Yubico YubiHSM 2 v2.4, Hardware Security Module, USB-A

Põhiinfo

The YubiHSM 2 is a game changing hardware solution for protecting Certificate Authority root keys from being copied by attackers, malware, and malicious insiders. It offers superior cost effective security and easy deployment making it accessible for

Toode on arhiivis, kuvatakse vaid informatiivsel eesmärgil.

Vabandage, tooteandmed on tõlkimisel. Kui vajate toote võõrkeelse teksti mõistmisel abi, andke sellest palun teada e-posti teel info@photopoint.ee. Saadame teile kiirelt soovitud tõlke.


The YubiHSM 2 is a game changing hardware solution for protecting Certificate Authority root keys from being copied by attackers, malware, and malicious insiders. It offers superior cost effective security and easy deployment making it accessible for every organization. It offers a higher level of security for cryptographic digital key generation, storage, and management, for organizations running Microsoft Active Directory Certificate Services.<br><br>The YubiHSM 2 features are accessible by integrating with an open source and comprehensive software development toolkit (SDK) for a wide range of open source and commercial applications. The most common use case is hardware-based digital signature generation and verification. In additional emerging use cases such as securing cryptocurrency exchanges and IoT gateways are just a few examples of how the world’s smallest HSM can secure modern infrastructures.<br><br>YubiHSM 2 secures cryptographic keys through their entire lifecycle from secure key generation, attestation, secure key storage, secure key distribution, secure key backup all the way to secure key destruction if needed. Screen reader support enabled.<br><br><b>Use Cases<br><br>Enhance Protection for Cryptographic Keys</b><br>YubiHSM 2 offers a compelling option for secure generation, storage and management of keys. Key protection is done in the secure on-chip hardware isolated from operations on the server. Most common use cases involve protecting of the certificate authorities (CAs) private key. YubiHSM 2 capabilities include: generate, write, sign, decrypt, hash and wrapping keys.<br><br><b>Rapidly integrate with Hardware-based Strong Security</b><br>YubiHSM 2 can be used as a comprehensive cryptographic toolbox for low-volume operations in conjunction with a huge set of open source and commercial applications spanning many different products and services. Most common use case involve on-chip hardware based processing for signature generation and verification. The YubiHSM 2 supports the PKCS#11 industry standard.<br><br><b>Secure Microsoft Active Directory Certificate Services</b><br>YubiHSM 2 can provide hardware backed keys for your Microsoft-based PKI implementation. Deploying YubiHSM 2 to your Microsoft Active Directory Certificate services not only protects the CA root keys but also protects all signing and verification services using the private key.<br><br>- Secure key storage and operations<br>- Extensive cryptographic capabilities: RSA, ECC, ECDSA (ed25519), SHA-2, AES (ECB/CBC mode for non-FIPS only)<br>- Secure session between HSM and application<br>- Role-based access controls for key management and key usage<br>- 16 concurrent connections<br>- Optionally network shareable<br>- Remote management<br>- Unique “Nano” form factor, low-power usage<br>- M of N wrap key Backup and Restore<br>- Interfaces via YubiHSM KSP, PKCS#11, and native libraries<br>- Tamper evident Audit Logging<br><br><b>Secure Cryptocurrency Exchanges</b><br>With the explosive growth of the cryptocurrency market also comes a high volume of assets that need protection to mitigate against emerging security risks. The YubiHSM 2 FIPS allows organizations to strongly secure cryptographic keys and keep sensitive financial information safe.<br><br><b>Protect Internet of Things (IoT) Environments</b><br>The Internet-of-Things (IoT) is a rapidly emerging area where systems often operate in hostile environments. That makes securing cryptographics keys even more important as organizations need to protect sensitive information. Cryptographic keys are used in numerous IoT applications, with insufficient security in place. Developers building IoT applications can rapidly enable support for the YubiHSM 2 FIPS to protect cryptographic keys and keep critical IoT environments from falling victim to hostile takeovers.<br><br><b>Feature Details<br><br>Backups using Asymmetric Cryptography (New to v2.4)</b><br>YubiHSM 2 v2.4 allows secure data backups using asymmetric encryption, ensuring sensitive information remains protected, even during transfers over the internet.<br><br><b>Bring Your Own Key Support (New to v2.4)</b><br>The ‘Bring Your Own Key’ (BYOK) feature in YubiHSM 2 v2.4 lets organizations securely manage and store their own encryption keys in a multi-cloud environment, offering enhanced security, control, portability, and regulatory compliance at a lower cost than traditional on-premises HSMs.