileged Access Management (PAM) Ensure secure identity verification and access control by using the Primus X-Series HSM to manage cryptographic keys that protect sensitive user credentials and privileged access.
colourful-background-patterns-9 Cloud Access Protection (Microsoft BYOK, AWS XKS, Salesforce, CASB, etc.) The Primus X-Series HSM enables secure cloud operations by managing keys used in Bring Your Own Key (BYOK) scenarios, external key stores, and other cloud-based encryption services.
colourful-background-patterns Docker Signing, Code Signing, Document Signing Maintain the integrity and authenticity of software and documents with the Primus X-Series HSM, which securely manages the cryptographic keys used in signing processes.
colourful-background-patterns-8 eIDAS, ZertES, or QSCD Operations Comply with European and Swiss digital signature regulations by using the Primus X-Series HSM to securely manage Qualified Signature Creation Devices (QSCD) for eIDAS and ZertES operations.
colourful-background-patterns-6 Database Security Protect sensitive data within databases by using the Primus X-Series HSM to manage encryption keys, ensuring data remains secure both at rest and in transit.

Technical Specifications

01
Security Features
02
Networking Features
03
Technical Data
01
Security Features
Security Architecture
  • Multi-barrier software and hardware architecture with supervision mechanism
Encryption /
Authentication (extract)
  • 128/192/256-Bit AES with GCM-, CTR-, ECB-, CBC-, MAC Mode
  • Camellia, 3DES (legacy), ChaCha20-Poly1305, ECIES
  • RSA 1024-8192, DSA 1024-8192
  • ECDSA 224-521, GF(P) arbitrary curves (NIST, Brainpool,...)
  • ED25519, Curve25519
  • Diffie-Hellman 1024, 2048, 4096, ECDH
  • SHA-2/SHA-3 (224 - 512), SHA-1, RIPEMED-160, Keccak
  • HMAC, CMAC, GMAC, Poly 1305
  • Post-Quantum Cryptographic (PQC) algorithms option CRYSTALS-Dilithium, CRYSTALS-Kyber, SPINCS+
Key Generation
  • Two hardware true random number generators (TNRG)
  • NIST SP800-90 compatible random number generator
Key Management
  • Key capacity: up to 30 GB
  • Up to 120 partitions @ 240 MB secure storage
Operation
  • Number of client connections not restricted
  • Unlimited number of backups
Anti-Tampering Mechanisms
  • Several sensors to detect unauthorized access
  • Active destruction of key material and sensitive data on tamper
  • Transport and multi-year storage tamper protection by digital seal
Attestation and Audit Features
  • Cryptographic evidence of audit relevant parameters (keys, configuration, hardware, states, logs, time-stamping)
Identity-based Authentication
  • Multiple security officers (m out of n)
  • Identification based on smart card and PIN 
02
Networking Features
03
Technical Data