Sepior Threshold Security Module™
Application Optimized vHSM and Key Management Infrastructure
Provide hardware security module (HSM)-like cryptographic operations and services with an entirely virtualized and distributed key management system using the power of secure multiparty computation
Sepior TSMs are available to support MPC-based key management, protection and cryptographic services for pre-defined applications
Sepior Threshold KM TSM™
Securely supporting a wide-range of enterprise-centric, cloud-hosted MPC Key Management, Encryption, and Signing services with hardware independent flexibility and scale
Sepior Advanced MPC TSM™
MPC-based key management and multiparty approval signature services – purpose-built for integration with digital asset wallets and custody solutions
Hosted on containers, VMs, desktop or mobile
Flexible Cryptographic Services For XaaS Providers
Distributed trust model
No Single Threshold Security Module Node Ever Has A Whole Key
Sepior Threshold Security Modules (TSMs) use secure MPC to function as a distributed, multiparty, virtual HSM and KMS.
Each TSM node uses secure MPC to locally generate and store unique shares of private keys
No single party ever has enough key shares to form an entire key
No single entity can be compromised to provide enough key material to enable key theft or misuse
Cryptographic operations can be performed without ever combining shares into an entire key
Delivering the security of on-premises systems …
… with the ease of use and scalability of cloud-based platforms!
Sepior Threshold KMS TSM and Sepior Advanced MPC TSM make it easy for SaaS, blockchain, and IaaS providers to offer cryptographic services while giving their customers full control over the keys.
Optional client-side encryption eliminates vulnerabilities between users and services.
Seamless integration with CSPs eliminates the dependency on proxy integration and renders services that your users and customers will love!
Range of applications
BYO Custodial Hot/Warm Wallets
Enterprise Blockchain Security
BYO Custodial Cold Storage
Database Encryption
Multi-Cloud BYOK
Code Signing
Keys for VPN
Passwordless MF Authentication
We make proven, high-performance threshold cryptography easy to implement.
Let us show you how
1
We’ll meet with your team to understand your framework and your requirements.
2
Our experts will propose a solution to your security and business needs.
3
We will work with you to assure optimal integration.