Whitepapers

How to Control Your Own Keys (CYOK) in the Cloud

Learn how CYOK lets you confidently migrate your valued business applications and data to the cloud by maintaining full control of a foundational security element – your cryptographic keys.

MPC Primer

Get an in-depth explanation of how Unbound uses MPC, a mathematically proven method to secure keys on any device, anywhere. Learn how advancements in Multiparty Computation (MPC) research is leading us to the forefront of exciting application frontiers for security and privacy.

On-Demand Webinars

How to Securely Go Cloud-Native

In this webinar, we will provide an overview of the main security risks in cloud-native environments and address some of the solutions being adopted by leading Fortune 500 enterprises with the highest security requirements.

Introducing Unbound Crypto Asset Services Platform

What are major considerations and risks to be taken into account when building a cryptocurrency service, and introduce Unbound’s Cryptocurrency Security Platform and how it can be used to secure cryptocurrency services.

Key Protection & Governance in Blockchain

Private key protection in any blockchain infrastructure is critical and blockchain cannot rely on traditional key protection methods. What are new ways to protect keys so blockchain can deliver on its promises?

A New Risk Management Paradigm for Cloud Computing

How to Go Beyond BYOK with CYOK (Control Your Own Keys):  Learn how SaaS/IaaS providers and their customers can work together to enable CYOK as a defense to ensure sensitive assets remain secure even when a breach nightmare scenario can turn into reality.

New Standards for Code Signing

Best practices for implementing secure code signing--explore new approaches for code signing, and review best practices. We’ll highlight some of the new challenges in protecting code signing private keys and certificates in today’s world of increased virtualization, scaling and distribution.

Authentication & Identity in the Digital Banking Era

The emergence of multiple online services in various digital channels and the rise of Fintech, combined with the mobility and IoT revolution is rapidly virtualizing banking – forcing organizations to rethink current solutions to authentication and identity.

Multi-Party Computation (MPC): From Backstage to Center Stage

What is Secure Multiparty Computation (MPC) and why has it suddenly emerged as a powerful, game-changing technology being used in more and more security and privacy applications? We will explore how MPC makes the impossible, possible.

Keeping Control of Your Keys in the Public Cloud

Learn how Unbound Key Control lets you maintain full control of your private keys in any public cloud environments. No one, not even the cloud provider, can access your keys.

Securing Data in Perimeter-less, Multi-Cloud Environments

In order to deliver the digital apps & services we use on a daily basis,  the financial services industry is transitioning to new cloud-native agile delivery models of apps, containers, and dockers – bringing about new challenges and solutions.

The Magic of MPC

Unbound co-founder, Professor Nigel Smart unveils some of the magic behind Multiparty Computation (MPC) including examples of use in real-world scenarios. You don’t have to be a cryptographer or a mathematician to enjoy this webinar. Suitable for both math freaks and math-phobes!

Securing Data-in-Use in the Cloud: Myths and Facts

Recorded Live at BlueHat IL 2017, Prof. Yehuda Lindell talks about what it means to secure data while in use in the cloud, and demystifies solutions that do and do not work!

Datasheets

Unbound Key Control

Unbound Key Control is the first pure-software key management and key protection system that delivers hardware-level security guarantees. Learn how Unbound Key Control can help your organization secure its crypto keys, whether its in the cloud, on-premises, or any hybrid combination thereof.

Unbound Crypto-of-Things

Unbound is the only lightweight software key protection solution that enables every endpoint device to have a vHSM (virtual Hardware Security Module), where private keys can be stored securely with a trust level comparable to dedicated secure hardware – creating a consistent level of security among all BYOD devices that connect to your applications.

Unbound for Azure Marketplace

Unbound Key Control for Azure

The Unbound Key Control (UKC) for Azure Marketplace client software allows general-purpose application servers use UKC Crypto Services as a plug-in to its security framework. The client acts as the UKC service broker.

Unbound Key Control for Azure Marketplace Solution Brief

Unbound Key Control (UKC) lets you manage and control keys in any application deployed in Azure. This pure-software solution is easy to deploy and maintain, while giving you unmatched levels of security and control for your crypto keys in the cloud.

Videos

Episode #1 - Cryptographic Algorithms & Multiparty Computation (MPC) | Ask the Professor

Is it possible to use MPC to compute the outcome with two or more secret inputs from a number of entities while keeping the inputs private?” and more. Prof. Nigel Smart answers the internet’s most asked questions about encryption.

Episode #2 - Intro to Cryptography and a History Lesson | Ask the Professor

Ever wondered what the difference between public key vs. private key cryptography actually means? Furthermore, why is quantum cryptography even important? Prof. Smart answers all of your questions, and also explains how cryptography has changed in the past five years.

Episode #3 – Future of Cryptography & The Significance of the Enigma Machine | Ask the Professor

Where is crypto headed? What does this mean for Post-Quantum Cryptography, Privacy and Machine Learning? Prof. Nigel Smart discusses the future of crypto, and explains why the breaking of the Enigma Machine brought the end of WWII much faster.

Episode #4 – Ideal World vs. Real World, Quantum Cryptography & The Lorenz Cipher | Ask the Professor

Will Quantum Key Distribution ever replace Standard Cryptography (as we know it today). He also goes into detail about the German Lorenz Cipher, which was even more complex than Enig

Episode #5- Yao's Millionaire Problem, Where to Study Cryptography and more | Ask the Professor

Yao's Millionaire Problem (how to reveal who is the richest millionaire w/out revealing how much money they actually have), in the case of two or more parties. Additionally, what do you do if the message is longer than the keystream? And finally, how and when should one study cryptography?