<br><br><b>Crypto Library Update (New to v2.4)</b><br>YubiHSM 2 v2.4 includes an in-house developed cryptographic library for performing RSA and ECC operations like decryption and signing, the same library used in the YubiKey 5.7 release.<br><br><b>Secure key storage and operations</b><br>Create, import, and store keys, then perform all crypto operations in the YubiHSM 2 FIPS hardware to prevent theft of keys while at rest or in use. This protects against both logical attacks against the server, such as zero-day exploits or malware, and physical theft of a server or its hard drive.<br><br><b>Extensive cryptographic capabilities</b><br>YubiHSM 2 FIPS supports hashing, key wrapping, asymmetric signing and decryption operations including advanced signing using ed25519. Attestation is also supported for asymmetric key pairs generated on-device.<br><br><b>Secure session between HSM and application</b><br>The integrity and privacy of commands and data in transit between the YubiHSM 2 FIPS and applications are protected using a mutually authenticated, integrity and confidentiality protected tunnel.<br><br><b>Role-based access controls for key management and key usage</b><br>All cryptographic keys and other objects in the YubiHSM 2 FIPS belong to one or more security domains. Access rights are assigned for each authentication key at creation time which allow a specific set of cryptographic or management operations to be performed per security domain. Admins assign rights to authentication keys based on its use case, such as a event monitoring app that needs the ability to read all audit logs in the YubiHSM 2 FIPS, or a Registration Authority that needs to issue (sign) end user digital certificates, or a domain security admin who needs to create and delete crypto keys.<br><br><b>16 concurrent connections</b><br>Multiple applications can establish sessions with a YubiHSM 2 FIPS to perform cryptographic operations. Sessions can be automatically terminated after inactivity or be long-lived to improve performance by eliminating session creation time.<br><br><b>Network Shareable</b><br>To increase the flexibility of deployments, the YubiHSM 2 FIPS can be made available for use over the network by applications on other servers. This can be especially advantageous on a physical server that is hosting multiple virtual machines.<br><br><b>Remote Management</b><br>Easily manage multiple deployed YubiHSM 2 FIPS remotely for the entire enterprise – eliminate on-call staff complexity and travel expense.<br><br><b>Unique “Nano” form factor, low-power usage</b><br>The Yubico “Nano” form factor allows the YubiHSM 2 FIPS to be inserted completely inside a USB-A port so it’s completely concealed – no external parts that protrude out of the server back or front chassis. It uses minimal power, max of 30mA, for cost-savings on your power budget.<br><br><b>M of N wrap key Backup and Restore</b><br>Backing up and deploying cryptographic keys on multiple YubiHSM 2 FIPS is a critical component of an enterprise security architecture, but it’s a risk to allow a single individual to have that ability. The YubiHSM 2 FIPS supports setting M of N rules on the wrap key used to export keys for backup or transport, so that multiple administrators are required to import and decrypt a key to make it usable on additional HSMs. For example in an enterprise, the Active Directory root CA private key might be key wrapped for 7 administrators (N=7) and at least 4 of them (M=4) are required to import and unwrap (decrypt) the key in the new YubiHSM 2 FIPS.<br><br><b>Interfaces via YubiHSM 2 FIPS KSP, PKCS#11, and native libraries</b><br>Crypto enabled applications can leverage the YubiHSM 2 FIPS via Yubico’s Key Storage Provider (KSP) for Microsoft’s CNG or industry-standard PKCS#11. Native libraries are also available on Windows, Linux and macOS to enable more direct interaction with the device’s capabilities.<br><br><b>Tamper evident Audit Logging</b><br>The YubiHSM 2 FIPS internally stores a log of all management and crypto operation events that occur in the device and that log can be exported for monitoring and reporting. Each event (row) in the log is hash chained with the previous row and signed so that it’s possible to determine if any events are modified or deleted.<br><br><b>Direct USB Support</b><br>The YubiHSM 2 FIPS can talk directly to the USB layer without the need for an intermediate HTTP mechanism. This delivers an improved experience for the developers who are developing solutions for virtualized environments.Yubico YubiHSM 2 v2.4, Hardware Security Module, USB-A. Width: 12 mm, Depth: 13 mm, Height: 3.1 mm. Product colour: Black, Authentication method: Authentication key, Cryptographic specifications: Microsoft CNG (KSP) PKCS#11 (Windows, Linux, macOS) Native YubiHSM Core Libraries (C, python),...

