Secure Execution Hardware from PrimeKey®

The ultimate trusted hardware platform for data and application confidentiality and integrity

The need for a secure execution hardware

In today’s rapidly changing IT landscape, it is essential to keep track of the accelerating data and application security challenges. With PrimeKey SEE, you can host your container in a trusted environment, which guarantees the integrity and confidentiality of your data and application. PrimeKey SEE is a FIPS-certified, patented hardware that eliminates the concern that someone could copy your software or even modify your data without your knowledge.

 

Protect your application

PrimeKey SEE is a safeguarded, rack-mounted Intel x86 server, designed to protect the entire application stack and data, from operating system to virtualization to application. Through implemented security procedures and the physical protection of the entire motherboard, the operating system as well as the applications are protected against changes, modifications, and eavesdropping at all times.

 

Prevent software and data theft

No need to fear that someone will steal or copy your software. You can now deploy your product in places with public access or where you fear that someone would be interested in extracting your software with untoward outcome for your business. With PrimeKey SEE, you can place your software wherever it further advances your business.

Prevent software and data theft

No need to fear that someone will copy your virtual machine, or steal your application and your data. PrimeKey SEE is an attack and temper-proof FIPS 140-2 Level 3 server.

 

PrimeKey SEE

Benefits of SEE

Certified hardware solution

FIP 140-2 Level 3 compliant physical shield

Trusted boot

Secure boot ensuring the integrity of started systems and offering zeroization (factory reset)

True random number generation

Non-deterministic random number generator (compliant with NIST SP-800 compliant hardware)

Open Platform for any virtual machine

KVM provides hardware assisted virtualization for a wide range of guest operation systems

Strong hardware protection

Complete physical protection of the customer application against unauthorized copying or manipulation.


Hands-on experience

Use Case Guide

Do you want to know more about the use cases for the PrimeKey SEE? Download the paper below and let us guide you through an overview of the different application areas in which the SEE can be used. We will dive into three solution areas, how they can be designed, and look at the advantages that the SEE offers in each situation.



Workshop Recording

Watch the PrimeKey Tech Days 2020 workshop recording to learn more about the PrimeKey SEE. Jiannis Papadakis, PrimeKey Senior Pre-Sales Engineer, and Oreste Panaia-Costa, PrimeKey Senior System Engineer, will give you background information about the PrimeKey SEE, take a deep dive into the architecture, and show a demo.



Technical Specifications

SEE Specifications

  • 4-core Xeon 3,6 GHz
  • Up to 64GB RAM
  • 128 GB Internal storage
  • Redundant, field replacable power suppliers
  • Up to 4TB Field replacable encrypted storage
  • 4 x GB Ethernet
  • Out-of-band Management

Certifications

  • FIPS 140-2, Level 3
  • FCC
  • CE

Security Specifications

  • FIPS 140-2 Level 3 compliant physical shield
  • Secure Boot assuring integrity of started system and offering zeroization (factory reset)
  • Non-deterministic random number generator (compliant to NIST SP-800 compliant hardware)

SEE Webinars

Simplifying compliance audits

Many applications are running in untrusted environments and there are obvious risks that someone could copy the software or that someone would get access to or modify data, without being caught. There are also, very often, obligations and demands on data center security, both physically and operational. External audits often raise concerns about application, data security as well as the corresponding management processes and procedures. When running the applications on the PrimeKey SEE, you take most of these concerns out of scope for the audits. The SEE is FIPS 140-2 Level 3 certified and designed to keep your application and data protected during runtime.

In this webinar we will talk about a couple of examples on how applications in different verticals can benefit from being run on the PrimeKey SEE.

Fill in your email address below and we will email you the recording.

    I accept that PrimeKey stores my information, and I accept cookies for analysis and business identification. Read more about cookies and privacy policy here.

What’s inside the PrimeKey SEE – a techie’s dream

In this technical webinar, we will explore the architecture and the design principles of the PrimeKey SEE. Deep diving in to the platform, we will show you how we establish a trust anchor on top of a standard server platform to enable the first trusted Kernel-based Virtual Machine (KVM) environment. In addition we will guide you through the lifecycle process of the platform itself. All of this showcasing a techie’s view of the FIPS 140-2, Level 3 certified PrimeKey SEE – helping you to run your applications anywhere you want in a secure and reliable way.

Fill in your email address and we will send you a link to the recording.

    I accept that PrimeKey stores my information, and I accept cookies for analysis and business identification. Read more about cookies and privacy policy here.

Contact us about secure execution hardware

Fill in your contact information below and we will get in touch with you.



How can we help?

  • Hidden
    I accept that PrimeKey stores my information, and I accept cookies for analysis and business identification. Read more about cookies and privacy policy here.
Contact us