5.2 Performance indicators
Your reliable partner for network and information security.
Product introduction >>
Sansec's SJJ1601 Cloud HSM is made specifically to fulfill the requirements of cloud services. Primarily implemented as a hardware device, the cloud HSM can achieve virtualization of VSMs, each of which can provide services such as encryption/decryption of data, performing signatures and verification, key management, maximizing hardware efficiency, a secure connection service for computer network systems under the cloud environment.
Product Functions >>
Each physical HSM can operate multiple VSM, each of which can provide applications with cryptographic services while ensuring that all VSMs are completely independent and isolated from each other. This virtualization improves the efficiency of resource usage, granular clustering of services, and can provide high-speed, stable, and reliable cryptographic operation services.
Secure remote key management
By using secure authentication and login protocols, cloud HSM allows the user to perform remote key management operations through an encrypted network connection.
Secure business usage
For the business usage, the encrypted connection between the VSM and the application mainframes can protect user application data through the secure network environment.
Centralized device management
Centralized management center can monitor and manage cloud HSM device, isolate user key management rights, and ensure secure storage and usage of user keys. Centralized device management supports device real-time monitoring and alarms to warn of device malfunctions. Administrators have full control of the device’s system settings. Through system configurations, the administrators can easily complete the management automatically.
High quality key generation
All types of cryptographic keys are generated by using OSCCA approved cryptographic hardware products to ensure their quality.
xtensive application support
Support JCE, PKCS#11 and other types of standard cryptographic application interfaces, satisfying security application requirements in virtualized or cloud environments.
Through bidirectional SSL connections and mutual authentications, cloud HSM can call up multiple VSMs while supporting multiple application services sharing for the VSMs.
Backup and recovery support
Support VSM automatic backup and recovery while assisting users in building applications programs that need a high usability of strong cryptographic key protection.
Product Features >>
Tight cloud environment deployment requirements
The cloud HSM’s cloud encryption are flexible and can be configured, shared by multiple users, and customized for users to deploy on private cloud, hence resolving the issue of isolating the key management rights. It is equipped with comprehensive technology and security mechanisms to ensure user key security.
Reduces the cost of equipment procurement and management
The cloud HSM supports leasing of cryptographic services and provides services to its users. The users no longer need to purchase expensive equipment and can instead enjoy the various cryptographic services provided by the cloud HSM at minimal costs. Multiple users can independently and securely share a single device. Through virtualization, the cloud HSM can act as 10 VSMs.
Cryptographic algorithm compliance
Cloud HSM supports the international cryptographic algorithms such as RSA, ECC, AES, DES, Triple-DES, SHA1/2/3 and son on. It also supports the SM2, SM3, and SM4 Chinese cryptographic algorithms, satisfying the OSCCA standards and having a high security strength.
Application Scenarios >>
Hardware index >>
7*24 hours support
Research and develop