Mõõtmed ja kaalud

Pakendi laius
12 cm
Pakendi kõrgus
3.1 cm
Pakendi pikkus
13 cm

Toote koodid

EAN
5060408465462

Kuidas kaup minuni jõuab?

Alates 99 € tellimuste transport on Eesti-siseselt tasuta. Toote täpsemat tarneaega vaata vahelehelt "Saadavus".  

Selle toote puhul saad valida ühe järgmistest tarneviisidest:

Photopointi kauplusesse

Väiksemate toodete puhul on mugav minna kaubale järele Photopointi esinduskauplusesse. Nii on kauba kättesaamine Sinu jaoks täiesti tasuta, sest kauplusesse tellides ei lisandu postikulu ka siis, kui tellimus jääb alla 99 €. Kauba kauplusesse jõudmisest antakse Sulle teada e-kirja teel.

Photopointi kauplused asuvad Tallinnas ja Tartus. Täpsemalt saad poodide asukohti ja kontaktandmeid vaadata siit.

Omniva pakiautomaati

Vali kättesaamise kohaks endale sobivaim Omniva pakiautomaat. Kui pakk automaati jõuab, saadetakse Sulle SMS koos unikaalse koodiga. Mine kohale, sisesta kood automaati ja võta pakk. Nii lihtne ongi. Omniva pakiautomaadid asuvad hoonetest väljas – nii saad pakile järele minna olenemata kellaajast ja kuupäevast. 

Lähima pakiautomaadi saad Photopointi veebipoes valida ostukorvis, tarneviisi juures olevast nimekirjast. Omniva kõikide pakiautomaatide asukohti saad vaadata siit.

SmartPOST pakiautomaati

Ehk on Sinule sobivaimas kohas hoopis SmartPOST pakiautomaat? Kui nii, siis vali Photopointi veebipoes ostukorvis tarneviisiks see sobivaim. Kui pakk automaati jõuab, saadetakse Sulle SMS koos unikaalse koodiga. Mine kohale, sisesta kood automaati ja võta pakk. Kiire ja lihtne.

Kõikide SmartPOST pakiautomaatide asukohti saad vaadata siit.

DPD pakiautomaati

Vaata kindlasti üle ka DPD pakiautomaatide asukohad. Neid on tänaseks juba üle Eesti. Vali Photopointi veebipoes ostukorvis sobiv DPD pakiautomaat ning kui pakk kohale jõuab, saadetakse Sulle SMSiga kood.

DPD pakiautomaatide asukohti saad vaadata siit.

SmartPOST Finland pakiautomaati

Telli kaup endale Soome või saada see enda Soomes elavale sõbrale. SmartPOST Finland pakiautomaadid toimivad sama lihtsalt nagu Eestisisesed automaadid. Vali Photopointi veebipoes ostukorvis sobiv SmartPOST Finland automaat. Kui pakk kohale jõuab, saadetakse saajale SMS koos unikaalse koodiga. Mine kohale, sisesta kood automaati ja võta pakk.

SmartPOST Finland automaatide asukohti saad vaadata siit.

Matkahuolto väljastuspunkti Soomes

Telli kaup Soome või saada see enda Soomes elavale sõbrale. Vali Photopointi veebipoes ostukorvis sobiv Matkahuolto väljastuspunkt ning kui pakk kohale jõuab, saadetakse Sulle SMS või e-mail teavitusega. Mine kohale, näita isikut tõendavat dokumenti ja võta pakk.

Matkahuolto teeninduspunkte saad vaadata siit.

Kulleriga koju või kontorisse

Kulleriga saad kauba tellida koju, kontorisse või mujale, kus kauba kätte toimetamise ajal viibid. Kaup toimetatakse aadressile tööpäevadel kella 08:00-17:00.

Enne kauba kohale jõudmist helistab kuller kontaktile. Kaupa "koju" tellides hoolitse, et telefon oleks käepärast ning volitatud isik kauba kohale jõudmise ajal sihtkohas seda vastu võtmas. Eriti just suuremate esemete tellimisel palume arvestada, et kuller toimetab kauba vaid välisukseni. 

Toode on hetkel otsas. Lisainfot saadavuse ja ettetellimise kohta saad küsida, võttes meiega ühendust siin.

Avasta veel

Tootevõrdlus

Sulge