PrimeKey Secure Execution Environment

Protecting your Application and your Data in insecure environments

The need for a secure execution environment

Must your application and data be processed in an uncontrolled environment? Do you fear that someone will copy your software? Or that someone will access or even modify your data without your knowledge? With PrimeKey Secure Execution Environment (SEE) you don’t need to worry anymore. The patented FIPS protected hardware is the ideal platform for your mission critical application scenarios, no matter if you need crypto function or not.

PrimeKey colleagues
PrimeKey SEE

Protect your application

The PrimeKey SEE is a full-size rack-mount application server that comes with a patented FIPS protected execution environment for any operating system and application. It ensures that the server runtime environment at all times only can be accessed by an authorized security administrator, making it impossible to access, to extract or to modify by an unauthorized party. By doing so it opens up a new world of possibilities where you can run each mission-critical application in any uncontrolled environment.

 

Prevent software and data theft

No need to fear that someone will steal or copy your software. You can now deploy your product in places with public access or where you fear that someone would be interested in extracting your software with untoward outcome for your business. With PrimeKey SEE you can place your software wherever it benefits further advances of your business.

 

Prevent manipulation

If your software controls sensitive information or functionality you know the consequenses that an undetected malicious modification can have. Your IoT device might be hacked, your data compromised or your machines stop working. With SEE you can sleep sound, no one can access or modify your software and data.

 

Benefits of SEE

Proven Protection

Innovative, patented and FIPS certified Hardware Platform.

Open Platform

The safest platform, and open to run any kind of application.

Extensive User Interface

In addition to your application specific UI, the SEE provides you with a customized Multi Touch User Interface to administer security functionalitites.

Technical Specifications

SEE Specifications

  • 4-core Xeon 3,6 GHz
  • Up to 64GB RAM
  • 128 GB Internal storage
  • Redundant, field replacable power suppliers
  • Up to 4TB Field replacable encrypted storage
  • 4 x GB Ethernet
  • Out-of-band Management

Certifications

  • FIPS 140-2, Level 3
  • FCC
  • CE

Security Specifications

  • FIPS 140-2 Level compliant physical shield
  • Secure Boot assuring integrity of started system and offering zeroization (factory reset)
  • Non-deterministic random number generator (compliant to NIST SP-800 compliant hardware)

SEE Webinars

Simplifying compliance audits

Many applications are running in untrusted environments and there are obvious risks that someone could copy the software or that someone would get access to or modify data, without being caught. There are also, very often, obligations and demands on data center security, both physically and operational. External audits often raise concerns about application, data security as well as the corresponding management processes and procedures. When running the applications on the PrimeKey SEE, you take most of these concerns out of scope for the audits. The SEE is FIPS 140-2 Level 3 certified and designed to keep your application and data protected during runtime.

In this webinar we will talk about a couple of examples on how applications in different verticals can benefit from being run on the PrimeKey SEE.

Fill in your email address below and we will email you the recording.

    I accept that PrimeKey stores my information, and I accept cookies for analysis and business identification. Read more about cookies and privacy policy here.

What’s inside the PrimeKey SEE – a techie’s dream

In this technical webinar we will explore the architecture and the design principles of the PrimeKey SEE. Deep diving in to the platform, we will show you how we establish a trust anchor on top of a standard server platform to enable the first trusted Kernel-based Virtual Machine (KVM) environment. In addition we will guide you through the lifecycle process of the platform itself. All of this showcasing a techie’s view of the FIPS 140-2, Level 3 certified PrimeKey SEE – helping you to run your applications anywhere you want in a secure and reliable way.

Fill in your email address and we will send you a link to the recordig.

    I accept that PrimeKey stores my information, and I accept cookies for analysis and business identification. Read more about cookies and privacy policy here.

Contact us

Fill in your contact information below and we will get in touch with you.

    I accept that PrimeKey stores my information, and I accept cookies for analysis and business identification. Read more about cookies and privacy policy here.